Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

Prin of Info Security 2023 Questions and Answers with complete solution

Beoordeling
-
Verkocht
-
Pagina's
26
Cijfer
A
Geüpload op
02-05-2023
Geschreven in
2022/2023

Prin of Info Security 2023 Questions and Answers with complete solution Which algorithm encrypts and decrypts data using the same key? Hash algorithm Symmetric cryptographic algorithm * Rivest-Shamir-Adleman algorithm Asymmetric cryptographic algorithm Which attack sees an attacker attempt to determine the hash function's input strings that produce the same hash result? Known ciphertext attack Downgrade attack Collision attack * Birthday attack Which characteristic of cryptography makes information obscure or unclear, and by which the original information becomes impossible to be determined? Obfuscation * Nonrepudiation Authentication Integrity Which cryptographic method should Susanne use to ensure that a document can be encrypted with a key and decrypted with a different key? Public Ephemeral Symmetric Asymmetric * Which encryption device you can use that has the following features? 1. It should allow administrators to remotely prohibit accessing the data on a device until it can verify the user status. 2. It can lock user access completely or even instruct the drive to initiate a self-destruct sequence to destroy all data. USB device encryption * HSM TPM AES Which encryption is a chip on the motherboard of a computer that provides cryptographic services? Trusted platform module * Hardware security module Self-encrypting hard disk drives File and File system cryptography

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

Prin of Info Security 2023 Questions and Answers with
complete solution
Which algorithm encrypts and decrypts data using the same key?
Hash algorithm
Symmetric cryptographic algorithm *
Rivest-Shamir-Adleman algorithm
Asymmetric cryptographic algorithm
Which attack sees an attacker attempt to determine the hash function's input strings that
produce the same hash result?
Known ciphertext attack
Downgrade attack
Collision attack *
Birthday attack
Which characteristic of cryptography makes information obscure or unclear, and by
which the original information becomes impossible to be determined?
Obfuscation *
Nonrepudiation
Authentication
Integrity
Which cryptographic method should Susanne use to ensure that a document can be
encrypted with a key and decrypted with a different key?
Public
Ephemeral
Symmetric
Asymmetric *
Which encryption device you can use that has the following features?



1. It should allow administrators to remotely prohibit accessing the data on a device until
it can verify the user status.

2. It can lock user access completely or even instruct the drive to initiate a self-destruct
sequence to destroy all data.
USB device encryption *
HSM
TPM
AES
Which encryption is a chip on the motherboard of a computer that provides
cryptographic services?
Trusted platform module *
Hardware security module
Self-encrypting hard disk drives
File and File system cryptography

,Which encryption method in BitLocker prevents attackers from accessing data by
booting from another OS or placing the hard drive in another computer?
Filesystem cryptography
Blockchain
GNU privacy guard
Full disk encryption *
Which feature of cryptography is used to prove a user's identity and prevent an
individual from fraudulently reneging on an action?
Confidentiality
Nonrepudiation *
Obfuscation
Authentication
Which function in cryptography takes a string of any length as input and returns a string
of any requested variable length?
Filesystem
BitLocker
Steganography
Sponge *
Which of the following devices can perform cryptographic erase?
SED *
HSM
TPM
USB device encryption
Which of the following is a state of data, where data is transmitted across a network?
Data in processing
Data at rest
Data in transit *
3DES
Which of the following is used to create a sequence of numbers whose output is close
to a random number?
GnuPG
RSA
DSA
PRNG *
Which of the following statements describe a quantum computer?
A quantum computer is a computer that relies on qubits that can be both 0 and 1 at the
same time. *
A quantum computer uses encrypted hardware until the correct password is provided
and all data copied to the computer is automatically encrypted.
A quantum computer is a computer that uses the structure of physical gadgets with
sensors, software, and other technologies to connect and swap data with other devices
and systems over the internet.
A quantum computer is a computer with a chip on its motherboard that provides
cryptographic services, includes a true random number generator, and supports fully
asymmetric encryption.

, Which of the following uses hardware encryption technology to secure stored data and
ensures the inseparability of SEDs among vendors?
Pad
Key
Opal *
Qubits
Which unit is used by quantum computers, making them faster and more efficient than
normal computers?
Qubit *
Ampere
Mole
Candela
Wilson has requested your help to suggest an encryption method that will provide the
highest security against attacks. Which encryption process should you suggest?
AES *
RC4
Blowfish
3DES
Wireless data networks are particularly susceptible to which type of attack?
Ciphertext attack *
Downgrade attack
Collision attack
Birthday attack
A company has multiple CAs and intermediate CAs issuing digital certificates in different
departments, with no one cross-checking their work. Which PKI trust model should the
company use?
Hierarchical trust model
Bridge trust model
Web of trust model
Distributed trust model *
Alliance Consulting, a company based in France, is shutting down. Louis, the owner of
the company, applied to revoke his digital certificate. He is very busy with the other
details of shutting the company down and needs to be able to check the certificate's
status quickly and easily. Which of the following will help him get a real-time lookup of
the certificate's status?
CRL
OCSP *
CSR
EV
Amtel University decides to keep a record of their student data in a backup server. The
administrator contacts you to identify the right command interface protocol to be used in
this. Which command interface protocol should you advise?
SSL
TLS
SSH *
HTTPS

Geschreven voor

Vak

Documentinformatie

Geüpload op
2 mei 2023
Aantal pagina's
26
Geschreven in
2022/2023
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$14.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
LECTMAGGY Chamberlain College Of Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
146
Lid sinds
3 jaar
Aantal volgers
121
Documenten
6314
Laatst verkocht
2 weken geleden
LECTMAGGY

Here, you will find everything you need in NURSING EXAMS AND TESTBANKS.Contact us, to fetch it for you in minutes if we do not have it in this shop.BUY WITHOUT DOUBT!!!!Always leave a review after purchasing any document so as to make sure our customers are 100% satisfied.

3.3

28 beoordelingen

5
8
4
3
3
11
2
0
1
6

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen