Security+ Chapter 11
Start
Congratulations - you have completed Security+ Chapter 11.
You scored %%SCORE%% out of %%TOTAL%%.
Your answers are highlighted below.
Question 1 |
All of the following are characteristics of secure hashes except:
A | The resulting ciphertext hash can be reversed |
B | It should be impossible to produce a dataset from a hash |
C | The ciphertext hash is a fixed size |
D | Two different sets of data cannot produce the same hash |
Question 2 |
The science of transforming information into an unintelligible form while it is being transmitted or stored so that unauthorized users cannot access it is
A | Cryptography |
B | Morphation |
C | Translationism |
D | Steganography |
Question 3 |
What is the effective key length of DES?
A | 56bit |
B | 168bit |
C | 256bit |
D | 64bit |
Question 4 |
Which of the following are a stream cipher?
A | RC4 |
B | SHA1 |
C | AES |
D | MD5 |
Question 5 |
What are the respective bit lengths of MD5 and SHA1?
A | 128 and 256 |
B | 1024 and 2048 |
C | 128 and 160 |
D | 256 and 512 |
Question 6 |
What is a one-way function used to represent data?
A | Symmetric cryptography |
B | Hash |
C | Asymmetric cryptography |
D | Biometric cryptography |
Question 7 |
A chip on your motherboard that provides cryptographic services and can include a true random number generator is:
A | RAM |
B | Trusted platform module |
C | Installed security appliance (ISA) |
D | ROM |
Question 8 |
If Bob wants to send Alice an encrypted e-mail, whose key should be use and which one?
A | Bob's public key |
B | Alice's public key |
C | Alice's private key |
D | Bob's private key |
Question 9 |
Which symmetric algorithm is the most processor efficient?
A | RSA |
B | 3DES |
C | MD5 |
D | AES |
Question 10 |
What is the purpose of a digital signature?
A | Integrity and non-repudiation |
B | Confidentiality and encryption |
C | Integrity and confidentiality |
D | Confidentiality and authentication |
Question 11 |
Symmetric cryptography can provide non-repudiation
A | False |
B | True |
Question 12 |
What is the term for the inability of someone to claim they did not send information?
A | Availability |
B | Authenticity |
C | Integrity |
D | Non-repudiation |
Once you are finished, click the button below. Any items you have not completed will be marked incorrect.
Get Results
There are 12 questions to complete.
You have completed
questions
question
Your score is
Correct
Wrong
Partial-Credit
You have not finished your quiz. If you leave this page, your progress will be lost.
Correct Answer
You Selected
Not Attempted
Final Score on Quiz
Attempted Questions Correct
Attempted Questions Wrong
Questions Not Attempted
Total Questions on Quiz
Question Details
Results
Date
Score
Hint
Time allowed
minutes
seconds
Time used
Answer Choice(s) Selected
Question Text
All done
Need more practice!
Keep trying!
Not bad!
Good work!
Perfect!