C6 - Quiz

C6 - Quiz

Professional Development

23 Qs

quiz-placeholder

Similar activities

Google Professional Architect 2 - 21 to 40

Google Professional Architect 2 - 21 to 40

Professional Development

20 Qs

CPA MS-Office Hotkeys Quiz

CPA MS-Office Hotkeys Quiz

8th Grade - Professional Development

21 Qs

All New Scoopy 2020

All New Scoopy 2020

Professional Development

20 Qs

Retificação com Diodos

Retificação com Diodos

Professional Development

25 Qs

C7 - Quiz

C7 - Quiz

Professional Development

21 Qs

Understanding Network Infrastructures - Gmetrix study guide

Understanding Network Infrastructures - Gmetrix study guide

11th Grade - Professional Development

26 Qs

Google Professional Architect 5 - 81 to 100

Google Professional Architect 5 - 81 to 100

Professional Development

20 Qs

C6 - Quiz

C6 - Quiz

Assessment

Quiz

Instructional Technology

Professional Development

Easy

Created by

Instructor Instructor

Used 1+ times

FREE Resource

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which requirement of secure communications is ensured by the implementation of MD5 or SHA hash generating algorithms?​


confidentiality


authentication

integrity


nonrepudiation

Answer explanation

  • Integrity is ensured by implementing either MD5 or SHA hash generating algorithms. Many modern networks ensure authentication with protocols, such as HMAC. Data confidentiality is ensured through symmetric encryption algorithms, including DES, 3DES, and AES. Data confidentiality can also be ensured using asymmetric algorithms, including RSA and PKI.​

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is another name for confidentiality of information?


privacy

accuracy

consistency

trustworthiness

Answer explanation

  • Privacy is another name for confidentiality. Accuracy, consistency, and trustworthiness describe integrity of data.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

As data is being stored on a local hard disk, which method would secure the data from unauthorized access?

data encryption

a duplicate hard drive copy

deletion of sensitive files


two factor authentication

Answer explanation

  • Data encryption is the process of converting data into a form where only a trusted, authorized person with a secret key or password can decrypt the data and access the original form.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What popular encryption algorithm requires that both the sender and receiver know a pre-shared key?

PKI

MD5

HMAC

AES

Answer explanation

  • MD5 is a hashing algorithm that guarantees that no one intercepted the message and altered it. Advanced Encryption Standard (AES) is a popular symmetric encryption algorithm where each communicating party needs to know the pre-shared key. Public key infrastructure (PKI) is an asymmetric encryption algorithm based on the assumption that the two communicating parties have not previously shared a secret key. HMAC is a hash message authentication code that guarantees that the message is not a forgery and actually comes from the authentic source.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The following message was encrypted using a Caesar cipher with a key of 2:

fghgpf vjg ecuvng

What is the plaintext message?​


defend the region


invade the castle

defend the castle


invade the region

Answer explanation

  • The Caesar cipher was a simple substitution cipher. In this example, if the key is 2, the letter d was moved two spaces to the right, resulting in an encoded message that used the letter f in place of the letter d . The letter g would be the substitute for the letter e , and so on. So, the resulting plaintext is f= d , g= e , h= f , g= e , p= n , f= d , v= t , j= h , g= e , e= c , c= a , u= s , v= t , n= l , g= e .​

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt


What is an example of the one-time pad cipher?

RC4

Rail Fence

Caesar

Vigenere

Answer explanation

  • RC4 is an example of the one-time pad cipher, and it is widely used on the Internet. The Caesar cipher is a simple substitution cipher, and the Vigenère cipher is based on the Caesar cipher. An example of a transposition cipher is the rail fence cipher.​

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In which method used in cryptanalysis does the attacker know a portion of the plaintext and the corresponding ciphertext?​


brute-force

ciphertext

chosen-plaintext​


meet-in-the-middle

Answer explanation

  • There are several methods used in cryptanalysis:

    • Brute-force - The attacker tries every possible key knowing that eventually one of them will work.

    • Ciphertext - The attacker has the ciphertext of several messages encrypted but no knowledge of the underlying plaintext.

    • Known-Plaintext - The attacker has access to the ciphertext of several messages and knows something about the plaintext underlying that ciphertext.

    • Chosen-Plaintext - The attacker chooses which data the encryption device encrypts and observes the ciphertext output.

    • Chosen-Ciphertext - The attacker can choose different ciphertext to be decrypted and has access to the decrypted plaintext.

    • Meet-in-the-Middle - The attacker knows a portion of the plaintext and the corresponding ciphertext.​

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?