0 out of 3.704 points
Public-key encryption is based on a ____.
Selected Answer:
d.
key
Answers:
a. message authentication code (MAC)
b. certificate c. hash value
d. key Question 2
3.704 out of 3.704 points
Which symmetric encryption cryptosystems was developed to replace both DES and 3DES?
Selected Answer:
b.
AES
Answers:
a.
WEP
b.
AES
c.
DES
d.
RSA
Question 3
3.704 out of 3.704 points
Hash ____ are mathematical functions that create a hash value, also known as a message digest, by converting variable-length messages into a single fixed-length value.
Selected Answer:
b.
algorithms
Answers:
a. keys b. algorithms c. digests d. codes Question 4
3.704 out of 3.704 points
____ is an open-source protocol framework for security development within the TCP/IP family of protocol standards.
Selected Answer:
a.
IPSec
Answers:
a.
IPSec
b.
SSH
c.
RSA
d.
SSL
Question 5
3.704 out of 3.704 points
Digital signatures are encrypted messages that can be mathematically proven authentic.
Selected Answer:
True
Answers:
True
False
Question 6
3.704 out of 3.704 points
Where is information most vulnerable?
Selected Answer:
a.
When it is outside the organization’s systems
Answers:
a.
When it is outside the organization’s systems
b.
When it is inside the organization’s systems
c.
When it is being saved on a backup tape inside the organization’s systems
d.
When it is being saved to a Microsoft product inside the organization’s systems
Question 7
3.704 out of 3.704 points
In modulo 26, what happens if a number is larger than 26?
Selected Answer:
c.
Twenty-six is sequentially subtracted from it until the number is in the proper range.
Answers:
a.
The result is 26.
b.
An error occurs and the operation stops.
c.
Twenty-six is sequentially subtracted from it until the number is in the proper range.
d.
Twenty-six is repeatedly divided into the