.
Its latest version is SHA-1
Its latest version is SHA-4.1
It is used with encryption protocols
It is used with networking protocols
RC5
Blowfish
MAC
ARP
They form an essential part of Website security
They are used by Certificate security system
They are a pair of clear text passwords
They are obsolete.
True
False
To avoid unauthorized access of information being stored
To avoid unauthorized access of network resources
To avoid unauthorized access of information being transmitted.
To avoid unauthorized access of network servers
IETF
ISI
NSA
ABA
Mathematical tools
Analytical reasoning
Pattern finding
Mathematical reasoning
Advanced calculators
HELLO
WHAT
WHEN
DATE
It is the most secure
It is very fast
It is economical
None of the above
True
False
You need to have a security setup configured on both the sending as well as the receiving ends to implement Public Key Cryptography.
You do not need an existing security setup
Public key can only encrypt and private key can only decrypt.
Public key can encrypt as well as decrypt, private key can only decrypt
None of the above
True
False
Finger print
Hand written signature
Blood sample
None of the above
The receiving end and the sending end will receive an alert notification
The resulting digest after data modification will contain a completely different value.
The messages will be dropped and retransmitted.
None of the above
Symmetric algorithm
Asymmetric algorithm
128-bit key algorithm
1024-bit key algorithm
Trying all combinations to break a code
Breaking into strong cryptography
Forcibly capturing all data being transmitted
None of the above
Cryptography with keys
Cryptography without keys
Cryptography before encryption
Cryptography without encryption
True
False
Generate one cipher text for that message
Generate at least 5 cipher text for that message
Generate several cipher text.
None of the above.
DoS
Brute force attack
Code attack
None of the above
True
False
High level security
Complex implementation
Ease of implementation
Average security level
64-bit block cipher
128-bit block cipher
64-bit stream cipher
128-bit stream cipher
Yes
No
Wait!
Here's an interesting quiz for you.