Cryptography and Public Key Infrastructure (PKI) Fundamentals

Discusses cryptography and PKI.

Lily Green
Contributor
4.9
41
30 days ago
Preview (2 of 5)
Sign in to access the full document!
Cryptography and Public Key Infrastructure (PKI) Fundamentals
Question Type: # Of Questions: # Correct:
Multiple Choice 10 10
Grade Details - All Questions
Question 1. Question : (TCO 4) Attackers need a certain amount of information before
launching their attack. One common place to find information that
could be useful to the attacker is to go through the trash of the target.
The process of going through a target's trash is known in the
community as _____.
Student Answer: trash rummaging
garbage surfing
piggy diving
dumpster diving
Instructor
Explanation:
Page 74
Points Received: 3 of 3
Comments:
Question 2. Question : (TCO 4) The art of secret writing that enables an individual to hide the
contents of a message from all but the intended recipient is called
_____.
Student Answer: steganography
cryptanalysis
cryptography
key management
Instructor
Explanation:
Page 82
Points Received: 3 of 3
Preview Mode

Sign in to access the full document!

100%

Study Now!

XY-Copilot AI
Unlimited Access
Secure Payment
Instant Access
24/7 Support
Document Chat

Document Details

Subject
Information Technology

Related Documents

View all