Advanced Encryption Standard is an algorithm used for which of the following?
Advanced Encryption Standard is an algorithm used for which of the following?
Which of the following provides only authentication, non-repudiation, and integrity?
In cryptography, different steps and algorithms provide different types of security services. Which of the following provides only authentication, non-repudiation, and integrity?
Which of the following best describes how a digital signature is created?
Which of the following best describes how a digital signature is created?
Which of the following is not an attribute of a good stream cipher?
There are two main types of symmetric ciphers: stream and block. Which of the following is not an attribute of a good stream cipher?
Which of the following works similarly to stream ciphers?
Which of the following works similarly to stream ciphers?
How many keys are required?
Mandy needs to calculate how many keys must be generated for the 260 employees using the company’s PKI asymmetric algorithm. How many keys are required?
Which of the following incorrectly describes a principle of secure key management?
Sally is responsible for key management within her organization. Which of the following incorrectly describes a principle of secure key management?
Which of the following incorrectly describes a requirement for implementation?
If implemented properly, a one-time pad is a perfect encryption scheme. Which of the following incorrectly describes a requirement for implementation?
What sets it apart from other asymmetric algorithms?
An elliptic curve cryptosystem is an asymmetric algorithm. What sets it apart from other asymmetric algorithms?
Which of the following best describes Key Derivation Functions (KDFs)?
Which of the following best describes Key Derivation Functions (KDFs)?