
Security+ Cryptography Quiz
Authored by Kyle Atkins
Computers
University
Used 6+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
45 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following illustrate the security through obscurity concept?
Choose all that apply.
Code obfuscation
Steganography
SSID broadcast suppression
Encryption
Substitution ciphers
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following refers to a solution designed to strengthen the security if session keys?
ECB
PFS
EFS
PFX
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In cryptography, the term "key stretching" refers to a mechanism for extending the length of a cryptographic key to make it more secure against brute-force attacks.
True
False
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these three states of digital data requires data to be processed in an unencrypted form?
Data-in-transit
Data-at-rest
Data-in-use
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In cryptography, "secret algorithm" refers to an algorithm designed in a way that prevents the examination of its inner workings.
True
False
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
"Ephemeral key" refers to an asymmetric encryption key designed to be used only for the duration of a single session or transaction.
True
False
7.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
What are the characteristics of a session key?
Choose all that apply.
Used during a single session
Asymmetric key
Reused during multiple sessions
Symmetric key
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?