0% found this document useful (0 votes)
161 views4 pages

Quiz - Cryptography and The Public Key Infrastructure - Attempt Review2

Uploaded by

busola Taiwo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
161 views4 pages

Quiz - Cryptography and The Public Key Infrastructure - Attempt Review2

Uploaded by

busola Taiwo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

5/14/24, 1:46 PM Quiz: Cryptography and the Public Key Infrastructure: Attempt review

 FCF - Technical Introduction to Cybersecurity 1.0 Self-Paced


Started on Tuesday, May 14, 2024, 8:33 PM
State Finished
Completed on Tuesday, May 14, 2024, 8:45 PM
Time taken 12 mins 27 secs
Points 7/10
Grade 70 out of 100
Feedback I'm sorry, you did not pass.

Question 1

Incorrect

0 points out of 1

During the encryption process, where symmetric and asymmetric cryptography are used, which key is used to encrypt the session (symmetric)
key?

Select one:
The sender’s private key
The sender’s public key 
The receiver’s private key
The receiver’s public key

Question 2

Correct

1 points out of 1

Which two entities are necessary components of a PKI? (Choose two.)

Select one or more:


Microsoft CAPI
CA
Firewall
RA

https://training.fortinet.com/mod/quiz/review.php?attempt=18979115&cmid=485444 1/4
5/14/24, 1:46 PM Quiz: Cryptography and the Public Key Infrastructure: Attempt review

Question 3

Correct

1 points out of 1

Which two features are characteristics of hashing? (Choose two.)

Select one or more:


Obfuscation data process
Fixed-length output value
Non-reversible process
Random output value

Question 4

Correct

1 points out of 1

Identify two symmetric algorithms. (Choose two.)

Select one or more:


RSA
IDEA
AES
DSA

Question 5

Correct

1 points out of 1

Which statement best describes cryptography?

Select one:
A method for ensuring network safety
The study of writing or solving codes
The process of converting plaintext to ciphertext
A secure session between a web browser and a web server

https://training.fortinet.com/mod/quiz/review.php?attempt=18979115&cmid=485444 2/4
5/14/24, 1:46 PM Quiz: Cryptography and the Public Key Infrastructure: Attempt review

Question 6
Correct

1 points out of 1

Identify three cipher method types. (Choose three.)

Select one or more:


Transpositional
Abacus
Bletchley Park
One-time pad
Substitution

Question 7

Correct

1 points out of 1

In a PKI, what is the ultimate source of trust?

Select one:
Local municipal laws in which the CA resides
PKI policy and procedures
The registration authority
The private key of the root CA

Question 8

Incorrect

0 points out of 1

Which two security requirements are satisfied by a digital signature? (Choose two.)

Select one or more:


Authentication
Confidentiality
Data integrity
Authorization 

https://training.fortinet.com/mod/quiz/review.php?attempt=18979115&cmid=485444 3/4
5/14/24, 1:46 PM Quiz: Cryptography and the Public Key Infrastructure: Attempt review

Question 9
Incorrect

0 points out of 1

Which statement best describes hashing?

Select one:
The art of writing or solving codes
The process of converting plaintext to ciphertext 
The process of generating a unique value that can be tied legally to an entity
The process of converting data of an arbitrary size to a unique value of a fixed size

Question 10
Correct

1 points out of 1

What ingredient is added during the BCRYPT key stretching process to increase entropy?

Select one:
A static known value
MAC
Salt
Verification code

https://training.fortinet.com/mod/quiz/review.php?attempt=18979115&cmid=485444 4/4

You might also like