7.11. Review Questions

  1. What is the process of deriving an encrypted value from a mathematical process called?

    1. Hashing

    2. Asymmetric

    3. Symmetric

    4. Social engineering

  2. During a training session, you want to impress upon users how serious security and, in particular, cryptography is. To accomplish this, you want to give them as much of an overview about the topic as possible. Which government agency should you mention is primarily responsible for establishing government standards involving cryptography for general-purpose government use?

    1. NSA

    2. NIST

    3. IEEE

    4. ITU

  3. Assuming asymmetric encryption, if data is encoded with a value of 5, what would be used to decode it?

    1. 5

    2. 1

    3. 1/5

    4. 0

  4. You're a member of a consortium wanting to create a new standard that will effectively end all spam. After ...

Get CompTIA Security+™ Deluxe: Study Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.