FCF - Technical Introduction to Cybersecurity 1.0 Self-Paced 

I'm sorry, you did not pass.

Which statement best describes cryptography?

Select one:

A method for ensuring network safety

The study of writing or solving codes

A secure session between a web browser and a web server

The process of converting plaintext to ciphertext

In a PKI, what is the ultimate source of trust?

Select one:

The registration authority

Local municipal laws in which the CA resides

PKI policy and procedures

The private key of the root CA

Which cipher type is used by computers to encrypt data?

Select one:

Stream

Geyser

Block-and-tackle

Hashing

Which two entities are necessary components of a PKI? (Choose two.)

Select one or more:

Microsoft CAPI

RA

Firewall

CA

Question

5

Incorrect

0 points out of 1

Question

6

Correct

1 points out of 1

Question

7

Correct

1 points out of 1

Question

8

Correct

1 points out of 1

Question

9

Incorrect

0 points out of 1

Which security requirement does encryption satisfy?

Select one:

Authentication

Data integrity

Non-repudiation

Confidentiality

What ingredient is added during the BCRYPT key stretching process to increase entropy?

Select one:

Salt

Verification code

MAC

A static known value

Which statement best describes hashing?

Select one:

The process of converting plaintext to ciphertext

The process of converting data of an arbitrary size to a unique value of a fixed size

The process of generating a unique value that can be tied legally to an entity

The art of writing or solving codes

During the encryption process, where symmetric and asymmetric cryptography are used, which key is used to encrypt the

session (symmetric) key?

Select one:

The receiver’s private key

The receiver’s public key

The sender’s private key

The sender’s public key

Which two security requirements are satisfied by a digital signature? (Choose two.)

Select one or more:

Authorization

Authentication

Confidentiality

Data integrity


Cybersecurity.pdf

Unit 9 Assignment 1: Chapter 13 Assessment

1.

PKI is also known as public key encryption.

(B) False

2.

Which of the following is an encryption key size length commonly used with

public key algorithms?

2,048

3.

Which of the following are examples of symmetric algorithms? (Select two)

(B) 3DES

(C) AES

4.

Which of the following are examples of asymmetric algorithms? (Select two)

(A)

RSA

(D) Diffie-Hellman

5.

Asymmetric encryption is faster than symmetric encryption.

(B)

False

6.

A symmetric encryption algorithm provides which security services? (Select

three)

(A)

Confidentiality

(C)

Authentication

(E)

Non-repudiation

7.

The RSA key length is 2,048

.

8.

Which of the following is the standard for certificates?

(C)

X.509

9.

Which of the following terms is the range of values that construct a cryptosystem

key?

(C)

Keyspace

10.

Digital signatures provide which of the following? (Select two)

(B)

Integrity

(C)

Authentication