Exam 5: Basic Cryptography
Exam 1: Introduction to Security50 Questions
Exam 2: Malware and Social Engineering Attacks50 Questions
Exam 3: Application and Networking-Based Attacks50 Questions
Exam 4: Host, Application, and Data Security50 Questions
Exam 5: Basic Cryptography50 Questions
Exam 6: Advanced Cryptography50 Questions
Exam 7: Network Security50 Questions
Exam 8: Administering a Secure Network50 Questions
Exam 9: Wireless Network Security50 Questions
Exam 10: Mobile Device Security50 Questions
Exam 11: Access Control Fundamentals50 Questions
Exam 12: Authentication and Account Management50 Questions
Exam 13: Business Continuity50 Questions
Exam 14: Risk Mitigation50 Questions
Exam 15: Vulnerability Assessment and Third Party Integration50 Questions
Select questions type
Match the following terms to the appropriate definitions
-An algorithm that takes one character and replaces it with one character.
Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
J
How can steganography be used to hide information in something other than images?
Free
(Essay)
4.9/5
(33)
Correct Answer:
Steganography can be used to hide data within the file header fields that describe the file, between sections of the metadata.
In cryptography, which of the five basic protections ensures that the information is correct and no unauthorized person or malicious software has altered that data?
Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
D
Match the following terms to the appropriate definitions
-An asymmetric encryption key that does not have to be protected.
(Multiple Choice)
4.7/5
(34)
Cryptography that attempts to use the microscopic behaviors of objects to develop and share keys while also detecting eavesdropping is known as what type of cryptography?
(Multiple Choice)
4.9/5
(33)
The original cryptographic algorithms for encrypting and decrypting documents are ____________________ cryptographic algorithms.
(Short Answer)
5.0/5
(28)
Select below the standard that is based on the Rijndael algorithm, and was approved by NIST in late 2000 as a replacement for DES:
(Multiple Choice)
5.0/5
(33)
Data that is in an unencrypted form is referred to as which of the following?
(Multiple Choice)
4.9/5
(38)
Select below the hashing algorithm that takes plaintext of any length and generates a digest 128 bits in length:
(Multiple Choice)
4.9/5
(35)
Self-encrypting HDD is commonly found in copiers and multifunction printers as well as point-of-sale systems used in government, financial, and medical environments.
(True/False)
4.7/5
(36)
What is the name of the cryptographic hash function that has international recognition and has been adopted by standards organizations such as the ISO, that creates a digest of 512 bits and will not be subject to patents?
(Multiple Choice)
4.9/5
(24)
A hash algorithm is designed to create a hash that represents the contents of a set of data that can later be decrypted.
(True/False)
4.8/5
(30)
Discuss how cryptography can help ensure the availability of the data.
(Essay)
4.9/5
(46)
The NTRUEncrypt cryptographic algorithm makes use of which of the following cryptographic techniques?
(Multiple Choice)
4.8/5
(30)
Match the following terms to the appropriate definitions
-A key exchange that requires all parties to agree upon a large prime number and related integer so that the same key can be separately created.
(Multiple Choice)
4.8/5
(35)
What is the block cipher algorithm that operates on 64-bit blocks and can have a key length from 32 to 448 bits known as?
(Multiple Choice)
4.9/5
(41)
A block cipher works on a single character at a time, and is faster than a stream cipher.
(True/False)
4.8/5
(32)
Match the following terms to the appropriate definitions
-An algorithm that uses elliptic curves instead of prime numbers to compute keys
(Multiple Choice)
4.8/5
(39)
Match the following terms to the appropriate definitions
-A cipher that manipulates an entire block of plaintext at one time.
(Multiple Choice)
4.9/5
(34)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)