Gibberish

127.Which of the following statement(s) is(are) properties of public-key encryption?

//The same algorithm with the same key is used for encryption and decryption

//The sender and receiver must share the algorithm and the key

One of the two keys must be kept secret.

128.Which of the following cipher(s) is(are) example of block cipher?

Fesitel Cipher

129.Which of the following(s) is (are) form(s) of malware (malicious software)?

All of the statements are correct

130.Which of the following is not a fundamental security goal?

Assurance

131.A ____________ is someone who breaks into the telephone network illegally manipulating various audio frequencies associated with the tones, typically to make free long-distance phone calls.

Phreak

132.Which one of the following statements is not the mode of Hacker attack?

Offline

133.Which of these is possibly the worst password that user can choose?

Nursultan1612

134.Which of the statement(s) is(are) properties for p and q?

p and q are prime

p and q should be of similar bit length

p and q are distinct

135.Which one of the statement is equation for φ(n)?

φ(n) = (p - 1)(q - 1)

136.Which of the following statement is NOT TRUE?

The public-key can be used to derive the private key

137.Which of the following statement is NOT TRUE?

A user must protect his/her public key

138.Which of the following statement is NOT TRUE?

The public key is kept secret while the private key may be widely distributed

139.Which of the following statements is TRUE?(IF NOT CORRECT)

Выберите один ответ.

     
  Public key algorithms are used to hash the password  
  None of the listed answers  
  Public-key algorithms are used to encrypt the key encryption key  
  Public-key algorithms are slow compared to symmetric cryptography  

140.Which of these statements is TRUE?

In symmetric-key cryptography, the key that is used to encrypt data is the same key that is used to decrypt it

141.Which of the statement is TRUE?

The larger the key size, the greater the range of possible values a key can be.

142.Which of these is NOT considered as a symmetric-key algorithm?

RSA

143.Which of the following(s) is(are) form(s) of malware(malicious software)?

  a. Rootkits  
  b. Scripts  
  c. Worms  
  d. Viruses  
  e. All of the statements are correct  

144.You can use ___________ to protect your computer from outsiders

Antivirus software an personal firewall programs

145. How does the Hybrid Attack work?

Words from dictionary and their variations used in attack

146. In Magic Square cipher what will be the value of magic constant or magic sum M if the key is 17?


Понравилась статья? Добавь ее в закладку (CTRL+D) и не забудь поделиться с друзьями:  



double arrow
Сейчас читают про: