Exam 9: Encryption - The Foundation for the Virtual Private Network
Exam 1: Introduction to Information Security50 Questions
Exam 2: Security Policies and Standards50 Questions
Exam 3: Authenticating Users50 Questions
Exam 4: Introduction to Firewalls49 Questions
Exam 5: Packet Filtering50 Questions
Exam 6: Firewall Configuration and Administration50 Questions
Exam 7: Working With Proxy Servers and Application-Level Firewalls50 Questions
Exam 8: Implementing the Bastion Host49 Questions
Exam 9: Encryption - The Foundation for the Virtual Private Network48 Questions
Exam 10: Setting up a Virtual Private Network50 Questions
Select questions type
____ attacks can be successful when the ciphertext consists of relatively few characters.
(Multiple Choice)
4.9/5
(38)
Session ____________________ are attacks involving a communication session that has already been established between a server and a client.
(Short Answer)
4.8/5
(27)
Pure asymmetric key encryption is widely used except in the area of certificates.
(True/False)
4.8/5
(30)
In ____________________ cipher conversion, the bit stream is subjected to a Boolean XOR function against some other data stream, typically a key stream.
(Short Answer)
4.7/5
(34)
Describe some of the challenges that organizations face when it comes to cryptographic controls.
(Essay)
4.9/5
(29)
Match each item with a statement below.
-The information used in conjunction with the algorithm to create the ciphertext from the plaintext.
(Multiple Choice)
4.7/5
(37)
Match each item with a statement below.
-The amount of effort (usually expressed in units of time) required to perform cryptanalysis on an encoded message.
(Multiple Choice)
4.8/5
(30)
Describe symmetric encryption.What is the weakness of this type of encryption?
(Essay)
4.7/5
(35)
According to the computer insurance agency Safeware, Inc.(www.safeware.com), a laptop is stolen every ____.
(Multiple Choice)
4.8/5
(34)
Match each item with a statement below.
-To decrypt or convert ciphertext to plaintext.
(Multiple Choice)
4.9/5
(35)
In e-commerce, some cryptographic tools can be used to assure that parties to the transaction are authentic, so that they cannot later deny having participated in a transaction, a feature often called ____________________.
(Short Answer)
4.8/5
(34)
Match each item with a statement below.
-To encrypt or convert plaintext to ciphertext.
(Multiple Choice)
4.9/5
(37)
The replacement of one alphabet character with another from more than one alphabets is known as
(Multiple Choice)
4.9/5
(39)
____ was developed by Netscape in 1994 to provide security for online electronic commerce transactions.
(Multiple Choice)
4.7/5
(43)
____ is a Kerberos service that generates and issues session keys.
(Multiple Choice)
4.9/5
(38)
Match each item with a statement below.
-The transformation of the individual components (characters, bytes, or bits) of an unencrypted message into encrypted components.
(Multiple Choice)
4.7/5
(34)
Showing 21 - 40 of 48
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)