How do modern cryptographers defend against brute-force attacks?
Part 4

Quiz
•
Education
•
University
•
Easy
Ari Ari
Used 23+ times
FREE Resource
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Use statistical analysis to eliminate the most common encryption keys.
Use a keyspace large enough that it takes too much money and too much time to conduct a successful attack.
Use an algorithm that requires the attacker to have both ciphertext and plaintext to conduct a successful attack.
Use frequency analysis to ensure that the most popular letters used in the language are not used in the cipher message.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does a Caesar cipher work on a message?
Words of the message are substituted based on a predetermined pattern
Letters of the message are rearranged based on a predetermined pattern
Letters of the message are rearranged randomly.
Letters of the message are replaced by another letter that is a set number of places away in the alphabet.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main factor that ensures the security of encryption of modern algorithms?
complexity of the hashing algorithm
the use of 3DES over AES
secrecy of the keys
secrecy of the algorithm
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the next step in the establishment of an IPsec VPN after IKE Phase 1 is complete?
authentication of peers
detection of interesting traffic
negotiation of the IPsec SA policy
negotiation of the ISAKMP policy
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Refer to the exhibit. What algorithm will be used for providing confidentiality?
RSA
Diffie-Hellman
DES
AES
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of this command?
"crypto ipsec transform-set MYSET esp-aes 256 esp-md5-hmac"
It establishes the set of encryption and hashing algorithms used to secure the data sent through an IPsec tunnel.
It defines the default ISAKMP policy list used to establish the IKE Phase 1 tunnel.
It establishes the criteria to force the IKE Phase 1 negotiations to begin.
It indicates that IKE will be used to establish the IPsec tunnel for protecting the traffic.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which algorithm can ensure data integrity?
PKI
MD5
AES
RSA
Create a free account and access millions of resources
Similar Resources on Quizizz
10 questions
Blockchain Quiz

Quiz
•
University
10 questions
Honeypots

Quiz
•
University
20 questions
IEEE QUIZ

Quiz
•
University
15 questions
Marketing Chanakya Round 1

Quiz
•
University
12 questions
data Privacy and Security

Quiz
•
University
10 questions
dasdas

Quiz
•
University
15 questions
BlockCipher-AES

Quiz
•
University
10 questions
Block Chain Quiz

Quiz
•
University
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade