Test your knowledge of cryptography principles and practices, including SHA, encryption systems, and key management as per CompTIA Security+ standards.
HELLO
WHAT
WHEN
DATE
Rate this question:
True
False
Rate this question:
RC5
Blowfish
MAC
ARP
Rate this question:
The receiving end and the sending end will receive an alert notification
The resulting digest after data modification will contain a completely different value.
The messages will be dropped and retransmitted.
None of the above
Rate this question:
They form an essential part of Website security
They are used by Certificate security system
They are a pair of clear text passwords
They are obsolete.
Rate this question:
True
False
Rate this question:
True
False
Rate this question:
Finger print
Hand written signature
Blood sample
None of the above
Rate this question:
True
False
Rate this question:
To avoid unauthorized access of information being stored
To avoid unauthorized access of network resources
To avoid unauthorized access of information being transmitted.
To avoid unauthorized access of network servers
Rate this question:
DoS
Brute force attack
Code attack
None of the above
Rate this question:
True
False
Rate this question:
It is the most secure
It is very fast
It is economical
None of the above
Rate this question:
Symmetric algorithm
Asymmetric algorithm
128-bit key algorithm
1024-bit key algorithm
Rate this question:
Cryptography with keys
Cryptography without keys
Cryptography before encryption
Cryptography without encryption
Rate this question:
Its latest version is SHA-1
Its latest version is SHA-4.1
It is used with encryption protocols
It is used with networking protocols
Rate this question:
High level security
Complex implementation
Ease of implementation
Average security level
Rate this question:
Yes
No
Rate this question:
IETF
ISI
NSA
ABA
Rate this question:
Generate one cipher text for that message
Generate at least 5 cipher text for that message
Generate several cipher text.
None of the above.
Rate this question:
64-bit block cipher
128-bit block cipher
64-bit stream cipher
128-bit stream cipher
Rate this question:
Mathematical tools
Analytical reasoning
Pattern finding
Mathematical reasoning
Advanced calculators
Rate this question:
You need to have a security setup configured on both the sending as well as the receiving ends to implement Public Key Cryptography.
You do not need an existing security setup
Public key can only encrypt and private key can only decrypt.
Public key can encrypt as well as decrypt, private key can only decrypt
None of the above
Rate this question:
Quiz Review Timeline (Updated): Mar 20, 2022 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.