A) asymmetric algorithm
B) DEA
C) symmetric algorithm
D) certificate
E) hashing algorithm
F) birthday attacks
G) stream cipher
H) PKI
I) key
J) salt
Correct Answer
verified
Multiple Choice
A) asymmetric algorithm
B) DEA
C) symmetric algorithm
D) certificate
E) hashing algorithm
F) birthday attacks
G) stream cipher
H) PKI
I) key
J) salt
Correct Answer
verified
Multiple Choice
A) chosen-ciphertext
B) chosen-plaintext
C) known plaintext
D) ciphertext-only
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) John the Ripper
B) Hydra (THC)
C) Pwdump3v2
D) L0phtcrack
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) asymmetric algorithm
B) DEA
C) symmetric algorithm
D) certificate
E) hashing algorithm
F) birthday attacks
G) stream cipher
H) PKI
I) key
J) salt
Correct Answer
verified
Multiple Choice
A) RSA algorithm
B) hashing algorithm
C) data algorithm
D) VLS algorithm
Correct Answer
verified
Multiple Choice
A) asymmetric algorithm
B) DEA
C) symmetric algorithm
D) certificate
E) hashing algorithm
F) birthday attacks
G) stream cipher
H) PKI
I) key
J) salt
Correct Answer
verified
Multiple Choice
A) RSA
B) DES
C) ECC
D) IDEA
Correct Answer
verified
Showing 41 - 50 of 50
Related Exams