- •15. Which type of encryption occurs between original source and final destination?
- •Verses 26 for a monoalphabetic
- •45. What key length does aes not support?
- •Internet Security
- •56. The Caesar Cipher is an example of what kind of cipher?
- •Violates computer security for little reason beyond maliciousness or for personal gain
- •78. Which of the following is a disadvantage of asymmetric cryptology?
- •83. Which of the following is a disadvantage of asymmetric cryptology?
- •89. Which of the following allows attackers to break passwords?
- •90. What is Denial of Service in Threat Modeling?
- •116. Centralized access control provides remote users with all of the following properties except
- •117. What are three principals of identification and authentication?
- •120. Which of the following is a knowledge-based authentication mechanism?
- •135. Exploits known flaws in network systems
- •Vigenere cipher
- •Vulnerability
- •192. Which term relates specifically to the art and science of code breaking?
- •194. Which of the following is a disadvantage of asymmetric cryptology?
- •Is a system in which a private key generated randomly is used only once to encrypt a message that is then decrypted by the receiver using a matching one-time pad and key.
Vulnerability
177. a means to bind information to an entity. .
Signature
178. You should ______ your computer when not in use
Shutdown.
179. Corroborating thesource of information; also known as data origin authentication
Message authentication
180. You should never open a ______ without being sure of what it is / does first
Executable File.
181. If you must execute a file you don't know about, it is best to ______ first
Scan It For Malicious Code.
182. endorsement of information by a trusted entity.
Certification:
183. A ______ application monitors all incoming and outgoing network traffic and blocks unauthorized packets from getting through
Personal Firewall
184. ______ software blocks known viruses, worms, Trojans and other malicious code by comparing it with signatures of known malware
Antivirus
185. The Digital Signature Standard specifies all of the following as valid algorithms for creating digital signatures except:
MAC
186. Preventing the denial of previous commitments or actions.
Non-repudiation
187. Acknowledgement thatservices have been provided.
Confirmation
188. Verifying the creationor existence of information by an entity other than the creator.
Witnessing
189. _____ This is a private data network that makes use of the public telecommunication infrastructure, maintaining privacy through the use of a tunneling protocol and security procedures.
VPN
190. conveyance, to anotherentity, of official sanction to do or be something.
Authorisation
191. recording the time ofcreation or existence of information.
Timestamping:
192. Which term relates specifically to the art and science of code breaking?
Cryptology
193. The Digital Signature Algorithm implements a modified version of which algorithm that is based on discrete logarithms in a finite field?
elliptic curve discrete logarithm problem" or ECDLP.
194. Which of the following is a disadvantage of asymmetric cryptology?
Slower than symmetric cryptology.
Long key slow speed
195. Which of the following One Time Pad?
