Part 4

Part 4

University

15 Qs

quiz-placeholder

Similar activities

Unit 2.4 E3

Unit 2.4 E3

University

20 Qs

YAY! Fridate with ComSSA (Network 101)

YAY! Fridate with ComSSA (Network 101)

University

20 Qs

HOSPM 2100 QUIZ 1

HOSPM 2100 QUIZ 1

University

10 Qs

International Women's Day

International Women's Day

5th Grade - University

20 Qs

PNM U-PUSTAKA

PNM U-PUSTAKA

University

10 Qs

Elasticity

Elasticity

University

11 Qs

Past continuous or past simple

Past continuous or past simple

10th Grade - University

10 Qs

ECO120 CHAPTER 5

ECO120 CHAPTER 5

University

14 Qs

Part 4

Part 4

Assessment

Quiz

Education

University

Practice Problem

Easy

Created by

Ari Ari

Used 23+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do modern cryptographers defend against brute-force attacks?

Use statistical analysis to eliminate the most common encryption keys.

Use a keyspace large enough that it takes too much money and too much time to conduct a successful attack.

Use an algorithm that requires the attacker to have both ciphertext and plaintext to conduct a successful attack.

Use frequency analysis to ensure that the most popular letters used in the language are not used in the cipher message.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does a Caesar cipher work on a message?

Words of the message are substituted based on a predetermined pattern

Letters of the message are rearranged based on a predetermined pattern

Letters of the message are rearranged randomly.

Letters of the message are replaced by another letter that is a set number of places away in the alphabet.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main factor that ensures the security of encryption of modern algorithms?

complexity of the hashing algorithm

the use of 3DES over AES

secrecy of the keys

secrecy of the algorithm

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the next step in the establishment of an IPsec VPN after IKE Phase 1 is complete?

authentication of peers

detection of interesting traffic

negotiation of the IPsec SA policy

negotiation of the ISAKMP policy

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Refer to the exhibit. What algorithm will be used for providing confidentiality?

RSA

Diffie-Hellman

DES

AES

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of this command?

"crypto ipsec transform-set MYSET esp-aes 256 esp-md5-hmac"

It establishes the set of encryption and hashing algorithms used to secure the data sent through an IPsec tunnel.

It defines the default ISAKMP policy list used to establish the IKE Phase 1 tunnel.

It establishes the criteria to force the IKE Phase 1 negotiations to begin.

It indicates that IKE will be used to establish the IPsec tunnel for protecting the traffic.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which algorithm can ensure data integrity?

PKI

MD5

AES

RSA

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Education