Cyber security quiz 4
Alice and Bob would like to communicate with each other using a session key but they do not already have a shared secret key. Which algorithm can they use to exchange a secret key?
Diffie-Hellman
What protocol is responsible for assigning IP addresses to host on most networks
Dynamic host configuration protocol (DHCP)
You must always use the same algorithm to encrypt information and decrypt the same information
False
Violet deploys an intrusion prevention system (IPS) on her network as a security control. What type of control has violet deployed ?
Preventive
Which approach to cryptography provides the strongest theoretical protection
Quantum cryptography
Alan is the security manager for a midsize business. The company has suffered several series data losses when mobile devices were stolen. Allen decides to implement full disk encryption on all mobile devices. What risk response did Alan take
Reduce
Purchasing insurance insurance policy is an example of____ risk management strategy
Transfer
Business Impact Analysis (BIA) details The steps to recover from a disruption and restore the infrastructure necessary for normal business operations
True
Distance learning is another term for online study
True
What type of network connect systems over the largest geographic area
WAN
Which information security objective allows trusted entities to endorse information
certification
Betty receives a cipher text message from her colleague Tim. What type of function does Betty need to use to read the plaintext message?
decryption
Gary is sending a message to Patricia. He wants to ensure that nobody tampers with the message while it is in transit. What goal of cryptography is Gary attempting to achieve?
integrity
Which type of cipher works by rearranging the characters in the message
transposition