<< Prev Question Next Question >>

Question 8/66

Network of trusted certificate authority servers. Use asymmetric key pairs and combines software, encryption and services to provide a means of protecting security of business communication and transactions.

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (66q)
Question 1: John is going to use RSA to encrypt a message to Joan. What ...
Question 2: Bob's password is hashed, and so is John's. Even though they...
Question 3: John is trying to explain the basics of cryptography to a gr...
Question 4: If Bob is using asymmetric cryptography and wants to send a ...
Question 5: Collision resistance is an important property for any hashin...
Question 6: Which of the following algorithms uses three different keys ...
Question 7: What is an IV?
Question 8: Network of trusted certificate authority servers. Use asymme...
Question 9: Original, unencrypted information is referred to as ____....
Question 10: A disk you rotated to encrypt/decrypt. Created by Leon Alber...
Question 11: Ferris has been assigned the task of selecting security for ...
Question 12: With Cipher-block chaining (CBC) what happens?...
1 commentQuestion 13: You are explaining basic mathematics to beginning cryptograp...
Question 14: This algorithm was published by the German engineering firm ...
Question 15: Which of the following is a protocol for exchanging keys?...
Question 16: Hash. Created by Ronald Rivest. Replaced MD4. 128 bit output...
Question 17: What is Kerchoff's principle?
Question 18: Which one of the following are characteristics of a hash fun...
Question 19: In IPSec, if the VPN is a gateway-gateway or a host-gateway,...
Question 20: Which of the following is generally true about key sizes?...
Question 21: A type of frequency analysis used to attack polyalphabetic s...
Question 22: Developed by Netscape and has been replaced by TLS. It was t...
Question 23: In 2007, this wireless security algorithm was rendered usele...
Question 24: Which of the following is an asymmetric cipher?...
Question 25: Which one of the following is a symmetric key system using 6...
Question 26: A linear congruential generator is an example of what?...
Question 27: Fred is using an operating system that stores all passwords ...
Question 28: Which of the following asymmetric algorithms is described by...
Question 29: With Cipher feedback (CFB) what happens?...
Question 30: You are trying to find a modern method for security web traf...
Question 31: Part of understanding cryptography is understanding the cryp...
Question 32: Encryption of the same plain text with the same key results ...
Question 33: Which one of the following uses three different keys, all of...
Question 34: John is responsible for VPNs at his company. He is using IPS...
Question 35: During the process of encryption and decryption, what keys a...
Question 36: A measure of the uncertainty associated with a random variab...
Question 37: Which of the following would be the weakest encryption algor...
Question 38: Which of the following equations is related to EC?...
Question 39: Which one of the following is an authentication method that ...
Question 40: A symmetric Stream Cipher published by the German engineerin...
Question 41: Which of the following is a cryptographic protocol that allo...
Question 42: In relationship to hashing, the term _____refers to random b...
Question 43: Manipulating individuals so that they will divulge confident...
Question 44: Denis is looking at an older system that uses DES encryption...
Question 45: When learning algorithms, such as RSA, it is important to un...
Question 46: Which of the following is required for a hash?...
Question 47: Which of the following is a fundamental principle of cryptog...
Question 48: Protocol suite provides a method of setting up a secure chan...
Question 49: Software for maintaining an on-the-fly-encrypted volume. Dat...
Question 50: In 1977 researchers and MIT described what asymmetric algori...
Question 51: Changing some part of the plain text for some matching part ...
Question 52: The most widely used asymmetric encryption algorithm is what...
Question 53: MD5 can best be described as which one of the following?...
Question 54: Hash algortihm created by the Russians. Produces a fixed len...
Question 55: What size block does FORK256 use?...
Question 56: What is the basis for the difficulty in breaking RSA?...
Question 57: What is the formula m^e %n related to?...
Question 58: RFC 1321 describes what hash?
Question 59: Which of the following is a substitution cipher used by anci...
Question 60: What is the name of the attack where the attacker obtains th...
Question 61: What is a "Collision attack" in cryptography?...
Question 62: A number that is used only one time, then discarded is calle...
Question 63: A cryptographic hash function which uses a Merkle tree-like ...
Question 64: Which of the following Secure Hashing Algorithm (SHA) produc...
Question 65: Which of the following techniques is used (other than brute ...
Question 66: With Electronic codebook (ECB) what happens:...