Q: 1
A number that is used only one time, then discarded is called what?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 2
In IPSec, if the VPN is a gateway-gateway or a host-gateway, then which one of the following is true?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 3
A _____ is a function that takes a variable-size input m and returns a fixed-size string.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 4
Software for maintaining an on-the-fly-encrypted volume. Data is automatically encrypted right
before it is saved, then decrypted right after it is loaded, all w/o user intervention.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 5
John works as a cryptography consultant. He finds that people often misunderstand the reality of
breaking a cipher. What is the definition of breaking a cipher?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 6
A non-secret binary vector used as the initializing input algorithm for encryption of a plaintext block
sequence to increase security by introducing additional cryptographic variance.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 7
Which one of the following are characteristics of a hash function? (Choose two)
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 8
The most widely used digital certificate standard. First issued July 3, 1988. It is a digital document that contains a public key signed by the trusted third party, which is known as a Certificate Authority, or CA. Relied on by S/MIME. Contains your name, info about you, and a signature of a person who issued the certificate.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 9
If you wished to see a list of revoked certificates from a CA, where would you look?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 10
Ferris has been assigned the task of selecting security for his company's wireless network. It is
important that he pick the strongest form of wireless security. Which one of the following is the
strongest wireless security?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 1 of 20 · Page 1 / 2