What is a key feature of a cryptographic hash function?
Correct
Incorrect
Question 2 of 36
2. Question
True or False: Collision resistance means that it is computationally infeasible to find two different inputs that hash to the same output.
Correct
Incorrect
Question 3 of 36
3. Question
What do you call a method of encryption where each character in the plaintext is shifted a certain number of places down or up the alphabet?
Correct
Incorrect
Question 4 of 36
4. Question
True or False: A monoalphabetic cipher is one in which each occurrence of a letter in the plaintext is replaced by a single, different letter.
Correct
Incorrect
Question 5 of 36
5. Question
What makes symmetric encryption fast and efficient?
Correct
Incorrect
Question 6 of 36
6. Question
True or False: In symmetric encryption, the same key is used for both encryption and decryption.
Correct
Incorrect
Question 7 of 36
7. Question
In a block cipher, what happens if the plaintext is not of the correct size?
Correct
Incorrect
Question 8 of 36
8. Question
True or False: In a stream cipher, the keystream must be unique and an initialization vector (IV) must not be reused with the same key.
Correct
Incorrect
Question 9 of 36
9. Question
In an asymmetric encryption, what happens if the public key is used to encrypt a message?
Correct
Incorrect
Question 10 of 36
10. Question
True or False: Asymmetric encryption is primarily used for bulk data encryption.
Correct
Incorrect
Question 11 of 36
11. Question
What is the advantage of Elliptic curve cryptography (ECC) over RSA’s algorithm?
Correct
Incorrect
Question 12 of 36
12. Question
True or False: The RSA cipher is an example of a trapdoor function.
Correct
Incorrect
Question 13 of 36
13. Question
True or False: Key recovery and escrow ensure the confidentiality and integrity of data processed by systems.
Correct
Incorrect
Question 14 of 36
14. Question
What is the purpose of M-of-N control in key management?
Correct
Incorrect
Question 15 of 36
15. Question
True or False: Key recovery and escrow require careful vetting of staff authorized to manage certificate services.
Correct
Incorrect
Question 16 of 36
16. Question
What are the potential consequences of an expired certificate?
Correct
Incorrect
Question 17 of 36
17. Question
True or False: Renewing a certificate with a new key pair enhances the certificate’s security.
Correct
Incorrect
Question 18 of 36
18. Question
Why is it important to validate the permissions of users assigned to manage certificate services?
Correct
Incorrect
Question 19 of 36
19. Question
How does OCSP stapling address the resource-intensive nature of OCSP responders?
Correct
Incorrect
Question 20 of 36
20. Question
True or False: OCSP responders can be used to monitor and record client browser requests, raising privacy concerns.
Correct
Incorrect
Question 21 of 36
21. Question
What is the purpose of providing OCSP responses via OCSP stapling?
Correct
Incorrect
Question 22 of 36
22. Question
What is the main goal of certificate pinning?
Correct
Incorrect
Question 23 of 36
23. Question
True or False: Certificate pinning relies on embedding certificate data in the application code.
Correct
Incorrect
Question 24 of 36
24. Question
What is the primary vulnerability associated with HTTP Public Key Pinning (HPKP)?
Correct
Incorrect
Question 25 of 36
25. Question
Who typically issues the digital certificates used in SSL/TLS?
Correct
Incorrect
Question 26 of 36
26. Question
Both SSL and TLS use the same mechanisms for data encryption.
Correct
Incorrect
Question 27 of 36
27. Question
Why is SSL/TLS important for E-Commerce?
Correct
Incorrect
Question 28 of 36
28. Question
True or False: Without SSL/TLS, email services could expose sensitive messages during transmission.
Correct
Incorrect
Question 29 of 36
29. Question
In the Key Exchange Phase of an SSL/TLS connection, what is created?
Correct
Incorrect
Question 30 of 36
30. Question
True or False: The Application Data Protocol transfers encrypted data during an SSL/TLS session.
Correct
Incorrect
Question 31 of 36
31. Question
True or False: SSL/TLS security protocols can guarantee the security of data both in transit and at rest.
Correct
Incorrect
Question 32 of 36
32. Question
Salting a password hash prevents an attacker from using pre-computed tables of hashes, which necessitates the recompilation of hash values with a specific salt for each password.
Correct
Incorrect
Question 33 of 36
33. Question
What is a key concern when a cryptographic system utilizes user-generated data, such as passwords?
Correct
Incorrect
Question 34 of 36
34. Question
In the context of cryptographic security, what does the term “longevity” refer to?
Correct
Incorrect
Question 35 of 36
35. Question
Which type of cryptographic attack exploits the vulnerability where a server is tricked into using a lower specification protocol with weaker ciphers and key lengths?
Correct
Incorrect
Question 36 of 36
36. Question
Which of the following is a purpose of a birthday attack in the context of cryptography?
Correct
Incorrect
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.