0 of 50 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
You must sign in or sign up to start the quiz.
You must first complete the following:
Quiz complete. Results are being recorded.
0 of 50 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
-
Current
-
Review / Skip
-
Answered
-
Correct
-
Incorrect
-
Question 1 of 50
0 point(s)
Category: Security+
A message is authentic and digitally signed if sent with:
-
Question 2 of 50
0 point(s)
Category: Security+
Heart of Data Encryption Standard (DES), is the
-
Question 3 of 50
0 point(s)
Category: Security+
-
Question 4 of 50
0 point(s)
Category: Security+
In symmetric-key cryptography, the key used by sender and receiver is
-
Question 5 of 50
0 point(s)
Category: Security+
In symmetric key cryptography, key(s) used for encryption and decryption is/are
-
Question 6 of 50
0 point(s)
Category: Security+
Keys used in cryptography are:
-
Question 7 of 50
0 point(s)
Category: Security+
Cryptography can provide:
-
Question 8 of 50
0 point(s)
Category: Security+
Advanced Encryption Standard (AES), has three different configurations with respect to number of rounds and ________
-
Question 9 of 50
0 point(s)
Category: Security+
Cryptography algorithms (ciphers) are divided into:
-
Question 10 of 50
0 point(s)
Category: Security+
In cryptography, original message, before being transformed, is called
-
Question 11 of 50
0 point(s)
Category: Security+
A hash function guarantees integrity of a message. It guarantees that message has not been _______________.
-
Question 12 of 50
0 point(s)
Category: Security+
Message digest is referred to:
-
Question 13 of 50
0 point(s)
Category: Security+
-
Question 14 of 50
0 point(s)
Category: Security+
Number of submissions for SHA-3 algorithm:
-
Question 15 of 50
0 point(s)
Category: Security+
SHA-1 has a message digest of :
-
Question 16 of 50
0 point(s)
Category: Security+
To check integrity of a message or document, receiver creates the :
-
Question 17 of 50
0 point(s)
Category: Security+
A digital signature needs a:
-
Question 18 of 50
0 point(s)
Category: Security+
-
Question 19 of 50
0 point(s)
Category: Security+
-
Question 20 of 50
0 point(s)
Category: Security+
-
Question 21 of 50
0 point(s)
Category: Security+
What is Computer Security
-
Question 22 of 50
0 point(s)
Category: Security+
-
Question 23 of 50
0 point(s)
Category: Security+
-
Question 24 of 50
0 point(s)
Category: Security+
-
Question 25 of 50
0 point(s)
Category: Security+
How many rounds of processing uses DES?
-
Question 26 of 50
0 point(s)
Category: Security+
What is the encryption key size of DES
-
Question 27 of 50
0 point(s)
Category: Security+
-
Question 28 of 50
0 point(s)
Category: Security+
-
Question 29 of 50
0 point(s)
Category: Security+
-
Question 30 of 50
0 point(s)
Category: Security+
-
Question 31 of 50
0 point(s)
Category: Security+
Operation in AES is based on
-
Question 32 of 50
0 point(s)
Category: Security+
-
Question 33 of 50
0 point(s)
Category: Security+
What is the difference between stream cipher and one-time pad?
-
Question 34 of 50
0 point(s)
Category: Security+
What is the difference between stream cipher and one-time pad?
-
Question 35 of 50
0 point(s)
Category: Security+
-
-
-
-
-
Question 36 of 50
0 point(s)
Category: Security+
-
-
-
-
-
Question 37 of 50
0 point(s)
Category: Security+
Public Keys Cryptography Algorithm:
-
-
-
-
-
Question 38 of 50
0 point(s)
Category: Security+
Public Key Infrastructure:
-
-
-
-
-
Question 39 of 50
0 point(s)
Category: Security+
Public-key encryption has ___ingredients:
-
Question 40 of 50
0 point(s)
Category: Security+
-
Question 41 of 50
0 point(s)
Category: Security+
Public key cryptosystem provides authentication:
-
Question 42 of 50
0 point(s)
Category: Security+
Public key cryptosystem provides confidentiality:
-
Question 43 of 50
0 point(s)
Category: Security+
Public key cryptosystem provides availability:
-
Question 44 of 50
0 point(s)
Category: Security+
-
Question 45 of 50
0 point(s)
Category: Security+
The first published public-key algorithm
-
Question 46 of 50
0 point(s)
Category: Security+
The purpose of Diffie-Hellman algorithm:
-
Question 47 of 50
0 point(s)
Category: Security+
Difficulty of Diffie-Hellman algorithm depends on:
-
Question 48 of 50
0 point(s)
Category: Security+
Message privacy means that sender and receiver expect:
-
Question 49 of 50
0 point(s)
Category: Security+
An encryption algorithm transforms plaintext into
-
Question 50 of 50
0 point(s)
Category: Security+
Ciphers of today are called round ciphers because they involve