Last Updated on October 29, 2019 by Admin
Cybersecurity Essentials 1.1 Chapter 4 Quiz Online
CE -- Chapter 4 Quiz
Quiz-summary
0 of 20 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
Information
CE — Chapter 4 Quiz
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 20 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- Answered
- Review
-
Question 1 of 20
1. Question
1 pointsWhat is the name of the method in which letters are rearranged to create the ciphertext?Correct
Incorrect
Ciphertext can be created by using the following:
- Transposition – letters are rearranged
- Substitution – letters are replaced
- One-time pad – plaintext combined with a secret key creates a new character, which then combines with the plaintext to produce ciphertext
Hint
Ciphertext can be created by using the following:
- Transposition – letters are rearranged
- Substitution – letters are replaced
- One-time pad – plaintext combined with a secret key creates a new character, which then combines with the plaintext to produce ciphertext
-
Question 2 of 20
2. Question
1 pointsWhich 128-bit block cipher encryption algorithm does the US government use to protect classified information?Correct
Incorrect
The Advanced Encryption Standard (AES) is used to protect classified information by the U.S. government and is a strong algorithm that uses longer key lengths.
Hint
The Advanced Encryption Standard (AES) is used to protect classified information by the U.S. government and is a strong algorithm that uses longer key lengths.
-
Question 3 of 20
3. Question
1 pointsWhich term describes the technology that protects software from unauthorized access or modification?Correct
Incorrect
Software watermarking inserts a secret message into the program as proof of ownership and protects software from unauthorized access or modification.
Hint
Software watermarking inserts a secret message into the program as proof of ownership and protects software from unauthorized access or modification.
-
Question 4 of 20
4. Question
3 pointsWhich three devices represent examples of physical access controls? (Choose three.)Correct
Incorrect
- Physical access controls include but are not limited to the following:
Guards
- Fences
- Motion detectors
- Laptop locks
- Locked doors
- Swipe cards
- Guard dogs
- Video cameras
- Mantraps
- Alarms
Hint
- Physical access controls include but are not limited to the following:
Guards
- Fences
- Motion detectors
- Laptop locks
- Locked doors
- Swipe cards
- Guard dogs
- Video cameras
- Mantraps
- Alarms
-
Question 5 of 20
5. Question
1 pointsWhat term is used to describe the technology that replaces sensitive information with a nonsensitive version?Correct
Incorrect
Data masking replaces sensitive information with nonsensitive information. After replacement, the nonsensitive version looks and acts like the original.
Hint
Data masking replaces sensitive information with nonsensitive information. After replacement, the nonsensitive version looks and acts like the original.
-
Question 6 of 20
6. Question
1 pointsWhich type of cipher is able to encrypt a fixed-length block of plaintext into a 128-bit block of ciphertext at any one time?Correct
Incorrect
Block ciphers transform a fixed-length block of plaintext into a block of ciphertext. To decrypt the ciphertext, the same secret key to encrypt is used in reverse.
Hint
Block ciphers transform a fixed-length block of plaintext into a block of ciphertext. To decrypt the ciphertext, the same secret key to encrypt is used in reverse.
-
Question 7 of 20
7. Question
1 pointsWhat encryption algorithm uses the same pre-shared key to encrypt and decrypt data?Correct
Incorrect
Symmetric encryption algorithms use the same pre-shared key to encrypt and decrypt data.
Hint
Symmetric encryption algorithms use the same pre-shared key to encrypt and decrypt data.
-
Question 8 of 20
8. Question
1 pointsWhat type of cipher encrypts plaintext one byte or one bit at a time?Correct
Incorrect
Stream ciphers encrypt plaintext one byte or one bit at a time, and can be much faster than block ciphers.
Hint
Stream ciphers encrypt plaintext one byte or one bit at a time, and can be much faster than block ciphers.
-
Question 9 of 20
9. Question
1 pointsWhat cryptographic algorithm is used by the NSA and includes the use of elliptical curves for digital signature generation and key exchange?Correct
Incorrect
Elliptic curve cryptography (ECC) uses elliptic curves as part of the algorithm for digital signature generation and key exchange.
Hint
Elliptic curve cryptography (ECC) uses elliptic curves as part of the algorithm for digital signature generation and key exchange.
-
Question 10 of 20
10. Question
1 pointsWhat is the term used to describe the science of making and breaking secret codes?Correct
Incorrect
Cryptology is the science of making and breaking codes to make sure that cyber criminals cannot easily compromise protected information.
Hint
Cryptology is the science of making and breaking codes to make sure that cyber criminals cannot easily compromise protected information.
-
Question 11 of 20
11. Question
3 pointsWhich three processes are examples of logical access controls? (Choose three.)Correct
Incorrect
Logical access controls includes but is not limited to the following:
- Encryption
- Smart cards
- Passwords
- Biometrics
- Access Control Lists (ACLs)
- Protocols
- Firewalls
- Intrusion Detection Systems (IDS)
Hint
Logical access controls includes but is not limited to the following:
- Encryption
- Smart cards
- Passwords
- Biometrics
- Access Control Lists (ACLs)
- Protocols
- Firewalls
- Intrusion Detection Systems (IDS)
-
Question 12 of 20
12. Question
1 pointsWhat term is used to describe concealing data in another file such as a graphic, audio, or other text file?Correct
Incorrect
Steganography conceals data in a file such as a graphic, audio, or other text file and is used to prevent extra attention to the encrypted data because the data is not easily viewed.
Hint
Steganography conceals data in a file such as a graphic, audio, or other text file and is used to prevent extra attention to the encrypted data because the data is not easily viewed.
-
Question 13 of 20
13. Question
3 pointsWhat are three examples of administrative access controls? (Choose three.)Correct
Incorrect
Administrative access controls are defined by organizations to implement and enforce all aspects of controlling unauthorized access and include the following:
- Policies
- Procedures
- Hiring practices
- Background checks
- Data classification
- Security training
- Reviews
Hint
Administrative access controls are defined by organizations to implement and enforce all aspects of controlling unauthorized access and include the following:
- Policies
- Procedures
- Hiring practices
- Background checks
- Data classification
- Security training
- Reviews
-
Question 14 of 20
14. Question
3 pointsWhich three protocols use asymmetric key algorithms? (Choose three.)Correct
Incorrect
Four protocols use asymmetric key algorithms:
- Internet Key Exchange (IKE)
- Secure Socket Layer (SSL)
- Secure Shell (SSH)
- Pretty Good Privacy (PGP)
Hint
Four protocols use asymmetric key algorithms:
- Internet Key Exchange (IKE)
- Secure Socket Layer (SSL)
- Secure Shell (SSH)
- Pretty Good Privacy (PGP)
-
Question 15 of 20
15. Question
1 pointsA warning banner that lists the negative outcomes of breaking company policy is displayed each time a computer user logs in to the machine. What type of access control is implemented?Correct
Incorrect
Deterrents are implemented to discourage or mitigate an action or the behavior of a malicious person.
Hint
Deterrents are implemented to discourage or mitigate an action or the behavior of a malicious person.
-
Question 16 of 20
16. Question
2 pointsWhich two terms are used to describe cipher keys? (Choose two.)Correct
Incorrect
-
Question 17 of 20
17. Question
3 pointsMatch the type of multifactor authentication with the description.Sort elements
- something you have
- something you are
- something you know
-
a security key fob
-
a fingerprint scan
-
a password
Correct
Incorrect
Multi-factor authentication uses a minimum of two methods of verification and can include the following:
- Something you have
- Something you know
- Something you are
Hint
Multi-factor authentication uses a minimum of two methods of verification and can include the following:
- Something you have
- Something you know
- Something you are
-
Question 18 of 20
18. Question
5 pointsMatch the description with the correct term. (Not all targets are used.)Sort elements
- hiding data within an audio file
- discovering that hidden information exists within a graphic file
- creating a message that says one thing but means something else to a specific audience
- making a message confusing so it is harder to understand
- replacing sensitive information in a file with nonsensitive information
-
steganography
-
steganalysis
-
social steganography
-
obfuscation
Correct
Incorrect
-
Question 19 of 20
19. Question
1 pointsWhich asymmetric algorithm provides an electronic key exchange method to share the secret key?Correct
Incorrect
Diffie-Hellman provides an electronic exchange method to share a secret key and is used by multiple secure protocols.
Hint
Diffie-Hellman provides an electronic exchange method to share a secret key and is used by multiple secure protocols.
-
Question 20 of 20
20. Question
1 pointsWhat encryption algorithm uses one key to encrypt data and a different key to decrypt data?Correct
Incorrect
Asymmetric encryption uses one key to encrypt data and a different key to decrypt data.
Hint
Asymmetric encryption uses one key to encrypt data and a different key to decrypt data.