Cryptography and Public Key Infrastructure (PKI) Fundamentals
Discusses cryptography and PKI.
Lily Green
Contributor
4.4
45
5 months ago
Preview (2 of 5 Pages)
100%
Purchase to unlock
Page 1
Loading page image...
Cryptography and Public Key Infrastructure (PKI) FundamentalsQuestion Type:# Of Questions:# Correct:Multiple Choice1010Grade Details-All QuestionsQuestion1.Question :(TCO 4) Attackers need a certain amount of informationbeforelaunching their attack. One common place to find information thatcould be useful to the attacker is to go through the trash of the target.The process of going through a target's trash is known in thecommunity as _____.Student Answer:trash rummaginggarbage surfingpiggy divingdumpster divingInstructorExplanation:Page 74Points Received:3 of 3Comments:Question2.Question :(TCO 4) The art of secret writing that enables anindividual to hide thecontents of a message from all but the intended recipient is called_____.Student Answer:steganographycryptanalysiscryptographykey managementInstructorExplanation:Page 82PointsReceived:3 of 3
Page 2
Loading page image...
Preview Mode
This document has 5 pages. Sign in to access the full document!