Part 4
Quiz
•
Education
•
University
•
Practice Problem
•
Easy
Ari Ari
Used 23+ times
FREE Resource
Enhance your content in a minute
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How do modern cryptographers defend against brute-force attacks?
Use statistical analysis to eliminate the most common encryption keys.
Use a keyspace large enough that it takes too much money and too much time to conduct a successful attack.
Use an algorithm that requires the attacker to have both ciphertext and plaintext to conduct a successful attack.
Use frequency analysis to ensure that the most popular letters used in the language are not used in the cipher message.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does a Caesar cipher work on a message?
Words of the message are substituted based on a predetermined pattern
Letters of the message are rearranged based on a predetermined pattern
Letters of the message are rearranged randomly.
Letters of the message are replaced by another letter that is a set number of places away in the alphabet.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main factor that ensures the security of encryption of modern algorithms?
complexity of the hashing algorithm
the use of 3DES over AES
secrecy of the keys
secrecy of the algorithm
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the next step in the establishment of an IPsec VPN after IKE Phase 1 is complete?
authentication of peers
detection of interesting traffic
negotiation of the IPsec SA policy
negotiation of the ISAKMP policy
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Refer to the exhibit. What algorithm will be used for providing confidentiality?
RSA
Diffie-Hellman
DES
AES
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of this command?
"crypto ipsec transform-set MYSET esp-aes 256 esp-md5-hmac"
It establishes the set of encryption and hashing algorithms used to secure the data sent through an IPsec tunnel.
It defines the default ISAKMP policy list used to establish the IKE Phase 1 tunnel.
It establishes the criteria to force the IKE Phase 1 negotiations to begin.
It indicates that IKE will be used to establish the IPsec tunnel for protecting the traffic.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which algorithm can ensure data integrity?
PKI
MD5
AES
RSA
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Quiz IAS 16
Quiz
•
University
20 questions
Module 8: State and Non-state Institutions
Quiz
•
11th Grade - University
15 questions
Nanti
Quiz
•
University
20 questions
EDUC102_Media Literacy
Quiz
•
University
20 questions
REVISION CHAPTER 8 & 9
Quiz
•
3rd Grade - University
10 questions
VCS quiz 1
Quiz
•
University
13 questions
CA 05
Quiz
•
3rd Grade - University
10 questions
Service Marketing
Quiz
•
University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade
