A) Authentication
B) Nonrepudiation
C) Availability
D) Integrity
Correct Answer
verified
Multiple Choice
A) ciphertext
B) cleartext
C) maskedtext
D) subtext
Correct Answer
verified
Multiple Choice
A) chosen-ciphertext
B) chosen-plaintext
C) known plaintext
D) ciphertext-only
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) chosen-ciphertext
B) chosen-plaintext
C) known plaintext
D) ciphertext-only
Correct Answer
verified
Multiple Choice
A) asymmetric algorithm
B) DEA
C) symmetric algorithm
D) certificate
E) hashing algorithm
F) birthday attacks
G) stream cipher
H) PKI
I) key
J) salt
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) ECC
B) RSA
C) DES
D) AES
Correct Answer
verified
Multiple Choice
A) ciphering
B) encryption
C) decryption
D) decoding
Correct Answer
verified
Multiple Choice
A) algorithm area
B) key range
C) keyspace
D) keyarea
Correct Answer
verified
Multiple Choice
A) John the Ripper
B) Hydra (THC)
C) Pwdump3v2
D) EXPECT
Correct Answer
verified
Multiple Choice
A) Cross Server attack
B) SSL/TLS downgrade attack
C) Hydra attack
D) TCP/IP attack
Correct Answer
verified
Multiple Choice
A) cryptography
B) ciphering
C) cryptanalysis
D) substitution analysis
Correct Answer
verified
Multiple Choice
A) brute force
B) replay
C) ciphertext-only
D) dictionary
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) asymmetric algorithm
B) DEA
C) symmetric algorithm
D) certificate
E) hashing algorithm
F) birthday attacks
G) stream cipher
H) PKI
I) key
J) salt
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) asymmetric algorithm
B) DEA
C) symmetric algorithm
D) certificate
E) hashing algorithm
F) birthday attacks
G) stream cipher
H) PKI
I) key
J) salt
Correct Answer
verified
Multiple Choice
A) Authentication
B) Nonrepudiation
C) Availability
D) Authorization
Correct Answer
verified
Showing 1 - 20 of 50
Related Exams