Filters
Question type

Substitution is also referred to as permutation.

A) True
B) False

Correct Answer

verifed

verified

Julius Caesar created the scytale cipher.

A) True
B) False

Correct Answer

verifed

verified

The Caesar cipher and the Vigenere cipher are two of the earliest forms of substitution ciphers.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is NOT a symmetric algorithm?


A) CAST
B) IDEA
C) RSA
D) Twofish

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

A key is a parameter that controls the transformation of plaintext into ciphertext or vice versa.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is NOT an e-mail standard?


A) MIME
B) S/MIME
C) IPsec
D) PGP

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

What is another term for a null cipher?


A) Concealment cipher
B) Substitution cipher
C) Running key cipher
D) Transposition cipher

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

Which hash function produces 128-, 160-, or 192-bit hash values after performing 24 rounds of computations on 512-bit blocks?


A) Tiger
B) HAVAL
C) SHA-2
D) MAC

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Secure Sockets Layer (SSL) is a transport layer protocol that provides encryption, server and client authentication, and message integrity.

A) True
B) False

Correct Answer

verifed

verified

True

Which of the following is the most secure encryption scheme that can be used?


A) Symmetric cipher
B) One-way hash
C) Steganography
D) One-time pad

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Diffie-Hellman provides secure key distribution, confidentiality, authentication, and nonrepudiation.

A) True
B) False

Correct Answer

verifed

verified

Which term is used for a message in its original format?


A) Encryption
B) Decryption
C) Ciphertext
D) Plaintext

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

D

The U.S. federal government requires the use of DSA, RSA, or Elliptic Curve DSA (ECDSA) and SHA for digital signatures.

A) True
B) False

Correct Answer

verifed

verified

The U.S. government requires the usage of SHA-2 instead of MD5.

A) True
B) False

Correct Answer

verifed

verified

DES and 3DES are symmetric algorithms.

A) True
B) False

Correct Answer

verifed

verified

Which term is used for the amount of time and resources that would be needed to break the encryption?


A) Confusion
B) Avalanche affect
C) Work factor
D) Trapdoor

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

C

Which cipher uses 27 shift alphabets with letters being shifted up one place?


A) Scytale cipher
B) Vigenere cipher
C) Caesar cipher
D) World War II Enigma

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

In a hybrid cipher, the asymmetric algorithm provides the keys used for encryption.

A) True
B) False

Correct Answer

verifed

verified

Which entity creates and signs digital certificates, maintains the certificates, and revokes them when necessary?


A) CRL
B) OCSP
C) RA
D) CA

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What should you implement to prevent man-in-the-middle attacks against the Diffie-Hellman algorithm?


A) One-way hash
B) Digital certificates
C) Zero Knowledge Proof
D) Private keys

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Showing 1 - 20 of 20

Related Exams

Show Answer