Security+ Chapter 11
Start
Congratulations - you have completed Security+ Chapter 11.
You scored %%SCORE%% out of %%TOTAL%%.
Your answers are highlighted below.
Question 1 |
What is a one-way function used to represent data?
A | Symmetric cryptography |
B | Asymmetric cryptography |
C | Hash |
D | Biometric cryptography |
Question 2 |
All of the following are characteristics of secure hashes except:
A | It should be impossible to produce a dataset from a hash |
B | The ciphertext hash is a fixed size |
C | Two different sets of data cannot produce the same hash |
D | The resulting ciphertext hash can be reversed |
Question 3 |
Which symmetric algorithm is the most processor efficient?
A | MD5 |
B | AES |
C | 3DES |
D | RSA |
Question 4 |
What is the effective key length of DES?
A | 256bit |
B | 168bit |
C | 56bit |
D | 64bit |
Question 5 |
Symmetric cryptography can provide non-repudiation
A | True |
B | False |
Question 6 |
A chip on your motherboard that provides cryptographic services and can include a true random number generator is:
A | Trusted platform module |
B | ROM |
C | RAM |
D | Installed security appliance (ISA) |
Question 7 |
What are the respective bit lengths of MD5 and SHA1?
A | 1024 and 2048 |
B | 256 and 512 |
C | 128 and 160 |
D | 128 and 256 |
Question 8 |
What is the purpose of a digital signature?
A | Confidentiality and authentication |
B | Integrity and confidentiality |
C | Confidentiality and encryption |
D | Integrity and non-repudiation |
Question 9 |
Which of the following are a stream cipher?
A | SHA1 |
B | AES |
C | RC4 |
D | MD5 |
Question 10 |
If Bob wants to send Alice an encrypted e-mail, whose key should be use and which one?
A | Alice's public key |
B | Alice's private key |
C | Bob's private key |
D | Bob's public key |
Question 11 |
The science of transforming information into an unintelligible form while it is being transmitted or stored so that unauthorized users cannot access it is
A | Cryptography |
B | Morphation |
C | Translationism |
D | Steganography |
Question 12 |
What is the term for the inability of someone to claim they did not send information?
A | Availability |
B | Non-repudiation |
C | Integrity |
D | Authenticity |
Once you are finished, click the button below. Any items you have not completed will be marked incorrect.
Get Results
There are 12 questions to complete.
You have completed
questions
question
Your score is
Correct
Wrong
Partial-Credit
You have not finished your quiz. If you leave this page, your progress will be lost.
Correct Answer
You Selected
Not Attempted
Final Score on Quiz
Attempted Questions Correct
Attempted Questions Wrong
Questions Not Attempted
Total Questions on Quiz
Question Details
Results
Date
Score
Hint
Time allowed
minutes
seconds
Time used
Answer Choice(s) Selected
Question Text
All done
Need more practice!
Keep trying!
Not bad!
Good work!
Perfect!