View Mode
Q: 1
A number that is used only one time, then discarded is called what?
Options
Q: 2
In IPSec, if the VPN is a gateway-gateway or a host-gateway, then which one of the following is true?
Options
Q: 3
A _____ is a function that takes a variable-size input m and returns a fixed-size string.
Options
Q: 4
Software for maintaining an on-the-fly-encrypted volume. Data is automatically encrypted right before it is saved, then decrypted right after it is loaded, all w/o user intervention.
Options
Q: 5
John works as a cryptography consultant. He finds that people often misunderstand the reality of breaking a cipher. What is the definition of breaking a cipher?
Options
Q: 6
A non-secret binary vector used as the initializing input algorithm for encryption of a plaintext block sequence to increase security by introducing additional cryptographic variance.
Options
Q: 7
Which one of the following are characteristics of a hash function? (Choose two)
Options
Q: 8

The most widely used digital certificate standard. First issued July 3, 1988. It is a digital document that contains a public key signed by the trusted third party, which is known as a Certificate Authority, or CA. Relied on by S/MIME. Contains your name, info about you, and a signature of a person who issued the certificate.

Options
Q: 9
If you wished to see a list of revoked certificates from a CA, where would you look?
Options
Q: 10
Ferris has been assigned the task of selecting security for his company's wireless network. It is important that he pick the strongest form of wireless security. Which one of the following is the strongest wireless security?
Options
Question 1 of 20 · Page 1 / 2

Premium Access Includes

  • Quiz Simulator
  • Exam Mode
  • Progress Tracking
  • Question Saving
  • Flash Cards
  • Drag & Drops
  • 3 Months Access
  • PDF Downloads
Get Premium Access
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail 10% DISCOUNT on YOUR PURCHASE