Exam 3: Basic Cryptography
Exam 1: Introduction to Security50 Questions
Exam 2: Malware and Social Engineering Attacks50 Questions
Exam 3: Basic Cryptography50 Questions
Exam 4: Advanced Cryptography and PKI50 Questions
Exam 5: Networking and Server Attacks50 Questions
Exam 6: Network Security Devices, Design, and Technology50 Questions
Exam 7: Administering a Secure Network50 Questions
Exam 8: Wireless Network Security50 Questions
Exam 9: Client and Application Security50 Questions
Exam 10: Mobile and Embedded Device Security50 Questions
Exam 11: Authentication and Account Management50 Questions
Exam 12: Access Management50 Questions
Exam 13: Vulnerability Assessment and Data Security50 Questions
Exam 14: Business Continuity50 Questions
Exam 15: Risk Mitigation50 Questions
Select questions type
Which of the following are considered to be common asymmetric cryptographic algorithms? (Choose all that apply. )
(Multiple Choice)
4.8/5
(35)
Wireless data networks are particularly susceptible to known ciphertext attacks.
(True/False)
4.7/5
(35)
What alternative term can be used to describe asymmetric cryptographic algorithms?
(Multiple Choice)
4.8/5
(30)
If Bob receives an encrypted reply message from Alice,whose private key is used to decrypt the received message?
(Multiple Choice)
4.7/5
(41)
What term describes data actions being performed by endpoint devices,such as printing a report from a desktop computer?
(Multiple Choice)
4.8/5
(37)
Asymmetric cryptographic algorithms are also known as private key cryptography.
(True/False)
4.7/5
(38)
Data that is in an unencrypted form is referred to as which of the following?
(Multiple Choice)
4.9/5
(33)
What cryptographic method,first proposed in the mid-1980s,makes use of sloping curves instead of large prime numbers?
(Multiple Choice)
4.8/5
(29)
When Bob needs to send Alice a message with a digital signature,whose private key is used to encrypt the hash?
(Multiple Choice)
4.8/5
(37)
What is meant by the phrase "security through obscurity," and why is this concept not accurate?
(Essay)
4.9/5
(45)
What type of cipher takes one character and replaces it with one character,working one character at a time?
(Multiple Choice)
4.8/5
(36)
GNU Privacy Guard a proprietary software that runs on different operating systems.
(True/False)
4.9/5
(37)
What type of cryptographic algorithm creates a unique digital fingerprint of a set of data?
(Multiple Choice)
4.9/5
(30)
After the DES cipher was broken and no longer considered secure,what encryption algorithm was made as its successor?
(Multiple Choice)
4.9/5
(28)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)