Elliptic curve cryptography: (Select TWO)

Elliptic curve cryptography: (Select TWO) A. is used in both symmetric and asymmetric encryption. B. is used mostly in symmetric encryption. C....

What is a public key?

What is a public key? a. An encryption key that is made by a publicly available software utility b. An encryption key that is accidentally exposed...

Which of the following is true?

Which of the following is true? a. Keys that are longer than 8 bits require considerable processing time, making them unattractive for most applications b....

Which of the following is true?

Which of the following is true? a. Software encryption is much more secure than hardware encryption b. Hardware encryption is more vulnerable to tampering...

What is a certificate authority (CA)?

What is a certificate authority (CA)? a. An organization that offers free encryption and decryption services b. An organization that offers free digital...

A hash function is:

A hash function is: a. A one-way function that mathematically manipulates the input data to create an output value b. A one-way function that uses...

Which of the following statements is true?

Which of the following statements is true? a. Symmetric key encryption uses the same key while public key encryption uses two different keys for each...

A cracked encryption key is a key that:

A cracked encryption key is a key that: a. Has been entered into the cipher or encryption system b. Has been discovered by some method and is now...

Regarding cryptography, what is a private key?

Regarding cryptography, what is a private key? a. An encryption key that is kept confidential and used to decrypt data that has been encrypted with...

The ideal location to store a private key is:

The ideal location to store a private key is: • On a stand-alone computer system that is not networked • On the same network as the cipher • It is...

What is a private key?

What is a private key? • An encryption key that is accidentally exposed to the public • An encryption key kept secret by the owner • An encryption...

What is a digital signature?

What is a digital signature? • A cryptographic value attached to data to certify the integrity of the data • A certified public key used for public...

Plaintext or cleartext is the term for:

Plaintext or cleartext is the term for: • The algorithm used to encrypt or decrypt data or text • The data or text that has been encrypted • Data...

A hash function is:

A hash function is: a. A one-way function that uses a cipher to produce a piece of data that helps to encrypt other data b. A two-way function that,...

Ideally, where should encryption keys be stored?

Ideally, where should encryption keys be stored? a. On a physically separate system from the encrypted data b. On the same system as the encrypted...

Cryptography is:

Cryptography is: a. A mathematical function that utilizes the data input to produce a value based on that data b. The process of converting cleartext...

A brute force attack works by:

A brute force attack works by: a. Analyzing the encrypted data in an effort to deduce the correct password/key b. Using a list of common words or...

Symmetric key encryption gets its name because:

Symmetric key encryption gets its name because: a. Both parties must initiate the ciphering software in order to exchange data b. The involved parties...

What do digital signatures provide?

What do digital signatures provide? a. Assurance that the stated author is the actual person that created the information b. Security by ensuring...

When should a key or certificate be renewed?

When should a key or certificate be renewed? a. Every year b. Every quarter c. Just before it expires d. Just after it expires Answer: ...

Certificates have what single purpose?

Certificates have what single purpose? a. Proving identity b. Proving quality c. Providing encryption security d. Exchanging encryption keys Answer:...

Federation is a means to accomplish _____.

Federation is a means to accomplish _____. a. Accountability logging b. ACL verification c. Single sign-on d. Trusted OS hardening Answer:...

LDAP operates over what TCP ports?

LDAP operates over what TCP ports? a. 636 and 389 b. 110 and 25 c. 443 and 80 d. 20 and 21 Answer: ...

Which is the strongest form of password?

Which is the strongest form of password? a. More than eight characters b. One-time use c. Static d. Different types of keyboard characters Answer:...

What is an asset?

What is an asset? a. An item costing more than $10,000 b. Anything used in a work task c. A threat to the security of an organization d. An intangible...

When is business continuity needed?

When is business continuity needed? a. When new software is distributed b. When business processes are interrupted c. When a user steals company data d....

A goal of NAC is which of the following?

A goal of NAC is which of the following? a. Reduce social engineering threats b. Map internal private addresses to external public addresses c. Distribute...