Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) SHA1
B) MD2
C) SHA3
D) MD5
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Steganography
B) Cryptanalysis
C) Cryptography
D) Key management
Correct Answer
verified
Short Answer
Correct Answer
verified
View Answer
Multiple Choice
A) Shift cipher
B) Substitution cipher
C) Transposition cipher
D) Vigenère cipher
Correct Answer
verified
Multiple Choice
A) ECC
B) Blowfish
C) AES
D) DES
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) RSA
B) 3DES
C) ECC
D) ElGamal
Correct Answer
verified
Multiple Choice
A) PGP
B) FreeOTFE
C) StegDetect
D) GnuPG
Correct Answer
verified
Multiple Choice
A) Authentication
B) Nonrepudiation
C) Integrity
D) Confidentiality
Correct Answer
verified
Short Answer
Correct Answer
verified
View Answer
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Asymmetric encryption cipher
B) Transposition and substitution cipher
C) Polyalphabetic transposition cipher
D) Polyalphabetic substitution cipher
Correct Answer
verified
Essay
Correct Answer
verified
Multiple Choice
A) Authentication
B) Nonrepudiation
C) Confidentiality
D) Auditing
Correct Answer
verified
Short Answer
Correct Answer
verified
Showing 1 - 20 of 49
Related Exams