You are on page 1of 1

 Library Schedule Certifications ATC Academic Partner Program Fast Track Workshops  

 FCF - Technical Introduction to Cybersecurity 1.0 Self-Paced


 FCF - Technical
Introduction to
Cybersecurity 1.0 Self- Started on Monday, April 22, 2024, 9:19 PM
Paced State Finished
Completed on Monday, April 22, 2024, 9:28 PM
 Dashboard Time taken 8 mins 16 secs
Points 10/10
 Achievements Grade 100 out of 100
Feedback Congratulations, you passed!
 Library

 Schedule Question 1 Identify three cipher method types. (Choose three.)


Correct

1 points out of 1 Select one or more:


Flag question Abacus
Substitution
Transpositional
Bletchley Park
One-time pad

Question 2 Which two features are characteristics of hashing? (Choose two.)


Correct

1 points out of 1 Select one or more:


Flag question Obfuscation data process
Fixed-length output value
Random output value
Non-reversible process

Question 3 Identify two symmetric algorithms. (Choose two.)


Correct

1 points out of 1 Select one or more:


Flag question IDEA
DSA
RSA
AES

Question 4 Which statement best describes hashing?


Correct

1 points out of 1 Select one:


Flag question The process of generating a unique value that can be tied legally to an entity
The process of converting plaintext to ciphertext
The process of converting data of an arbitrary size to a unique value of a fixed size
The art of writing or solving codes

Question 5 Which cipher type is used by computers to encrypt data?


Correct

1 points out of 1 Select one:


Flag question Block-and-tackle
Stream
Hashing
Geyser

Question 6 Which two entities are necessary components of a PKI? (Choose two.)
Correct

1 points out of 1 Select one or more:


Flag question RA
Firewall
Microsoft CAPI
CA

Question 7 What ingredient is added during the BCRYPT key stretching process to increase entropy?
Correct

1 points out of 1 Select one:


Flag question Verification code
MAC
Salt
A static known value

Question 8 During the encryption process, where symmetric and asymmetric cryptography are used, which key is used to encrypt the
Correct session (symmetric) key?
1 points out of 1

Flag question Select one:


The receiver’s public key
The receiver’s private key
The sender’s private key
The sender’s public key

Question 9 Which two security requirements are satisfied by a digital signature? (Choose two.)
Correct

1 points out of 1 Select one or more:


Flag question Confidentiality
Authorization
Data integrity
Authentication

Question 10 Which statement best describes cryptography?


Correct

1 points out of 1 Select one:


Flag question A secure session between a web browser and a web server
A method for ensuring network safety
The study of writing or solving codes
The process of converting plaintext to ciphertext

Start another attempt Back to the course

You are logged in as Paula Monroy (Log out)

You might also like