0% found this document useful (0 votes)
23 views4 pages

Quiz - Cryptography and The Public Key Infrastructure - Attempt Review

The document is a review of a quiz on Cryptography and the Public Key Infrastructure, completed on July 5, 2024, with a score of 85 out of 100. It includes details on the questions answered correctly and incorrectly, covering topics like symmetric algorithms, digital signatures, PKI components, and characteristics of hashing. The feedback indicates that the participant passed the quiz.

Uploaded by

eduard9411
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views4 pages

Quiz - Cryptography and The Public Key Infrastructure - Attempt Review

The document is a review of a quiz on Cryptography and the Public Key Infrastructure, completed on July 5, 2024, with a score of 85 out of 100. It includes details on the questions answered correctly and incorrectly, covering topics like symmetric algorithms, digital signatures, PKI components, and characteristics of hashing. The feedback indicates that the participant passed the quiz.

Uploaded by

eduard9411
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

4/7/24, 21:37 Quiz: Cryptography and the Public Key Infrastructure: Attempt review

 FCF - Technical Introduction to Cybersecurity 1.0 Self-Paced


Started on Friday, July 5, 2024, 3:30 AM
State Finished
Completed on Friday, July 5, 2024, 3:36 AM
Time taken 6 mins 1 sec
Points 9/10
Grade 85 out of 100
Feedback Congratulations, you passed!

Question 1

Correct

1 points out of 1

Identify two symmetric algorithms. (Choose two.)

Select one or more:


IDEA
AES
RSA
DSA

Question 2
Incorrect

0 points out of 1

Which two security requirements are satisfied by a digital signature? (Choose two.)

Select one or more:


Confidentiality 
Data integrity
Authorization
Authentication

https://training.fortinet.com/mod/quiz/review.php?attempt=19454897&cmid=485444 1/4
4/7/24, 21:37 Quiz: Cryptography and the Public Key Infrastructure: Attempt review

Question 3

Correct

1 points out of 1

What ingredient is added during the BCRYPT key stretching process to increase entropy?

Select one:
MAC
Salt
A static known value
Verification code

Question 4

Partially correct

1 points out of 1

Which two entities are necessary components of a PKI? (Choose two.)

Select one or more:


RA
Microsoft CAPI
Firewall
CA

Question 5

Correct

1 points out of 1

Identify three cipher method types. (Choose three.)

Select one or more:


One-time pad
Substitution
Bletchley Park
Transpositional
Abacus

https://training.fortinet.com/mod/quiz/review.php?attempt=19454897&cmid=485444 2/4
4/7/24, 21:37 Quiz: Cryptography and the Public Key Infrastructure: Attempt review

Question 6
Correct

1 points out of 1

Which security requirement does encryption satisfy?

Select one:
Data integrity
Confidentiality
Non-repudiation
Authentication

Question 7

Correct

1 points out of 1

Which two features are characteristics of hashing? (Choose two.)

Select one or more:


Fixed-length output value
Non-reversible process
Random output value
Obfuscation data process

Question 8
Correct

1 points out of 1

During the encryption process, where symmetric and asymmetric cryptography are used, which key is used to encrypt the session (symmetric)
key?

Select one:
The receiver’s private key
The sender’s public key
The sender’s private key
The receiver’s public key

https://training.fortinet.com/mod/quiz/review.php?attempt=19454897&cmid=485444 3/4
4/7/24, 21:37 Quiz: Cryptography and the Public Key Infrastructure: Attempt review

Question 9
Correct

1 points out of 1

Which statement best describes cryptography?

Select one:
The process of converting plaintext to ciphertext
The study of writing or solving codes
A secure session between a web browser and a web server
A method for ensuring network safety

Question 10
Correct

1 points out of 1

Which statement best describes hashing?

Select one:
The process of converting data of an arbitrary size to a unique value of a fixed size
The process of converting plaintext to ciphertext
The art of writing or solving codes
The process of generating a unique value that can be tied legally to an entity

https://training.fortinet.com/mod/quiz/review.php?attempt=19454897&cmid=485444 4/4

You might also like