Exam 5: Cryptography
Exam 1: Introduction and Security Trends49 Questions
Exam 2: General Security Concepts65 Questions
Exam 3: Operational-Organizational Security43 Questions
Exam 4: The Role of People in Security40 Questions
Exam 5: Cryptography49 Questions
Exam 6: Public Key Infrastructure50 Questions
Exam 7: Standards and Protocols44 Questions
Exam 8: Physical Security45 Questions
Exam 9: Network Fundamentals55 Questions
Exam 10: Infrastructure Security42 Questions
Exam 11: Authentication and Remote Access46 Questions
Exam 12: Wireless43 Questions
Exam 13: Intrusion Detection Systems and Network Security49 Questions
Exam 14: Baselines45 Questions
Exam 15: Types of Attacks and Malicious Software50 Questions
Exam 16: E-Mail and Instant Messaging47 Questions
Exam 17: Web Components45 Questions
Exam 18: Secure Software Development40 Questions
Exam 19: Disaster Recovery, Business Continuity, and Organizational Policies53 Questions
Exam 20: Risk Management42 Questions
Exam 21: Change Management35 Questions
Exam 22: Privilege Management39 Questions
Exam 23: Computer Forensics40 Questions
Exam 24: Legal Issues and Ethics40 Questions
Exam 25: Privacy40 Questions
Select questions type
Explain two ways encryption was done in ancient times without computers.
Free
(Essay)
4.8/5
(31)
Correct Answer:
The Spartans used a ribbon and cylinder and did a transposition cipher.The Romans used a shift cipher.
Encrypting a message by simply rearranging the order of the letters is a function of the
Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
C
The process for protecting intellectual property from unauthorized use is called _______________
Free
(Short Answer)
4.8/5
(33)
Correct Answer:
digital rights management
A collision attack is type of denial-of-service flooding attack that causes the number of collisions on the network to increase and thus bring down the network.
(True/False)
4.8/5
(34)
Bob connects to a company web site.His browser indicates that the digital certificate of the web site is valid.This application of encryption is an example of
(Multiple Choice)
5.0/5
(28)
When a message sent by a user is digitally signed with a private key,the person will not be able to deny sending the message.This application of encryption is an example of
(Multiple Choice)
4.8/5
(25)
All of the following are asymmetric encryption algorithms EXCEPT:
(Multiple Choice)
4.8/5
(34)
_______________ puts the plaintext through a simplified cipher to try to deduce what the key is likely to be in a full version of the cipher.
(Short Answer)
4.9/5
(29)
_______________ are functions that difficult to process without the key but easy to process when you have the key.
(Short Answer)
4.9/5
(34)
Hiding a text file in a jpg file is an example of steganography.
(True/False)
4.8/5
(38)
Hashing functions are special mathematical functions that performs a two-way encryption.
(True/False)
4.9/5
(40)
All of the following are symmetric encryption algorithms EXCEPT:
(Multiple Choice)
4.7/5
(41)
_______________ is a form of cryptography technology that can detect the interception of transmitted key bits.
(Short Answer)
4.7/5
(39)
The art of secret writing that enables an individual to hide the contents of a message from all but the intended recipient is called
(Multiple Choice)
4.8/5
(34)
Decryption is the process of creating ciphertext from plaintext.
(True/False)
4.8/5
(43)
Showing 1 - 20 of 49
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)