Part 4

Part 4

University

15 Qs

quiz-placeholder

Similar activities

Bob Ross is the Boss Trivia

Bob Ross is the Boss Trivia

KG - Professional Development

20 Qs

Identify Aircraft as Military, Civilian and Cadet​

Identify Aircraft as Military, Civilian and Cadet​

KG - Professional Development

15 Qs

Mastering Data Literacy

Mastering Data Literacy

9th Grade - University

15 Qs

OS Security

OS Security

University

20 Qs

SHRM: Emp &L.relations -->Tech mgmt

SHRM: Emp &L.relations -->Tech mgmt

University

20 Qs

comp

comp

University

20 Qs

testing

testing

University

10 Qs

DBM Module 4

DBM Module 4

University

10 Qs

Part 4

Part 4

Assessment

Quiz

Education

University

Easy

Created by

Ari Ari

Used 23+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do modern cryptographers defend against brute-force attacks?

Use statistical analysis to eliminate the most common encryption keys.

Use a keyspace large enough that it takes too much money and too much time to conduct a successful attack.

Use an algorithm that requires the attacker to have both ciphertext and plaintext to conduct a successful attack.

Use frequency analysis to ensure that the most popular letters used in the language are not used in the cipher message.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does a Caesar cipher work on a message?

Words of the message are substituted based on a predetermined pattern

Letters of the message are rearranged based on a predetermined pattern

Letters of the message are rearranged randomly.

Letters of the message are replaced by another letter that is a set number of places away in the alphabet.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main factor that ensures the security of encryption of modern algorithms?

complexity of the hashing algorithm

the use of 3DES over AES

secrecy of the keys

secrecy of the algorithm

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the next step in the establishment of an IPsec VPN after IKE Phase 1 is complete?

authentication of peers

detection of interesting traffic

negotiation of the IPsec SA policy

negotiation of the ISAKMP policy

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Refer to the exhibit. What algorithm will be used for providing confidentiality?

RSA

Diffie-Hellman

DES

AES

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of this command?

"crypto ipsec transform-set MYSET esp-aes 256 esp-md5-hmac"

It establishes the set of encryption and hashing algorithms used to secure the data sent through an IPsec tunnel.

It defines the default ISAKMP policy list used to establish the IKE Phase 1 tunnel.

It establishes the criteria to force the IKE Phase 1 negotiations to begin.

It indicates that IKE will be used to establish the IPsec tunnel for protecting the traffic.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which algorithm can ensure data integrity?

PKI

MD5

AES

RSA

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?