Part 4

Quiz
•
Education
•
University
•
Easy
Ari Ari
Used 23+ times
FREE Resource
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How do modern cryptographers defend against brute-force attacks?
Use statistical analysis to eliminate the most common encryption keys.
Use a keyspace large enough that it takes too much money and too much time to conduct a successful attack.
Use an algorithm that requires the attacker to have both ciphertext and plaintext to conduct a successful attack.
Use frequency analysis to ensure that the most popular letters used in the language are not used in the cipher message.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does a Caesar cipher work on a message?
Words of the message are substituted based on a predetermined pattern
Letters of the message are rearranged based on a predetermined pattern
Letters of the message are rearranged randomly.
Letters of the message are replaced by another letter that is a set number of places away in the alphabet.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main factor that ensures the security of encryption of modern algorithms?
complexity of the hashing algorithm
the use of 3DES over AES
secrecy of the keys
secrecy of the algorithm
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the next step in the establishment of an IPsec VPN after IKE Phase 1 is complete?
authentication of peers
detection of interesting traffic
negotiation of the IPsec SA policy
negotiation of the ISAKMP policy
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Refer to the exhibit. What algorithm will be used for providing confidentiality?
RSA
Diffie-Hellman
DES
AES
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of this command?
"crypto ipsec transform-set MYSET esp-aes 256 esp-md5-hmac"
It establishes the set of encryption and hashing algorithms used to secure the data sent through an IPsec tunnel.
It defines the default ISAKMP policy list used to establish the IKE Phase 1 tunnel.
It establishes the criteria to force the IKE Phase 1 negotiations to begin.
It indicates that IKE will be used to establish the IPsec tunnel for protecting the traffic.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which algorithm can ensure data integrity?
PKI
MD5
AES
RSA
Create a free account and access millions of resources
Similar Resources on Wayground
10 questions
iRakshak

Quiz
•
University
10 questions
Morfología flexiva

Quiz
•
University
15 questions
Software Theft and Security Quiz

Quiz
•
University
20 questions
129-149

Quiz
•
University
20 questions
Theological Records Management Quiz

Quiz
•
12th Grade - University
10 questions
IoTRIX

Quiz
•
University
18 questions
BCS Network Security Test 4

Quiz
•
University
15 questions
Part 1 CCNA

Quiz
•
University
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade