Exam 5: Cryptography
Exam 1: Network Security Fundamentals50 Questions
Exam 2: TCP-IP50 Questions
Exam 3: Network Traffic Signatures49 Questions
Exam 4: Routing Fundamentals50 Questions
Exam 5: Cryptography50 Questions
Exam 6: Wireless Network Fundamentals50 Questions
Exam 7: Understanding Wireless Security50 Questions
Exam 8: Intrusion Detection and Prevention Systems50 Questions
Exam 9: Firewalls50 Questions
Exam 10: Firewall Design and Management50 Questions
Exam 11: VPN Concepts50 Questions
Exam 12: Internet and World Wide Web Security50 Questions
Exam 13: Security Policy Design and Implementation50 Questions
Exam 14: On-Going Security Management50 Questions
Select questions type
Encrypted files can be transmitted in both electronic form and as written messages.
Free
(True/False)
4.9/5
(30)
Correct Answer:
True
What is a hash value and how does it verify message integrity?
Free
(Essay)
4.9/5
(37)
Correct Answer:
A hash value is a fixed-size string representing the original input's contents.If the input changes in any way,even by adding a period at the end of a sentence,the resulting output
has a different hash value.
Which of the following is the first step in the digital signature process where Mike sends a message to Sophie?
Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
A
Which of the following is true about Message Authentication Code.
(Multiple Choice)
4.8/5
(39)
Which of the following makes a single pass on data and generates a 128-bit hash value displayed as a 32-character hexadecimal number and is used in VPNs?
(Multiple Choice)
4.8/5
(26)
What three conditions must be true to make a hashing algorithm secure?
(Essay)
4.8/5
(37)
Which of the following is commonly used for verifying message integrity?
(Multiple Choice)
4.9/5
(31)
Which component of IPsec enables computers to exchange keys to make an SA?
(Multiple Choice)
4.9/5
(33)
Which of the following was developed as a way of enabling Web servers and browsers to exchange encrypted information and uses a hashed message authentication code to increase security?
(Multiple Choice)
4.9/5
(27)
MATCHING
-A set of standard procedures that the Internet Engineering Task Force (IETF)developed for enabling secure communication on the Internet
(Multiple Choice)
5.0/5
(35)
Which of the following is NOT a critical goal of information security?
(Multiple Choice)
4.9/5
(35)
Which of the following is described as a 64-bit block cipher composed of a 16-round Feistel network and key-dependent S-box functions?
(Multiple Choice)
4.8/5
(39)
______________ cryptanalysis is applicable to block ciphers that use a substitution-permutation network including Rijndael,Twofish,and IDEA.
(Short Answer)
4.9/5
(29)
In a passive attack,cryptanalysts eavesdrop on transmissions but don't interact with parties exchanging information.
(True/False)
4.8/5
(43)
MATCHING
-a type of encryption algorithm that encrypts groups of cleartext characters
(Multiple Choice)
5.0/5
(34)
The standardization of cryptographic protocols discourages attackers from trying to break them.
(True/False)
4.9/5
(35)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)