Skip to main content

IS5403 Week 2 All Quizezz

4
Question

With this type of key cryptography, the sender and receiver of a message share a single common key.

Correct
 
4 of 9
5
Question

Hashing aims to produce:

Correct
 
5 of 9
6
Question

MD5 uses a hash value to create a hash which is typically a 32 character hex number and how many bits?

Correct
 
6 of 9
7
Question

RIPEMD is a suite of cryptographic hash functions developed basing upon:

Correct
 
7 of 9
8
Question

Which of the following is true concerning RC4?

Correct
 
8 of 9
9
Question

What is PBKDF2 for?

Correct 

3
Question

In Active Directory, what does authorization?

Correct
 
3 of 7
4
Question

A Digital signature is a piece of data digest encrypted with:

Correct
 
4 of 7
5
Question

Which of the following may be used as an alternative to CRLs?

Correct
 
5 of 7
6
Question

What is the faster way for browsers to obtain the revocation status of a digital certificate attached to a Web site?

Correct
 
6 of 7
7
Question

The security administrator for Conglomerate.com has been been directed by the CIO to reduce the cost of certificates. Which of the following is the FIRST step that should be taken?

Correct
3
Question

Which of the following technologies are necessary for implementing USB drive encryption or hard drive encryption? [Choose two that apply.]

Correct
 
3 of 5
4
Question

When defining data policies, what areas or issues must be covered? [Choose four that apply.]

Correct
 
4 of 5
5
Question

Which of the following can protect "data at rest"? [Choose four that apply.]

Correct
Unit 4 Quiz
Your Score: 100%
20 Correct out of 20
Question of 20
Which of these is NOT part of the certificate life cycle?
CORRECT


_____ is a protocol for securely accessing a remote computer.
CORRECT


A digital certificate associates _____.
CORRECT
_____ performs a real-time lookup of a digital certificate's status.
CORRECT


A centralized directory of digital certificates is called a(n) _____.
CORRECT
Which digital certificate displays the name of the entity behind the website?
CORRECT
Which digital certificate displays the name of the entity behind the website?
CORRECT
Which of these is considered the strongest cryptographic transport protocol?
CORRECT
Which of the following block ciphers XORs each block of plaintext with the previous block of ciphertext before being encrypted?
CORRECT
The strongest technology that would assure Alice that Bob is the sender of a message is a(n) _____.
CORRECT


Public key infrastructure (PKI) _____.
CORRECT
An entity that issues digital certificates is a _____.
CORRECT
Which statement is NOT true regarding hierarchical trust models?
CORRECT
_____ are symmetric keys to encrypt and decrypt information exchanged during the session and to verify its integrity.
CORRECT
_____ refers to a situation in which keys are managed by a third party, such as a trusted CA.
CORRECT
A(n) _____ is a published set of rules that govern the operation of a PKI.
CORRECT
What is a value that can be used to ensure that hashed plaintext will not consistently result in the same digest?
CORRECT

Which of the following is NOT a method for strengthening a key?
CORRECT
What entity calls in crypto modules to perform cryptographic tasks?
CORRECT
Digital certificates can be used for each of these EXCEPT _____.
CORRECT

Illya was asked to recommend the most secure asymmetric cryptographic algorithm to his supervisor. Which of the following did he choose?
CORRECT
Which areas of a file cannot be used by steganography to hide data?
CORRECT
What is the latest version of the Secure Hash Algorithm?
CORRECT

Which of the following key exchanges uses the same keys each time?
CORRECT
At a staff meeting one of the technicians suggested that the enterprise protect its new web server by hiding it and not telling anyone where it is located. Iosif raised his hand and said that security through obscurity was a poor idea. Why did he say that?
INCORRECT
See Ch. 3: Basic Cryptography, Section - Cryptography and Security


If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message?
CORRECT
Proving that a user sent an email message is known as _____.
CORRECT
A(n) _____ is not decrypted but is only used for comparison purposes.
CORRECT
Abram was asked to explain to one of his coworkers the XOR cipher. He showed his coworker an example of adding two bits, 1 and 1. What is the result of this sum?
CORRECT

The Hashed Message Authentication Code (HMAC) _____.
CORRECT
Which of these is NOT a characteristic of a secure hash algorithm?
CORRECT
Alyosha was explaining to a friend the importance of protecting a cryptographic key from cryptoanalysis. He said that the key should not relate in a simple way to the cipher text. Which protection is Alyosha describing?
CORRECT
Alexei was given a key to a substitution cipher. The key showed that the entire alphabet was rotated 13 steps. What type of cipher is this?
CORRECT
Which of these has an onboard key generator and key storage facility, as well as accelerated symmetric and asymmetric encryption, and can back up sensitive material in encrypted form?
CORRECT
Which of these is the strongest symmetric cryptographic algorithm?
CORRECT

Public key systems that generate random public keys that are different for each session are called _____.
CORRECT
Egor wanted to use a digital signature. Which of the following benefits will the digital signature not provide?
CORRECT
What is data called that is to be encrypted by inputting it into a cryptographic algorithm?
CORRECT
Which of these is NOT a basic security protection for information that cryptography can provide?
CORRECT
What is a characteristic of the Trusted Platform Module (TPM)?
CORRECT





















































































































































































































































Comments

Popular posts from this blog

IS5203 Type 2 Post Assessment and Final Quiz

  Carlos has just created a new subnet for the finance department. He needs to be able to allow the employees in finance to retrieve files from the sales server, which is located in another subnet. Which of the following OSI model layers would it be necessary to categorize the device into? a. Layer 4 b. Layer 6 c. Layer 2 d. Layer 3 All of the cubicles in a company's office have cables that run up to the ceiling and across to an IDF. Inside the IDF, they connect directly to the latest generation switch available from the networking equipment vendor that they have chosen. Which of the following describes the physical topology most likely in use? a. mesh

GE5103-2 Project Management [Aug 23 Syllabus]

    Some of the advantages of using time boxes and cycles in project coordination efforts include creating urgency, measuring progress, and allowing for predictable measurements. A)        True 2.    Even though most project managers are not contract specialists, they need to understand the process well enough to coordinate with the team. For the current assignment, you are looking at a short-term and small effort with a contractor of just a few hours without significant clarity. Which of the following would be the most applicable contract to use in this situation? A)        Time and materials 3. The project you are working on has had modifications to the plan from the start and even how the project is run. Project governance covers all of the 3 following except: A)        Naming The project manager 4. Of the following, which is most likely a trigger condition defined early in the project? A) Alerting Governance board if 10 percent over schedule 5. Of the following options, which stand

GE5163 Week8 ( Final Exam ) Quize's

  A process or product that is insensitive to normal variation is referred to as being Select one: a. in specification b. capable c. robust d. out of control Feedback Your answer is correct. A completed failure mode and effects analysis (FMEA) results in the following assessment rating.      Occurrence = 4      Severity = 8      Detection = 10 What is the risk priority number (RPN) for this FMEA? Select one: a. 42 b. 22 c. 320 d. 120 Feedback Your answer is correct. In a visual inspection situation, one of the best ways to minimize deterioration of the quality level is to: Select one: a. have a program of frequent eye exams. b. retrain the inspector frequently. c. add variety to the task. d. have a standard to compare against as an element of the operation. Feedback Your answer is correct. Which of the following elements is least necessary to a good corrective action feedback report? Select one: a. What caused the failure b. Who caused the failure c. What correction has been made d. Wh