Last Updated on November 7, 2022 by InfraExam
Cybersecurity Essentials 1.1 Chapter 4 Quiz Answers 100% 2018
-
- enigma
- substitution
- transposition
- one-time pad
-
- Vignere
- AES
- Caesar
- 3DES
- Skipjack
-
- copyright
- access control
- trademark
- watermarking
-
- swipe cards
- firewalls
- locks
- routers
- servers
- video cameras
-
- retracting
- hiding
- blanking
- whiteout
- masking
-
- transform
- hash
- symmetric
- stream
- block
-
- hash
- asymmetric
- one-time pad
- symmetric
-
- block
- hash
- enigma
- stream
- elliptical
-
- ECC
- RSA
- AES
- El-Gamal
- IDEA
-
- impersonation
- spoofing
- factorization
- cryptology
- jamming
-
- guards to monitor security screens
- firewalls to monitor traffic
- swipe cards to allow access to a restricted area
- fences to protect the perimeter of a building
- intrusion detection system (IDS) to watch for suspicious network activity
- biometrics to validate physical characteristics
-
- hiding
- steganography
- obfuscation
- masking
-
- hiring practices
- intrusion detection system (IDS)
- policies and procedures
- background checks
- guard dogs
- encryption
-
- Telnet
- Secure Shell (SSH)
- Advanced Encryption Standard (AES)
- Pretty Good Privacy (PGP)
- Secure File Transfer Protocol (SFTP)
- Secure Sockets Layer (SSL)
-
- detective
- preventive
- masking
- deterrent
-
- key space
- key randomness
- keylogging
- key length
-
- a security key fob ————> something you have
- a fingerprint scan ————> something you are
- a password ————> something you know
-
- steganography —————> hiding data within an audio file
- steganalysis ——————> discovering that hidden information exists within a graphic file
- social steganography ——–> creating a message that says one thing but means something else to a specific audience
- obfuscation ——————> making a message confusing so it is harder to understand
- Other Incorrect Match Options:
- replacing sensitive information in a file with nonsensitive information
-
- WEP
- DES
- RSA
- Diffie-Hellman
- hashing
-
- asymmetric
- one-time pad
- transposition
- symmetric
May 23, 2022 Last Updated: May 23, 2022
Would love your thoughts, please comment.x
← Which two reasons describe why WEP is a weak protocol? (Choose two.)
← What encryption algorithm uses one key to encrypt data and a different key to decrypt data?