Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
practice questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
How many bits make up the successful length of the DES key?
Correct
DES includes a key estimate of 64 bits, but 8 bits are utilized for equality, so the genuine key measure is 56 bits. Keep in mind that DEA is the calculation utilized for the DES standard, so DEA too has a true key measure of 56 bits, since we are really talking almost the same calculation here. DES is truly the standard, and DEA is the calculation.
Incorrect
DES includes a key estimate of 64 bits, but 8 bits are utilized for equality, so the genuine key measure is 56 bits. Keep in mind that DEA is the calculation utilized for the DES standard, so DEA too has a true key measure of 56 bits, since we are really talking almost the same calculation here. DES is truly the standard, and DEA is the calculation.
-
Question 2 of 10
2. Question
Why would a certificate specialist revoke a certificate?
Correct
The reason a certificate is disavowed is to caution others who utilize that person’s open key that they ought to now not believe the open key since, for a few reasons, that open key is no longer bound to that particular individual’s character. This can be since an employee left the company or changed his title and required an unused certificate, but most likely it is because the person’s private key was compromised.
Incorrect
The reason a certificate is disavowed is to caution others who utilize that person’s open key that they ought to now not believe the open key since, for a few reasons, that open key is no longer bound to that particular individual’s character. This can be since an employee left the company or changed his title and required an unused certificate, but most likely it is because the person’s private key was compromised.
-
Question 3 of 10
3. Question
What does “DES” stand for?
Correct
Data Encryption Standard was created by NIST and the NSA to scramble delicate but unclassified government information.
Incorrect
Data Encryption Standard was created by NIST and the NSA to scramble delicate but unclassified government information.
-
Question 4 of 10
4. Question
Which of the following best portrays a certificate authority?
Correct
An enrollment specialist (RA) acknowledges a person ask for a certificate and confirms that person’s personality. At that point, the RA sends this ask to a certificate specialist (CA), which generates and keeps up the certificate.
Incorrect
An enrollment specialist (RA) acknowledges a person ask for a certificate and confirms that person’s personality. At that point, the RA sends this ask to a certificate specialist (CA), which generates and keeps up the certificate.
-
Question 5 of 10
5. Question
What does “DEA” stand for?
Correct
DEA is the calculation that satisfied the DES standard. So DEA has all of the properties of DES: an asymmetric square cipher that employments 64-bit squares, 16 rounds, and a 56-bit key
Incorrect
DEA is the calculation that satisfied the DES standard. So DEA has all of the properties of DES: an asymmetric square cipher that employments 64-bit squares, 16 rounds, and a 56-bit key
-
Question 6 of 10
6. Question
Who was involved in creating the primary public key algorithm?
Correct
The primary discharged open key cryptography calculation was created by Whitfield Diffie and Martin Hellman.
Incorrect
The primary discharged open key cryptography calculation was created by Whitfield Diffie and Martin Hellman.
-
Question 7 of 10
7. Question
What preparation usually takes place after making a DES session key?
Correct
After a session key has been made, it must be traded safely. In most cryptosystems, an hilter kilter key (the receiver’s open key) is utilized to scramble this session key, and it is sent to the collector.
Incorrect
After a session key has been made, it must be traded safely. In most cryptosystems, an hilter kilter key (the receiver’s open key) is utilized to scramble this session key, and it is sent to the collector.
-
Question 8 of 10
8. Question
How many rounds of transposition/permutation and substitution are done by DES?
Correct
DES carries out 16 rounds of scientific computation on each 64-bit square of information it is mindful for scrambling. A circular could be a set of scientific equations utilized for encryption and decoding forms.
Incorrect
DES carries out 16 rounds of scientific computation on each 64-bit square of information it is mindful for scrambling. A circular could be a set of scientific equations utilized for encryption and decoding forms.
-
Question 9 of 10
9. Question
Which of the taking after maybe a genuine explanation relating to information encryption when it is utilized to protect information?
Correct
Information encryption continuously requires cautious key administration. Most calculations are so strong today that it is much less demanding to go after key administration than to dispatch a brute-force attack. Hashing calculations are utilized for information keenness, encryption does require a great sum of resources, and keys don’t ought to be escrowed for encryption.
Incorrect
Information encryption continuously requires cautious key administration. Most calculations are so strong today that it is much less demanding to go after key administration than to dispatch a brute-force attack. Hashing calculations are utilized for information keenness, encryption does require a great sum of resources, and keys don’t ought to be escrowed for encryption.
-
Question 10 of 10
10. Question
What is the definition of an algorithm’s work figure?
Correct
The work calculate of a cryptosystem is the sum of time and assets fundamental to break the cryptosystem or its encryption preparation. The objective is to form the work figure so high that an assailant may not be effective in breaking the calculation or cryptosystem.
Incorrect
The work calculate of a cryptosystem is the sum of time and assets fundamental to break the cryptosystem or its encryption preparation. The objective is to form the work figure so high that an assailant may not be effective in breaking the calculation or cryptosystem.