Which asymmetric algorithm provides an electronic key exchange method to share the secret key?

Last Updated on November 7, 2022 by InfraExam

Cybersecurity Essentials 1.1 Chapter 4 Quiz Answers 100% 2018

    • enigma
    • substitution
    • transposition
    • one-time pad
    • Vignere
    • AES
    • Caesar
    • 3DES
    • Skipjack
    • copyright
    • access control
    • trademark
    • watermarking
    • swipe cards
    • firewalls
    • locks
    • routers
    • servers
    • video cameras
    • retracting
    • hiding
    • blanking
    • whiteout
    • masking
    • transform
    • hash
    • symmetric
    • stream
    • block
    • hash
    • asymmetric
    • one-time pad
    • symmetric
    • block
    • hash
    • enigma
    • stream
    • elliptical
    • ECC
    • RSA
    • AES
    • El-Gamal
    • IDEA
    • impersonation
    • spoofing
    • factorization
    • cryptology
    • jamming
    • guards to monitor security screens
    • firewalls to monitor traffic
    • swipe cards to allow access to a restricted area
    • fences to protect the perimeter of a building
    • intrusion detection system (IDS) to watch for suspicious network activity
    • biometrics to validate physical characteristics
    • hiding
    • steganography
    • obfuscation
    • masking
    • hiring practices
    • intrusion detection system (IDS)
    • policies and procedures
    • background checks
    • guard dogs
    • encryption
    • Telnet
    • Secure Shell (SSH)
    • Advanced Encryption Standard (AES)
    • Pretty Good Privacy (PGP)
    • Secure File Transfer Protocol (SFTP)
    • Secure Sockets Layer (SSL)
    • detective
    • preventive
    • masking
    • deterrent
    • key space
    • key randomness
    • keylogging
    • key length
    • a security key fob  ————> something you have
    • a fingerprint scan  ————> something you are
    • a password           ————> something you know
    • steganography —————> hiding data within an audio file
    • steganalysis ——————> discovering that hidden information exists within a graphic file
    • social steganography ——–> creating a message that says one thing but means something else to a specific audience
    • obfuscation ——————> making a message confusing so it is harder to understand
    • Other Incorrect Match Options:
      • replacing sensitive information in a file with nonsensitive information
    • WEP
    • DES
    • RSA
    • Diffie-Hellman
    • hashing
    • asymmetric
    • one-time pad
    • transposition
    • symmetric

Which asymmetric algorithm provides an electronic key exchange method to share the secret key?
report this ad

Would love your thoughts, please comment.x

← Which two reasons describe why WEP is a weak protocol? (Choose two.)

← What encryption algorithm uses one key to encrypt data and a different key to decrypt data?