7.11. Review Questions
What is the process of deriving an encrypted value from a mathematical process called?
Hashing
Asymmetric
Symmetric
Social engineering
During a training session, you want to impress upon users how serious security and, in particular, cryptography is. To accomplish this, you want to give them as much of an overview about the topic as possible. Which government agency should you mention is primarily responsible for establishing government standards involving cryptography for general-purpose government use?
NSA
NIST
IEEE
ITU
Assuming asymmetric encryption, if data is encoded with a value of 5, what would be used to decode it?
5
1
1/5
0
You're a member of a consortium wanting to create a new standard that will effectively end all spam. After ...
Get CompTIA Security+™ Deluxe: Study Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.