- The public key has been changed
- The personal key has been changed
- The digital message has been changed
- The message is properly encrypted
Multiple choice questions on network security deployment have the answer P6
- Question 1. What happens when a notice has been modified?
- Question 2. Which of the following is a development standard for creating secure messages?
- Data Encryption Standard
- Digital Signature Standard
- Secure Hash Algorithm
- Standard data signature
-
- Question 3. If the attacker stole a password containing one-way encrypted password, what kind of attack would she perform to find the encrypted password?
- Man-in-the-middle attack
- Attack on Birthday
- Denial of Service
- Attack Dictionary
-
- Question 4. What are the advantages of RSA compared to DSS?
- It can give digital signatures and coding functions
- It uses less resources and faster encryption because it uses symmetric keys
- It is a block cipher compared to a stream cipher
- It uses one-time encryption pad
-
- Question 5. What is used to create a digital signature?
- The recipient's private key
- The sender's public key
- Sender's private key
- The recipient's public key
-
- Question 6. Which of the following is the best way to describe an electronic signature?
- A method of transferring a handwritten signature to an electronic document
- A method of encrypting confidential information
- A method to provide an electronic signature and encryption
- A method for letting the recipients of the message prove the origin and integrity of a message
-
- Question 7. Using multiple bits with DES to be effective?
- 16
- 32
- 65
- 56
-
- Question 8. Factors affecting the encoding process
- Encryption, decoding algorithms, and safety of transmission channels
- Time for coding and decoding
- Perform block encryption, expand the number of bits to handle
- All is wrong
-
- Question 9. For packet filtering firewall, which of the following attacks is performed?
- Duplicate IP addresses, attack between, attack borders
- Duplicate IP addresses, attack source paths, attack small samples
- Duplicate IP addresses, attack through firewalls, attack small samples
- Duplicate IP addresses, attack through firewalls, attack source paths
-
- Question 10. Who is involved in the development of the first public key encryption system?
- Adi Shamir
- Ross Anderson
- Bruce Schneier
- Martin Hellman
-
Update 24 May 2019
Network safetytestinggood questionsinformation securitynetwork administrationhow to ensure network safety
You should read it
- Multiple choice questions about network security implementation have the answer P7
- Multiple choice questions about network security implementation have P2 answers
- Multiple choice questions on network security implementation have P3 answers
- Multiple choice questions about network safety deployment have the answer P1
- Multiple choice questions about network security implementation have the answer P5
- Multiple choice questions on network security deployment have the answer P4
- Multiple choice questions about network security deployment have answers
- You have confidence in your knowledge of Network Administration P5
- Are you confident with your Network Administration knowledge P4
- You have confidence in your network administration knowledge P9
- You have confidence in your knowledge of Network Administration P7
- Are you confident with your Network Administration knowledge P6
Maybe you are interested
What is Xbox Game Pass? Xbox Game Pass Vietnam Microsoft will add a cloud-based Xbox Game Pass option How to use Xbox Game Pass for free 6 reasons why users stick with Xbox Game Pass 5 disadvantages of Xbox Game Pass to keep in mind Among Us will support Xbox in 2021, coming with a new map of Airship