
CIT 270 Chapter 4 quiz questions
Authored by Rekk Wave
Computers
11th - 12th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a method for strengthening a key?
Randomness
Cryptoperiod
Length
Variability
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following block ciphers XORs each block of plaintext with the previous block of ciphertext before being encrypted?
Electronic Code Book (ECB)
Galois/Counter (GCM)
Counter (CTR)
Cipher Block Chaining (CBC)
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What entity calls in crypto modules to perform cryptographic tasks?
Certificate Authority (CA)
OCSP Chain
Intermediate CA
Crypto service provider
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following are symmetric keys to encrypt and decrypt information exchanged during the session and to verify its integrity?
Encrypted signatures
Session keys
Digital certificates
Digital digests
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these is considered the strongest cryptographic transport protocol?
TLS v1.2
TLS v1.0
SSL v2.0
SSL v3.0
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the strongest technology that would assure Alice that Bob is the sender of a message?
Digital signature
Encrypted signature
Digest
Digital certificate
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does a digital certificate associate?
A user's public key with his private key
A user's identity with his public key
The user's private key with the public key
A private key with a digital signature
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?