Assessments
Chapter 1 – Protecting Data in Motion or at Rest
b. 1972
a. integrity
d. signature
d. authentication
b. Asymmetric
b. Substitution
c. transposition
The answer to the secret code in Figure 1.10 : Confidentiality is keeping private data private by protecting against unauthorized disclosure . This may have looked complex, but I substituted Wingdings font for the regular font!
Chapter 2 – The Evolution of Ciphers
c. scytale
b. substitution
a. Vigenère
d. 1876
a. Enigma
d. 01010011
a. Lucifer
Chapter 3 – Evaluating Network Attacks
d. Passive
c. Active
a. vector
d. appliances
c. vulnerability
b. vulnerabilities
a. Social engineering
Chapter 4 – Introducing Symmetric Encryption
d. Feistel
a. 1000
b. Lucifer
c. a single shared key
d. shift rows
d. Twofish
c. padding
b. XOR
a. CTR
d. WPA3
Chapter 5 – Dissecting Asymmetric Encryption
b. Diffie-Hellman
d. #10
c. RSA
a. hybrid
c. point
d. Web of Trust
b. HMAC
Chapter 6 – Examining Hash Algorithms
b. digest
d. HMAC
a. big
c. deterministic
a. Rivest
b. Keccak
c. CBC-MAC
Chapter 7 – Adhering to Standards
b. SHS
c. PCI DSS
d. HIPAA
c. GDPR
a. Ransomware
b. VoIP
a. CALEA
Chapter 8 – Using a Public Key Infrastructure
c. keychain
a. Kerberos
b. Stapling
d. CSR
a. pinning
d. 2048
b. X.509
c. organization
Chapter 9 – Exploring IPsec and TLS
a. PPTP
d. SSH
b. ESP
d. transport
c. PFS
b. IKE
a. handshake
c. Record
Chapter 10 – Protecting Cryptographic Techniques
b. DNS
a. ARP
d. 24-bits
c. Firesheep
a. certificate
b. entanglement
a. superposition
..................Content has been hidden....................
You can't read the all page of ebook, please click
here login for view all page.