Sample Questions:
Which of the following statements is most accurate regarding a digital signature?
It is a method used to encrypt confidential data.
It is the art of transferring handwritten signature on electronic media
It enables the recipient of data to prove the origin and integrity of data
It can be used as a signature system and a cryptographic system.
None
The selection of encryption keys and data calculations are complex and are not practical for manual use. However, using the mathematical properties of arithmetic modular, a method known as "_________________" RSA is quite feasible to use the computer.
calculation in Galois fields
calculating fields in Gladden
calculating fields in Gallipoli
calculating fields in Galbraith
None
Which of the following concerning the algorithm Rijndael block cipher is false?
The design of Rijndael has been strongly influenced by the design of the block cipher Square.
A total of 25 combinations of key length and the block length are possible .
Both the block size and the key length may be extended to 64-bit multiples.
The cipher has a block length and variable-length key
None
This type of attack is generally more applicable to public-key cryptography, what kind of attack it's me?
chosen-ciphertext attack
Attack with just ciphertext
Plaintext single attack
Adaptive-chosen-plaintext attack
None
What it is not true of a hashing function in one way?
It provides the message authentication
A hash can not be reversed to get the message used to create the hash
The results of a one-way hash is a message digest
It provides for the integrity of the message
None
He works in a forensic laboratory police department where you examine the computer for evidence of crimes. Your work is vital to the success of the criminal prosecution. One day you receive a laptop computer and are part of a two-man team responsible for the examination together. However, it is lunch time and after receiving the laptop is left on the desk and both head off to lunch. What critical step in the forensic evidence have you forgotten?
Chain of custody
Lock your laptop in your desk
By performing a disk image for the examination
Cracking the administrator password with chntpw
None