100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Prin of Info Security 2023 Questions and Answers with complete solution $14.29   Add to cart

Exam (elaborations)

Prin of Info Security 2023 Questions and Answers with complete solution

 0 view  0 purchase
  • Course
  • Institution

Prin of Info Security 2023 Questions and Answers with complete solution Which algorithm encrypts and decrypts data using the same key? Hash algorithm Symmetric cryptographic algorithm * Rivest-Shamir-Adleman algorithm Asymmetric cryptographic algorithm Which attack sees an attacker attempt ...

[Show more]

Preview 3 out of 26  pages

  • April 22, 2023
  • 26
  • 2022/2023
  • Exam (elaborations)
  • Questions & answers
avatar-seller
Prin of Info Security 2023 Questions and Answers with
complete solution
Which algorithm encrypts and decrypts data using the same key?
Hash algorithm
Symmetric cryptographic algorithm *
Rivest-Shamir-Adleman algorithm
Asymmetric cryptographic algorithm
Which attack sees an attacker attempt to determine the hash function's input strings that
produce the same hash result?
Known ciphertext attack
Downgrade attack
Collision attack *
Birthday attack
Which characteristic of cryptography makes information obscure or unclear, and by
which the original information becomes impossible to be determined?
Obfuscation *
Nonrepudiation
Authentication
Integrity
Which cryptographic method should Susanne use to ensure that a document can be
encrypted with a key and decrypted with a different key?
Public
Ephemeral
Symmetric
Asymmetric *
Which encryption device you can use that has the following features?



1. It should allow administrators to remotely prohibit accessing the data on a device until
it can verify the user status.

2. It can lock user access completely or even instruct the drive to initiate a self-destruct
sequence to destroy all data.
USB device encryption *
HSM
TPM
AES
Which encryption is a chip on the motherboard of a computer that provides
cryptographic services?
Trusted platform module *
Hardware security module
Self-encrypting hard disk drives
File and File system cryptography

,Which encryption method in BitLocker prevents attackers from accessing data by
booting from another OS or placing the hard drive in another computer?
Filesystem cryptography
Blockchain
GNU privacy guard
Full disk encryption *
Which feature of cryptography is used to prove a user's identity and prevent an
individual from fraudulently reneging on an action?
Confidentiality
Nonrepudiation *
Obfuscation
Authentication
Which function in cryptography takes a string of any length as input and returns a string
of any requested variable length?
Filesystem
BitLocker
Steganography
Sponge *
Which of the following devices can perform cryptographic erase?
SED *
HSM
TPM
USB device encryption
Which of the following is a state of data, where data is transmitted across a network?
Data in processing
Data at rest
Data in transit *
3DES
Which of the following is used to create a sequence of numbers whose output is close
to a random number?
GnuPG
RSA
DSA
PRNG *
Which of the following statements describe a quantum computer?
A quantum computer is a computer that relies on qubits that can be both 0 and 1 at the
same time. *
A quantum computer uses encrypted hardware until the correct password is provided
and all data copied to the computer is automatically encrypted.
A quantum computer is a computer that uses the structure of physical gadgets with
sensors, software, and other technologies to connect and swap data with other devices
and systems over the internet.
A quantum computer is a computer with a chip on its motherboard that provides
cryptographic services, includes a true random number generator, and supports fully
asymmetric encryption.

, Which of the following uses hardware encryption technology to secure stored data and
ensures the inseparability of SEDs among vendors?
Pad
Key
Opal *
Qubits
Which unit is used by quantum computers, making them faster and more efficient than
normal computers?
Qubit *
Ampere
Mole
Candela
Wilson has requested your help to suggest an encryption method that will provide the
highest security against attacks. Which encryption process should you suggest?
AES *
RC4
Blowfish
3DES
Wireless data networks are particularly susceptible to which type of attack?
Ciphertext attack *
Downgrade attack
Collision attack
Birthday attack
A company has multiple CAs and intermediate CAs issuing digital certificates in different
departments, with no one cross-checking their work. Which PKI trust model should the
company use?
Hierarchical trust model
Bridge trust model
Web of trust model
Distributed trust model *
Alliance Consulting, a company based in France, is shutting down. Louis, the owner of
the company, applied to revoke his digital certificate. He is very busy with the other
details of shutting the company down and needs to be able to check the certificate's
status quickly and easily. Which of the following will help him get a real-time lookup of
the certificate's status?
CRL
OCSP *
CSR
EV
Amtel University decides to keep a record of their student data in a backup server. The
administrator contacts you to identify the right command interface protocol to be used in
this. Which command interface protocol should you advise?
SSL
TLS
SSH *
HTTPS

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller magdamwikash23. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $14.29. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

78600 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$14.29
  • (0)
  Add to cart