Exam 12: Cryptography
Exam 1: Ethical Hacking Overview50 Questions
Exam 2: Tcpip Concepts Review57 Questions
Exam 3: Network and Computer Attacks50 Questions
Exam 4: Footprinting and Social Engineering51 Questions
Exam 5: Port Scanning50 Questions
Exam 6: Enumeration50 Questions
Exam 7: Programming for Security Professionals53 Questions
Exam 8: Desktop and Server Os Vulnerabilities50 Questions
Exam 9: Embedded Operating Systems: The Hidden Threat50 Questions
Exam 10: Hacking Web Servers52 Questions
Exam 11: Hacking Wireless Networks52 Questions
Exam 12: Cryptography58 Questions
Exam 13: Network Protection Systems50 Questions
Select questions type
In a ____ attack, the attacker has access to plaintext and ciphertext and the ability to choose which messages to encrypt.
(Multiple Choice)
4.9/5
(39)
The program ____ is one of the best programs available today for cracking password files.
(Multiple Choice)
4.8/5
(34)
In a ____ attack, the attacker has messages in both encrypted form and decrypted forms.
(Multiple Choice)
4.9/5
(35)
The Book of Jeremiah was written using a cipher, or key, known as ____.
(Multiple Choice)
4.9/5
(30)
MATCHING
Match each term with the correct statement below.
-operates on blocks of plaintext
(Multiple Choice)
4.7/5
(36)
A certificate contains a unique serial number and must follow the ____ standard that describes the makings of a certificate.
(Multiple Choice)
4.7/5
(40)
How can confidentiality and authentication be achieved using public key cryptography?
(Essay)
4.9/5
(30)
MATCHING
Match each term with the correct statement below.
-digital document that verifies that the two parties exchanging data over the Internet are really who they claim to be
(Multiple Choice)
5.0/5
(38)
____ is an asymmetrical algorithm that can be used to encrypt data, create a digital signature, and exchange secret keys.
(Multiple Choice)
4.7/5
(38)
MATCHING
Match each term with the correct statement below.
-output of a hashing algorithm
(Multiple Choice)
4.8/5
(28)
____________________ attacks are used to find the same hash value for two different inputs.
(Short Answer)
4.9/5
(30)
In a ____ attack, after an attacker has access to a password file, he or she can run a password-cracking program that uses a dictionary of known words or passwords as an input file.
(Multiple Choice)
4.8/5
(36)
Cryptography is the process of converting plaintext, which is readable text, into ____________________, which is unreadable or encrypted text.
(Short Answer)
4.9/5
(34)
MATCHING
Match each term with the correct statement below.
-operates on plaintext one bit at a time
(Multiple Choice)
4.8/5
(30)
Showing 41 - 58 of 58
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)