Deck 16: Cryptography

ملء الشاشة (f)
exit full mode
سؤال
Which of the following organizations is responsible for issuing and maintaining digital certificates?

A)Certification Authority
B)Certificate Company
C)Certificate Storage
D)Certificate Agency
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
John wants to check the validity of a digital certificate. Which of the following should he use?

A)Trust model
B)Certificate policy
C)Key escrow
D)Certificate revocation list
سؤال
What is the block size of the SHA-1 algorithm?

A)256 bits
B)64 bits
C)512 bits
D)128 bits
سؤال
Which of the following Symmetric Algorithms uses a key size of up to 2,040 bits?

A)Blowfish
B)RC5
C)IDEA
D)CAST
سؤال
David wants to use symmetric-key encryption to encrypt and decrypt data. How many keys will he need?

A)3
B)4
C)2
D)1
سؤال
What is the block size used by the Blowfish algorithm?

A)64 bits
B)100 bits
C)128 bits
D)150 bits
سؤال
Which of the following standards does S/MIME use?

A)PKCS #7
B)PKCS#4
C)TLS
D)X)509
سؤال
Which of the following can PGP not encrypt?

A)Full Disk
B)Individual File
C)E-mails
D)Hard copies
سؤال
What is a hardware based encryption device that stores keys that protect information called?

A)TPM
B)DMZ
C)SLP
D)TFTP
سؤال
A simple way to secure hardware, such as laptops and PCs, with a key or combination would be:

A)Padlock
B)Cable Locks
C)Key pad
D)Rope
سؤال
What is a company that can authorize the issuing of Digital Certificates called?

A)Certificate Authority
B)Certificate Assigner
C)Certificate Headquarter
D)Certificate Distributer
سؤال
What is used for encrypting and decrypting disk partitions, e-mails, files and other data that use hashing, symmetric cryptography and public key cryptography?

A)TFTP
B)HTTPS
C)PGP
D)SSH
سؤال
A way of concealing messages from even being seen except from the sender and receiver is:

A)Cryptography
B)Steganography
C)Hiding
D)Concealment
سؤال
What kind of trust model is in place when a CA is both the root and subordinate as is every other CA in the organization?

A)Hybrid Trust
B)Rooted Trust
C)User Trust
D)Network Trust
سؤال
Which Cryptographic hash function uses a 128-bit hash and is not collision resistant?

A)SHA
B)AES
C)MD5
D)3DES
سؤال
What is a digital signature?

A)A png of someone's signature.
B)A Cryptographic way of remotely signing a document.
C)A mathematical way of verifying the authenticity of a document.
D)A way to protect the user from themselves.
سؤال
What was the first IEEE encryption standard for 802.11 wireless communications?

A)WPA
B)WEP
C)WPA2
D)CHAP
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/17
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 16: Cryptography
1
Which of the following organizations is responsible for issuing and maintaining digital certificates?

A)Certification Authority
B)Certificate Company
C)Certificate Storage
D)Certificate Agency
Certification Authority
2
John wants to check the validity of a digital certificate. Which of the following should he use?

A)Trust model
B)Certificate policy
C)Key escrow
D)Certificate revocation list
Certificate revocation list
3
What is the block size of the SHA-1 algorithm?

A)256 bits
B)64 bits
C)512 bits
D)128 bits
512 bits
4
Which of the following Symmetric Algorithms uses a key size of up to 2,040 bits?

A)Blowfish
B)RC5
C)IDEA
D)CAST
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
5
David wants to use symmetric-key encryption to encrypt and decrypt data. How many keys will he need?

A)3
B)4
C)2
D)1
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
6
What is the block size used by the Blowfish algorithm?

A)64 bits
B)100 bits
C)128 bits
D)150 bits
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following standards does S/MIME use?

A)PKCS #7
B)PKCS#4
C)TLS
D)X)509
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following can PGP not encrypt?

A)Full Disk
B)Individual File
C)E-mails
D)Hard copies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
9
What is a hardware based encryption device that stores keys that protect information called?

A)TPM
B)DMZ
C)SLP
D)TFTP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
10
A simple way to secure hardware, such as laptops and PCs, with a key or combination would be:

A)Padlock
B)Cable Locks
C)Key pad
D)Rope
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
11
What is a company that can authorize the issuing of Digital Certificates called?

A)Certificate Authority
B)Certificate Assigner
C)Certificate Headquarter
D)Certificate Distributer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
12
What is used for encrypting and decrypting disk partitions, e-mails, files and other data that use hashing, symmetric cryptography and public key cryptography?

A)TFTP
B)HTTPS
C)PGP
D)SSH
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
13
A way of concealing messages from even being seen except from the sender and receiver is:

A)Cryptography
B)Steganography
C)Hiding
D)Concealment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
14
What kind of trust model is in place when a CA is both the root and subordinate as is every other CA in the organization?

A)Hybrid Trust
B)Rooted Trust
C)User Trust
D)Network Trust
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which Cryptographic hash function uses a 128-bit hash and is not collision resistant?

A)SHA
B)AES
C)MD5
D)3DES
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
16
What is a digital signature?

A)A png of someone's signature.
B)A Cryptographic way of remotely signing a document.
C)A mathematical way of verifying the authenticity of a document.
D)A way to protect the user from themselves.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
17
What was the first IEEE encryption standard for 802.11 wireless communications?

A)WPA
B)WEP
C)WPA2
D)CHAP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.