Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
practice questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
John has been advised that any length of data that a client using a web browser inserts is approved by one of the applications introduced on a web server within the DMZ into the form the webserver gives to gather unused client information. Which of the taking after portrays an issue that John ought to be mindful of relating to this sort of vulnerability?
Correct
The C language is vulnerable to buffer flood assaults since it permits direct pointer controls to require put. Particular commands can give get to low-level memory addresses without carrying outbounds checking.
Incorrect
The C language is vulnerable to buffer flood assaults since it permits direct pointer controls to require put. Particular commands can give get to low-level memory addresses without carrying outbounds checking.
-
Question 2 of 10
2. Question
What is the objective of cryptanalysis?
Correct
Cryptanalysis is the method of attempting to reverse-engineer a cryptosystem, with the possible objective of revealing the key utilized. Once this key is revealed, all other messages encrypted with this key can be gotten to. Cryptanalysis is carried out by the white caps to test the quality of the algorithm.
Incorrect
Cryptanalysis is the method of attempting to reverse-engineer a cryptosystem, with the possible objective of revealing the key utilized. Once this key is revealed, all other messages encrypted with this key can be gotten to. Cryptanalysis is carried out by the white caps to test the quality of the algorithm.
-
Question 3 of 10
3. Question
Why has the frequency of fruitful brute-force attacks increased?
Correct
A brute-force assault is an asset seriously. It tries all values until the right one is obtained. As computers have more capable processors included in them, assailants can carry out more effective brute-force assaults.
Incorrect
A brute-force assault is an asset seriously. It tries all values until the right one is obtained. As computers have more capable processors included in them, assailants can carry out more effective brute-force assaults.
-
Question 4 of 10
4. Question
Which of the following isn’t a property or characteristic of a one-way hash function?
Correct
A hashing calculation will take a string of variable lengths (the message can be any size) and compute fixed-length esteem. The fixed-length esteem is the message process. The MD family makes the fixed-length esteem of 128 bits, and SHA makes one of 160 bits
Incorrect
A hashing calculation will take a string of variable lengths (the message can be any size) and compute fixed-length esteem. The fixed-length esteem is the message process. The MD family makes the fixed-length esteem of 128 bits, and SHA makes one of 160 bits
-
Question 5 of 10
5. Question
What would show that a message had been modified?
Correct
Hashing calculations create message digests to identify whether the adjustment has taken place. The sender and collector freely produce their claim digests, and the receiver compares these values. In the event that they vary, the recipient knows the message has been modified.
Incorrect
Hashing calculations create message digests to identify whether the adjustment has taken place. The sender and collector freely produce their claim digests, and the receiver compares these values. In the event that they vary, the recipient knows the message has been modified.
-
Question 6 of 10
6. Question
Which of the following may be a U.S. federal government calculation created for creating secure message digests?
Correct
SHA was made to produce secure message digests. Computerized Signature Standard (DSS) is the standard to form advanced marks, which directs that SHA must be utilized. DSS also outlines the advanced signature calculations that can be utilized with SHA: RSA, DSA, and ECDSA.
Incorrect
SHA was made to produce secure message digests. Computerized Signature Standard (DSS) is the standard to form advanced marks, which directs that SHA must be utilized. DSS also outlines the advanced signature calculations that can be utilized with SHA: RSA, DSA, and ECDSA.
-
Question 7 of 10
7. Question
Which alternative best portrays the distinction between HMAC and CBC-MAC?
Correct
In an HMAC operation, a message is concatenated with a symmetric key and the result is put through a hashing calculation. This gives keenness and framework or data authentication. CBC-MAC employments a square cipher to form a MAC, which is the final piece of ciphertext.
Incorrect
In an HMAC operation, a message is concatenated with a symmetric key and the result is put through a hashing calculation. This gives keenness and framework or data authentication. CBC-MAC employments a square cipher to form a MAC, which is the final piece of ciphertext.
-
Question 8 of 10
8. Question
What is an advantage of RSA over DSA?
Correct
RSA can be utilized for information encryption, key trade, and computerized marks. DSA can be used as they were for computerized signatures.
Incorrect
RSA can be utilized for information encryption, key trade, and computerized marks. DSA can be used as they were for computerized signatures.
-
Question 9 of 10
9. Question
What is utilized to create a digital signature?
Correct
An advanced signature may be a message process that has been scrambled with the sender’s private key. A sender, or anybody else, ought to never have get to to the receiver’s private key.
Incorrect
An advanced signature may be a message process that has been scrambled with the sender’s private key. A sender, or anybody else, ought to never have get to to the receiver’s private key.
-
Question 10 of 10
10. Question
Which of the following is best depicts an advanced signature?
Correct
A computerized signature gives confirmation (knowing who truly sent the message), integrity (since a hashing calculation is included), and nonrepudiation (the sender cannot deny sending the message).
Incorrect
A computerized signature gives confirmation (knowing who truly sent the message), integrity (since a hashing calculation is included), and nonrepudiation (the sender cannot deny sending the message).