Sample questions
Q1. Cryptographic algorithms would include all of the these except?
Data Encryption Standard
Advanced Encryption Standard
Transport Layer Security
Message Digest Algorithm
Q2. Which one of the following is called a crypto variable?
Plain Text
Cipher Text
Cipher
Cryptographic Key
Q3. Identify the best explanation from the following for a digital signature?
Applying senders private key to the message
Applying senders public key to the message
Applying receivers private key to the message
Applying receivers public key to the message
Q4. When a specific key is authorized for use by legitimate entities, and that usage is based on time, it is known as what?
Cryptanalysis
Cryptography
Crypto period
Key usage
Q5. Which one of the following is a type of cryptanalytic attack?
Chosen image
Chosen plaintext
Adaptive image parameter
Adaptive plain-cipher text
Q6. Which one of the following is an application of IPSec?
Wireless Application Protocol
Virtual Private Networking
S/MIME
Social engineering
Q7. An image file...