Cryptography & PKI | Test-1

0%
0

Cryptography & PKI | Test-1

This section rigorously assesses the implementation of cryptographic controls and Public Key Infrastructure (PKI) within the system. It includes testing the use of secure and modern encryption algorithms, ensuring that cryptographic keys are generated, stored, and rotated securely, and evaluating key management procedures for compliance with industry standards. The section also examines the integrity of digital signatures, the correct usage of certificates, certificate authorities (CAs), and the strength of TLS/SSL configurations. It ensures that encryption is applied effectively for data in transit and at rest, safeguarding sensitive information and preventing unauthorized access or data breaches. Additionally, tests cover protocol security to prevent common vulnerabilities like weak ciphers, improper certificate validation, and man-in-the-middle (MITM) attacks.

1 / 22

1. What is cryptography?

2 / 22

2. Which of the following describes how cryptography is used?

3 / 22

3. The art of breaking crypto systems and gaining access to encrypted data with no key is known as ________

4 / 22

4. A method\mechanism that encrypts or disguises text by means of substitution , transposition etc. is known as:

5 / 22

5. Which of the following is NOT a classic cipher method/technique?

6 / 22

6. Which of the following is NOT a modern cipher method/technique?

7 / 22

7. A Simple ______ cipher uses the same cipher text symbol (Caesar) to replace every letter in the plaintext.

8 / 22

8. A ________ cipher encodes a message by re-ordering the plaintext according to some well-defined system/key.

9 / 22

9. A ________ cipher converts a fixed-length block of plaintext data into an equivalent-length block of cipher text (encrypted text).

10 / 22

10. A _______ cipher encrypts plaintext on per-bit/per byte basis and is faster compared to block ciphers

11 / 22

11. ________is a type of encryption technique where a random key that is as long as the message is generated and used only once. Each bit of the key is exclusive to a corresponding bit in the message, providing a theoretically unbreakable form of encryption when used correctly.

12 / 22

12. Itโ€™s a method of hiding data in another media type so the very existence of the data is concealed:

13 / 22

13. What are the two main types of cryptography?

14 / 22

14. Another name for symmetric cryptography is __________.

15 / 22

15. One of the following terms is also used to describe asymmetric encryption?

16 / 22

16. Which of the following algorithm is a symmetric Algorithm?

17 / 22

17. Which of the following is NOT an asymmetric Algorithm?

18 / 22

18. A function that take a potentially long message and generate a unique output value derived from the content of the message is known as __________

19 / 22

19. Which of the following function is assured by the use of a hashing?

20 / 22

20. Which of the following is a mandatory requirement of a Hashing function?

21 / 22

21. ______________ facilitates secure, trusted communication between parties previously unknown to each other

22 / 22

22. Which one of the following algorithms can be applied to ensure that messages being sent, stored, or in transit are authentic?

Your score is

The average score is 0%

0%

Related challenges :