Part 4

Quiz
•
Education
•
University
•
Easy
Ari Ari
Used 23+ times
FREE Resource
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How do modern cryptographers defend against brute-force attacks?
Use statistical analysis to eliminate the most common encryption keys.
Use a keyspace large enough that it takes too much money and too much time to conduct a successful attack.
Use an algorithm that requires the attacker to have both ciphertext and plaintext to conduct a successful attack.
Use frequency analysis to ensure that the most popular letters used in the language are not used in the cipher message.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does a Caesar cipher work on a message?
Words of the message are substituted based on a predetermined pattern
Letters of the message are rearranged based on a predetermined pattern
Letters of the message are rearranged randomly.
Letters of the message are replaced by another letter that is a set number of places away in the alphabet.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main factor that ensures the security of encryption of modern algorithms?
complexity of the hashing algorithm
the use of 3DES over AES
secrecy of the keys
secrecy of the algorithm
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the next step in the establishment of an IPsec VPN after IKE Phase 1 is complete?
authentication of peers
detection of interesting traffic
negotiation of the IPsec SA policy
negotiation of the ISAKMP policy
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Refer to the exhibit. What algorithm will be used for providing confidentiality?
RSA
Diffie-Hellman
DES
AES
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of this command?
"crypto ipsec transform-set MYSET esp-aes 256 esp-md5-hmac"
It establishes the set of encryption and hashing algorithms used to secure the data sent through an IPsec tunnel.
It defines the default ISAKMP policy list used to establish the IKE Phase 1 tunnel.
It establishes the criteria to force the IKE Phase 1 negotiations to begin.
It indicates that IKE will be used to establish the IPsec tunnel for protecting the traffic.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which algorithm can ensure data integrity?
PKI
MD5
AES
RSA
Create a free account and access millions of resources
Similar Resources on Wayground
10 questions
Brakes for beginners!

Quiz
•
5th Grade - University
15 questions
BlockCipher-AES

Quiz
•
University
11 questions
SoS The story message-Introductions

Quiz
•
University
15 questions
Comparison and Contrast Essay

Quiz
•
University
20 questions
Taxation

Quiz
•
University
10 questions
Therapeutic Communication

Quiz
•
University
20 questions
Automotive Electronics

Quiz
•
University
11 questions
NCLEX Cardiac Questions

Quiz
•
University - Professi...
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Education
10 questions
Would you rather...

Quiz
•
KG - University
20 questions
Definite and Indefinite Articles in Spanish (Avancemos)

Quiz
•
8th Grade - University
7 questions
Force and Motion

Interactive video
•
4th Grade - University
10 questions
The Constitution, the Articles, and Federalism Crash Course US History

Interactive video
•
11th Grade - University
7 questions
Figurative Language: Idioms, Similes, and Metaphors

Interactive video
•
4th Grade - University
20 questions
Levels of Measurements

Quiz
•
11th Grade - University
16 questions
Water Modeling Activity

Lesson
•
11th Grade - University
10 questions
ACT English prep

Quiz
•
9th Grade - University