Exam 5: Basic Cryptography
Exam 1: Introduction to Security50 Questions
Exam 2: Malware and Social Engineering Attacks50 Questions
Exam 3: Application and Networking-Based Attacks50 Questions
Exam 4: Host, Application, and Data Security50 Questions
Exam 5: Basic Cryptography50 Questions
Exam 6: Advanced Cryptography50 Questions
Exam 7: Network Security50 Questions
Exam 8: Administering a Secure Network50 Questions
Exam 9: Wireless Network Security50 Questions
Exam 10: Mobile Device Security50 Questions
Exam 11: Access Control Fundamentals50 Questions
Exam 12: Authentication and Account Management50 Questions
Exam 13: Business Continuity50 Questions
Exam 14: Risk Mitigation50 Questions
Exam 15: Vulnerability Assessment and Third Party Integration50 Questions
Select questions type
On what principle did Julius Caesar's cryptographic messages function?
(Multiple Choice)
4.7/5
(46)
Which type of cryptographic algorithm takes an input string of any length, and returns a string of any requested variable length?
(Multiple Choice)
4.7/5
(34)
What type of cryptography uses two keys instead of just one, generating both a private and a public key?
(Multiple Choice)
4.9/5
(29)
If using the MD5 hashing algorithm, what is the length to which each message is padded?
(Multiple Choice)
4.8/5
(37)
Match the following terms to the appropriate definitions
-A symmetric cipher that was approved by the NIST in late 2000 as a replacement for DES
(Multiple Choice)
4.9/5
(33)
Which of the following is not one of the functions of a digital signature?
(Multiple Choice)
4.8/5
(35)
Match the following terms to the appropriate definitions
-A temporary key that is used only once before it is discarded.
(Multiple Choice)
4.9/5
(29)
A key that is generated by a symmetric cryptographic algorithm is said to be a:
(Multiple Choice)
4.9/5
(41)
Match the following terms to the appropriate definitions
-Data that has been encrypted.
(Multiple Choice)
4.8/5
(33)
The asymmetric cryptography algorithm most commonly used is:
(Multiple Choice)
4.9/5
(31)
A(n) ____________________ is a method used by operating systems to store, retrieve, and organize files.
(Short Answer)
4.7/5
(39)
What cryptographic method, first proposed in the mid-1980s, makes use of sloping curves instead of large prime numbers?
(Multiple Choice)
4.9/5
(31)
In information technology, ____________________ is the process of proving that a user performed an action, such as sending an e-mail message or a specific document.
Match the following terms to the appropriate definitions.
(Short Answer)
4.8/5
(36)
The SHA-1 hashing algorithm creates a digest that is how many bits in length?
(Multiple Choice)
4.8/5
(28)
After the DES cipher was broken and no longer considered secure, what encryption algorithm was made as its successor?
(Multiple Choice)
4.8/5
(36)
Match the following terms to the appropriate definitions
-A symmetric block cipher that uses a 56-bit key and encrypts data in 64-bit blocks
(Multiple Choice)
4.9/5
(40)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)