Exam 9: Encryption - The Foundation for the Virtual Private Network
Exam 1: Introduction to Information Security50 Questions
Exam 2: Security Policies and Standards50 Questions
Exam 3: Authenticating Users50 Questions
Exam 4: Introduction to Firewalls49 Questions
Exam 5: Packet Filtering50 Questions
Exam 6: Firewall Configuration and Administration50 Questions
Exam 7: Working With Proxy Servers and Application-Level Firewalls50 Questions
Exam 8: Implementing the Bastion Host49 Questions
Exam 9: Encryption - The Foundation for the Virtual Private Network48 Questions
Exam 10: Setting up a Virtual Private Network50 Questions
Select questions type
The formula ____ represents the application of encryption (E) to a message (M) to create ciphertext (C)
Free
(Multiple Choice)
4.7/5
(32)
Correct Answer:
B
The XOR cipher conversion subjects the bitstream to a Boolean XOR function against some other data stream typically a ____ stream "
Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
D
Rijndael is the block cipher algorithm behind what encryption standard?
Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
A
Asymmetric encryption uses ____ separate keys for each message.
(Multiple Choice)
4.8/5
(32)
The reverse of the asymmetric encryption process yields ____.
(Multiple Choice)
4.9/5
(38)
The ____ cipher rearranges the values within a block to create the ciphertext.
(Multiple Choice)
4.9/5
(42)
One of the most popular public key cryptosystems is a proprietary model named ____.
(Multiple Choice)
4.7/5
(37)
An attacker may obtain duplicate texts, one in ciphertext and one in plaintext, which enable the individual to reverse-engineer the encryption algorithm in a ____ attack.
(Multiple Choice)
4.9/5
(30)
Match each item with a statement below.
-The encrypted or encoded message resulting from an encryption.
(Multiple Choice)
4.9/5
(39)
Historically, attempts to gain unauthorized access to secure communications have used brute force attacks.
(True/False)
4.9/5
(27)
AES has been the federally approved standard for nonclassified data since 2002.
(True/False)
4.9/5
(41)
____ attacks are collections of brute-force methods that attempt to deduce statistical relationships between the structure of the unknown key and the ciphertext that is the output of the cryptosystem.
(Multiple Choice)
4.9/5
(31)
____ is the predominant cryptographic authentication and encryption protocol suite in use today.
(Multiple Choice)
4.8/5
(32)
PKI systems are based on public key cryptosystems and include digital certificates and certificate ____________________.
(Short Answer)
4.8/5
(41)
Match each item with a statement below.
-The mathematical formula or method used to convert an unencrypted message into an encrypted message or vice versa.
(Multiple Choice)
4.8/5
(38)
Match each item with a statement below.
-The set of transformations necessary to convert an unencrypted message into an encrypted message.
(Multiple Choice)
4.8/5
(37)
Showing 1 - 20 of 48
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)