Correct Answer
verified
View Answer
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) AES
B) Twofish
C) 3DES
D) RSA
Correct Answer
verified
Multiple Choice
A) block cipher
B) single cipher
C) unit cipher
D) stream cipher
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) Bob's private key
B) Alice's private key
C) Bob and Alice's keys.
D) Bob's private key and Alice's public key.
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) data-in-transit
B) data-in-play
C) data-at-rest
D) data-in-use
Correct Answer
verified
Multiple Choice
A) hash
B) key
C) digest
D) block
Correct Answer
verified
Multiple Choice
A) FCC
B) RSA
C) ECC
D) IKE
Correct Answer
verified
Multiple Choice
A) crypttext
B) plain text
C) simpletext
D) cleartext
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
True/False
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) Bob's private key.
B) Alice's private key.
C) Bob and Alice's keys.
D) Bob's private key and Alice's public key.
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) user key cryptography
B) public key cryptography
C) private key cryptography
D) cipher-text cryptography
Correct Answer
verified
Multiple Choice
A) Data Encryption Standard
B) Elliptic Curve Cryptography
C) Advanced Encryption Standard
D) Digital Signature Algorithm
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Showing 21 - 40 of 50
Related Exams