Professional Documents
Culture Documents
Home / I'm Learning / Cyber Security Essentials / Chapter 4: The Art of Protecting Secrets / Chapter 4 Quiz - Evidence7: PC4.1-PC4.4
!
Course Cyber Security Essentials
Home
$ Question 1 Which three protocols use asymmetric key algorithms? (Choose three.)
Calendar Correct
Select one or more:
Mark 2.00 out of
2.00 Advanced Encryption Standard (AES)
' Secure Shell (SSH) !
Flag
question
Telnet
Question 2 What encryption algorithm uses one key to encrypt data and a different key to decrypt data?
Correct
Select one:
Mark 2.00 out of
2.00 transposition
asymmetric !
Flag
question
symmetric
one-time pad
Question 3 What are three examples of administrative access controls? (Choose three.)
Correct
Select one or more:
Mark 2.00 out of
2.00 guard dogs
' hiring practices !
Flag
question
intrusion detection system (IDS)
encryption
' background checks !
Question 5 What is the term used to describe the science of making and breaking secret codes?
Correct
Select one:
Mark 2.00 out of
cryptology !
2.00
Flag impersonation
question
factorization
jamming
spoofing
Question 6 What is the name of the method in which letters are rearranged to create the ciphertext?
Correct
Select one:
Mark 2.00 out of
transposition !
2.00
substitution
Question 7 Which three processes are examples of logical access controls? (Choose three.)
Correct
Select one or more:
Mark 2.00 out of
2.00 swipe cards to allow access to a restricted area
' intrusion detection system (IDS) to watch for suspicious network activity !
Flag
question
guards to monitor security screens
Question 8 What type of cipher encrypts plaintext one byte or one bit at a time?
Correct
Select one:
Mark 2.00 out of
2.00 enigma
Flag block
question
elliptical
hash
stream !
Question 9 Which three devices represent examples of physical access controls? (Choose three.)
Correct
Select one or more:
Mark 2.00 out of
' video cameras !
2.00
Flag firewalls
question
routers
servers
' locks !
Question 10 What encryption algorithm uses the same pre-shared key to encrypt and decrypt data?
Correct
Select one:
Mark 2.00 out of
symmetric !
2.00
Flag asymmetric
question
hash
one-time pad
Question 11 Which term describes the technology that protects software from unauthorized access or modification?
Correct
Select one:
Mark 2.00 out of
2.00 trademark
Flag copyright
question
access control
watermarking !
Question 12 Which type of cipher is able to encrypt a fixed-length block of plaintext into a 128-bit block of ciphertext at any one time?
Correct
Select one:
Mark 2.00 out of
block !
2.00
Flag stream
question
transform
symmetric
hash
Question 13 Which 128-bit block cipher encryption algorithm does the US government use to protect classified information?
Correct
Select one:
Mark 2.00 out of
2.00 Skipjack
AES !
Flag
question
3DES
Caesar
Vignere
Question 14 Match the description with the correct term. (Not all targets are used.)
Partially correct
Mark 0.50 out of obfuscation discovering that hidden information exists within a graphic file "
2.00
steganography making a message confusing so it is harder to understand "
Flag
question social steganography creating a message that says one thing but means something else to a specific audience !
The correct answer is: obfuscation → making a message confusing so it is harder to understand, steganography → hiding data
within an audio file, social steganography → creating a message that says one thing but means something else to a specific
audience, steganalysis → discovering that hidden information exists within a graphic file
Question 15 A warning banner that lists the negative outcomes of breaking company policy is displayed each time a computer user logs in to the
Correct machine. What type of access control is implemented?
masking
detective
Question 16 Which asymmetric algorithm provides an electronic key exchange method to share the secret key?
Correct
Select one:
Mark 2.00 out of
2.00 RSA
Diffie-Hellman !
Flag
question
WEP
hashing
DES
Question 17 Which two terms are used to describe cipher keys? (Choose two.)
Not answered
Select one or more:
Marked out of
2.00 key length
key space
Question 18 What term is used to describe the technology that replaces sensitive information with a nonsensitive version?
Not answered
Select one:
Marked out of
2.00 masking
Flag hiding
question
whiteout
retracting
blanking
Question 19 What term is used to describe concealing data in another file such as a graphic, audio, or other text file?
Not answered
Select one:
Marked out of
2.00 hiding
Flag masking
question
obfuscation
steganography
Question 20 What cryptographic algorithm is used by the NSA and includes the use of elliptical curves for digital signature generation and key
Not answered exchange?
Marked out of
Select one:
2.00
El-Gamal
Flag
question RSA
AES
ECC
IDEA
Finish review
◀ Research : Think & Share Jump to... Research & Share (5mins) ▶
Quiz navigation
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20