Cyber Attack Countermeasures : Module 4 Quiz
#cyber #quiz #coursera #exam #module #answers
1.
CBC mode cryptography involves which of the following?
Correct! CBC mode is specifically designed to close covert communication channels in block encryption algorithms.
2.
Which is a true statement?
Correct! The symmetric key based method inherent in conventional cryptography does not scale well to large groups.
3.
Public Key Cryptography involves which of the following?
Correct! Public keys, by definition, are publicly known.
4.
Which is a true statement?
This is a correct statement!
5.
Public Key Cryptography accomplishes secrecy through which of the following?
Correct! Secrecy is accomplished via encrypting with the public key of the recipient.
6.
Public Key Cryptography accomplishes digital signatures which of the following?
Correct! A digital signature is accomplished by encrypting with the sender’s secret key.
7.
Which is a true statement?
Correct! All are true statements.
8.
Certification authorities support public key management through what means?
Correct! CAs bind names to public keys and the result is a certificate.
9.
Secure Sockets Layer (SSL) relies on which of the following?
Correct! SSL relies on certificate being embedded in browsers.
10.
James Ellis and Clifford Cocks deserve credit for which of the following?
Correct! In addition to inventing public key technology, they also showed great honest and integrity by not compromising secret government information.
Comments