TestOut SecurityPro (9.4 - 9.6)

TestOut SecurityPro (9.4 - 9.6)

University

23 Qs

quiz-placeholder

Similar activities

Next Generation Technology Quiz

Next Generation Technology Quiz

University

20 Qs

8-期中总结

8-期中总结

University

20 Qs

basisdata1

basisdata1

University

20 Qs

Designing Network Infrastructure and Network Security

Designing Network Infrastructure and Network Security

KG - University

20 Qs

Technical Quiz for I B.Tech Students

Technical Quiz for I B.Tech Students

University

20 Qs

Computers

Computers

7th Grade - Professional Development

20 Qs

Quiz - AIJ | SMKM3

Quiz - AIJ | SMKM3

12th Grade - University

20 Qs

Chapter 8. Securing Network Media and Devices

Chapter 8. Securing Network Media and Devices

University

20 Qs

TestOut SecurityPro (9.4 - 9.6)

TestOut SecurityPro (9.4 - 9.6)

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

James Stephens

Used 7+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following are true of Triple DES (3DES)? (select two) (9.5 1/15)

uses a 168-bit key

Can easily be broken

Is used in IPsec

uses 64-bit blocks with 128-bit keys

Uses the Rijndael block cipher

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is the most frequently used symmetric key stream cipher? (9.5 2/15)

Ron's Cipher v2 (RC2)

Ron's Cipher v4 (RC4)

Blowfish

Advanced Encryption Standard (AES)

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following forms of cryptography is best implemented in hardware? (9.5 3/15)

Symmetric stream

Asymmetric

Symmetric block

Public key

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following symmetric block ciphers does NOT use a variable block length? (9.5 4/15)

Advanced Encryption Standard (AES)

Elliptic Curve (EC)

Ron's Cipher v5 (RC5)

International Data Encryption Algorithm (IDEA)

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following encryption mechanisms offers the least security because of weak keys? (9.5 5/15)

IDEA

AES

TwoFish

DES

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which version of the Rivest cipher is a block cipher that supports variable bit length keys and variable bit block sizes? (9.5 6/15)

RC2

RC5

RC4

RSA

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following symmetric cryptography systems does not support a variable block size? (9.5 7/15)

AES

IDEA

RC5

Rijndael

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?