Exam 5: Cryptography
Exam 1: Introduction and Security Trends49 Questions
Exam 2: General Security Concepts65 Questions
Exam 3: Operational-Organizational Security43 Questions
Exam 4: The Role of People in Security40 Questions
Exam 5: Cryptography49 Questions
Exam 6: Public Key Infrastructure50 Questions
Exam 7: Standards and Protocols44 Questions
Exam 8: Physical Security45 Questions
Exam 9: Network Fundamentals55 Questions
Exam 10: Infrastructure Security42 Questions
Exam 11: Authentication and Remote Access46 Questions
Exam 12: Wireless43 Questions
Exam 13: Intrusion Detection Systems and Network Security49 Questions
Exam 14: Baselines45 Questions
Exam 15: Types of Attacks and Malicious Software50 Questions
Exam 16: E-Mail and Instant Messaging47 Questions
Exam 17: Web Components45 Questions
Exam 18: Secure Software Development40 Questions
Exam 19: Disaster Recovery, Business Continuity, and Organizational Policies53 Questions
Exam 20: Risk Management42 Questions
Exam 21: Change Management35 Questions
Exam 22: Privilege Management39 Questions
Exam 23: Computer Forensics40 Questions
Exam 24: Legal Issues and Ethics40 Questions
Exam 25: Privacy40 Questions
Select questions type
The benefit of SHA-1 over MD5 is that it is resistant to a collision attack.
(True/False)
4.9/5
(39)
The cipher that replaces each letter of the alphabet with a different letter (not in sequence)is a
(Multiple Choice)
4.7/5
(33)
Keeping a copy of an encryption key with a trusted third party is known as
(Multiple Choice)
4.8/5
(33)
The process for protecting intellectual property from unauthorized used is called
(Multiple Choice)
4.9/5
(33)
_______________ is the process of analyzing available information in an attempt to return the encrypted message to its original form.
(Short Answer)
4.7/5
(29)
A(n)_______________ is a special mathematical function that performs a one-way encryption.
(Short Answer)
4.8/5
(28)
Cryptography is the process of attempting to return an encrypted message to its original form.
(True/False)
4.8/5
(42)
A special mathematical function that performs one-way encryption is called
(Multiple Choice)
5.0/5
(34)
What is steganography and what danger does it pose to an organization's sensitive information.
(Essay)
4.8/5
(36)
Cryptography can be used to protect confidentiality and integrity as well be used to implement nonrepudiation,authentication,key escrow,digital signatures,and digital rights management.
(True/False)
5.0/5
(36)
Alice sends Bob a message along with an MD5 hash of the message.Upon receipt,Bob runs the MD5 hashing algorithm and finds that the hash matches the one sent by Alice.This application of encryption is an example of
(Multiple Choice)
4.9/5
(34)
The encryption method base on the idea of two keys,one that is public and one that is private is
(Multiple Choice)
5.0/5
(41)
Alice sends an e-mail that she encrypts with a shared key,which only she and Bob have.Upon receipt Bob decrypts the email and reads it.This application of encryption is an example of
(Multiple Choice)
5.0/5
(35)
_______________ is done by comparing the input plaintext to the output ciphertext to try to determine the key used to encrypt the information.
(Short Answer)
4.9/5
(38)
Agents intercept a message that is encrypted.They use various techniques to try and decipher the plain text message.This is an example of
(Multiple Choice)
4.7/5
(38)
The encryption method based on the idea of using a shared key for encryption and decryption of data is
(Multiple Choice)
4.9/5
(31)
Keeping a copy of the encryption key with a trusted third party is called _______________.
(Short Answer)
4.9/5
(35)
A _______________ is when a hash algorithm is compromised by an attacker finding two different messages that hash to the same value.
(Short Answer)
4.8/5
(34)
Showing 21 - 40 of 49
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)