Correct Answer
verified
View Answer
Multiple Choice
A) Advanced Encryption Standard (AES)
B) Block cipher
C) Ciphertext
D) Data Encryption Standard (DES)
E) Diffie-Hellman (DH)
F) Elliptic curve cryptography (ECC)
G) Ephemeral key
H) Private key
I) Public key
J) Stream cipher
Correct Answer
verified
Multiple Choice
A) Substitution
B) Block
C) Loop
D) Sponge
Correct Answer
verified
Multiple Choice
A) Symmetric
B) Asymmetric
C) Shared
D) Open
Correct Answer
verified
Multiple Choice
A) Advanced Encryption Standard (AES)
B) Block cipher
C) Ciphertext
D) Data Encryption Standard (DES)
E) Diffie-Hellman (DH)
F) Elliptic curve cryptography (ECC)
G) Ephemeral key
H) Private key
I) Public key
J) Stream cipher
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) 96 bits
B) 128 bits
C) 160 bits
D) 192 bits
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) Advanced Encryption Standard (AES)
B) Block cipher
C) Ciphertext
D) Data Encryption Standard (DES)
E) Diffie-Hellman (DH)
F) Elliptic curve cryptography (ECC)
G) Ephemeral key
H) Private key
I) Public key
J) Stream cipher
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) private key
B) public key
C) symmetric key
D) shared key
Correct Answer
verified
Multiple Choice
A) Each alphabetic letter was replaced by a corresponding number
B) Each alphabetic letter was represented by a seemingly random symbol
C) Each alphabetic letter was shifted three places down in the alphabet
D) Each alphabetic letter was shifted 5 places up in the alphabet.
Correct Answer
verified
Multiple Choice
A) FCC
B) RSA
C) ECC
D) IKE
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) AES
B) Twofish
C) 3DES
D) RSA
Correct Answer
verified
Multiple Choice
A) 32 bits
B) 64 bits
C) 128 bits
D) 512 bits
Correct Answer
verified
Multiple Choice
A) AES
B) RSA
C) Twofish
D) Blowfish
Correct Answer
verified
Multiple Choice
A) Verification of the sender
B) Prevention of the sender from disowning the message
C) Prove the integrity of the message
D) Protect the public key
Correct Answer
verified
Multiple Choice
A) Advanced Encryption Standard (AES)
B) Block cipher
C) Ciphertext
D) Data Encryption Standard (DES)
E) Diffie-Hellman (DH)
F) Elliptic curve cryptography (ECC)
G) Ephemeral key
H) Private key
I) Public key
J) Stream cipher
Correct Answer
verified
Short Answer
Correct Answer
verified
Showing 21 - 40 of 50
Related Exams