Thanks for Visiting my channel
FCF - Technical Introduction to Cybersecurity 1.0 Self-Paced
I'm sorry, you did not pass.
Which statement best describes cryptography?
Select one:
A method for ensuring network safety
The study of writing or solving codes
A secure session between a web browser and a web server
The process of converting plaintext to ciphertext
In a PKI, what is the ultimate source of trust?
Select one:
The registration authority
Local municipal laws in which the CA resides
PKI policy and procedures
The private key of the root CA
Which cipher type is used by computers to encrypt data?
Select one:
Stream
Geyser
Block-and-tackle
Hashing
Which two entities are necessary components of a PKI? (Choose two.)
Select one or more:
Microsoft CAPI
RA
Firewall
CA
Question
5
Incorrect
0 points out of 1
Question
6
Correct
1 points out of 1
Question
7
Correct
1 points out of 1
Question
8
Correct
1 points out of 1
Question
9
Incorrect
0 points out of 1
Which security requirement does encryption satisfy?
Select one:
Authentication
Data integrity
Non-repudiation
Confidentiality
What ingredient is added during the BCRYPT key stretching process to increase entropy?
Select one:
Salt
Verification code
MAC
A static known value
Which statement best describes hashing?
Select one:
The process of converting plaintext to ciphertext
The process of converting data of an arbitrary size to a unique value of a fixed size
The process of generating a unique value that can be tied legally to an entity
The art of writing or solving codes
During the encryption process, where symmetric and asymmetric cryptography are used, which key is used to encrypt the
session (symmetric) key?
Select one:
The receiver’s private key
The receiver’s public key
The sender’s private key
The sender’s public key
Which two security requirements are satisfied by a digital signature? (Choose two.)
Select one or more:
Authorization
Authentication
Confidentiality
Data integrity
Unit 9 Assignment 1: Chapter 13 Assessment
1.
PKI is also known as public key encryption.
(B) False
2.
Which of the following is an encryption key size length commonly used with
public key algorithms?
2,048
3.
Which of the following are examples of symmetric algorithms? (Select two)
(B) 3DES
(C) AES
4.
Which of the following are examples of asymmetric algorithms? (Select two)
(A)
RSA
(D) Diffie-Hellman
5.
Asymmetric encryption is faster than symmetric encryption.
(B)
False
6.
A symmetric encryption algorithm provides which security services? (Select
three)
(A)
Confidentiality
(C)
Authentication
(E)
Non-repudiation
7.
The RSA key length is 2,048
.
8.
Which of the following is the standard for certificates?
(C)
X.509
9.
Which of the following terms is the range of values that construct a cryptosystem
key?
(C)
Keyspace
10.
Digital signatures provide which of the following? (Select two)
(B)
Integrity
(C)
Authentication
No comments:
Post a Comment