Preview

Guide to Network Security quiz 3

Good Essays
Open Document
Open Document
1195 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Guide to Network Security quiz 3
Question 1
0 out of 3.704 points

Public-key encryption is based on a ____.

Selected Answer:
d.
key
Answers:
a. message authentication code (MAC)

b. certificate c. hash value

d. key Question 2
3.704 out of 3.704 points

Which symmetric encryption cryptosystems was developed to replace both DES and 3DES?

Selected Answer:
b.
AES
Answers:
a.
WEP

b.
AES

c.
DES

d.
RSA

Question 3
3.704 out of 3.704 points

Hash ____ are mathematical functions that create a hash value, also known as a message digest, by converting variable-length messages into a single fixed-length value.

Selected Answer:
b.
algorithms
Answers:
a. keys b. algorithms c. digests d. codes Question 4
3.704 out of 3.704 points

____ is an open-source protocol framework for security development within the TCP/IP family of protocol standards.

Selected Answer:
a.
IPSec
Answers:
a.
IPSec

b.
SSH

c.
RSA

d.
SSL

Question 5
3.704 out of 3.704 points

Digital signatures are encrypted messages that can be mathematically proven authentic.

Selected Answer:
True
Answers:
True

False

Question 6
3.704 out of 3.704 points

Where is information most vulnerable?

Selected Answer:
a.
When it is outside the organization’s systems
Answers:
a.
When it is outside the organization’s systems

b.
When it is inside the organization’s systems

c.
When it is being saved on a backup tape inside the organization’s systems

d.
When it is being saved to a Microsoft product inside the organization’s systems

Question 7
3.704 out of 3.704 points

In modulo 26, what happens if a number is larger than 26?

Selected Answer:
c.
Twenty-six is sequentially subtracted from it until the number is in the proper range.
Answers:
a.
The result is 26.

b.
An error occurs and the operation stops.

c.
Twenty-six is sequentially subtracted from it until the number is in the proper range.

d.
Twenty-six is repeatedly divided into the

You May Also Find These Documents Helpful

Related Topics