0
[{"id":412465,"quiz_id":"20976","answer_id":null,"answerType_id":"0","created_at":"2018-03-22 00:16:38","updated_at":"2018-03-22 00:18:07","questionName":"A message digest is a product of which kind of algorithm?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":4,"explanation":"A message digest is a product of a hashing algorithm, which may also be called a message digest function.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412461,"quiz_id":"20976","answer_id":null,"answerType_id":"0","created_at":"2018-03-22 00:16:38","updated_at":"2018-03-22 00:18:07","questionName":"Symmetric cryptography is also known as __________.","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":0,"explanation":"Symmetric cryptography is also known as shared key cryptography.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412475,"quiz_id":"20976","answer_id":null,"answerType_id":"0","created_at":"2018-03-22 00:16:38","updated_at":"2018-03-22 00:18:07","questionName":"In IPsec, what does Authentication Header (AH) provide?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":14,"explanation":"The Authentication Header provides authentication services to data, meaning that the sender of the data can be authenticated by the receiver of the data.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412467,"quiz_id":"20976","answer_id":null,"answerType_id":"0","created_at":"2018-03-22 00:16:38","updated_at":"2018-03-22 00:18:07","questionName":"A public key is stored on the local computer by its owner in a __________.","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":6,"explanation":"A public key is not necessarily stored on the local system, but a private key will always be present if the user is enrolled.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412474,"quiz_id":"20976","answer_id":null,"answerType_id":"0","created_at":"2018-03-22 00:16:38","updated_at":"2018-03-22 00:18:07","questionName":"In IPsec, encryption and other processes happen at which layer of the OSI model?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":13,"explanation":"IPsec operates at the Network layer, or Layer 3, of the OSI model, unlike many previous techniques.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412471,"quiz_id":"20976","answer_id":null,"answerType_id":"0","created_at":"2018-03-22 00:16:38","updated_at":"2018-03-22 00:18:07","questionName":"Which of the following best describes PGP?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":10,"explanation":"PGP is a method of encrypting stored data to include emails, stored data, and other similar information. It is a form of public and private key encryption.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412466,"quiz_id":"20976","answer_id":null,"answerType_id":"0","created_at":"2018-03-22 00:16:38","updated_at":"2018-03-22 00:18:07","questionName":"A public and private key system differs from symmetric because it uses which of the following?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":5,"explanation":"A public and private key are mathematically related keys, but they are not identical. In symmetric systems only one key is used at a time.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412470,"quiz_id":"20976","answer_id":null,"answerType_id":"0","created_at":"2018-03-22 00:16:38","updated_at":"2018-03-22 00:18:07","questionName":"Which of the following is a common hashing protocol?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":9,"explanation":"MD5 is the most widely used hashing algorithm, followed very closely by SHA1 and the SHA family of protocols.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412468,"quiz_id":"20976","answer_id":null,"answerType_id":"0","created_at":"2018-03-22 00:16:38","updated_at":"2018-03-22 00:18:07","questionName":"Symmetric key systems have key distribution problems due to __________.","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":7,"explanation":"The number of keys increases dramatically with more and more parties using symmetric encryption; hence it does not scale well.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412473,"quiz_id":"20976","answer_id":null,"answerType_id":"0","created_at":"2018-03-22 00:16:38","updated_at":"2018-03-22 00:18:07","questionName":"Which system does SSL use to function?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":12,"explanation":"PKI is used in the process of making SSL function. While it is true that AES, DES, and 3DES can be used in SSL connections, PKI is the only one used consistently in all situations.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412469,"quiz_id":"20976","answer_id":null,"answerType_id":"0","created_at":"2018-03-22 00:16:38","updated_at":"2018-03-22 00:18:07","questionName":"What does hashing preserve in relation to data?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":8,"explanation":"Hashing is intended to verify and preserve the integrity of data, but it cannot preserve the confidentiality of that data.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412464,"quiz_id":"20976","answer_id":null,"answerType_id":"0","created_at":"2018-03-22 00:16:38","updated_at":"2018-03-22 00:18:07","questionName":"Which of the following best describes hashing?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":3,"explanation":"Hashing is referred to as a cipher or algorithm or even a cryptosystem, but it can be uniquely referred to as a nonreversible mechanism for verifying the integrity of data. Remember that hashing doesn\u2019t enforce confidentiality.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412462,"quiz_id":"20976","answer_id":null,"answerType_id":"0","created_at":"2018-03-22 00:16:38","updated_at":"2018-03-22 00:18:07","questionName":"Which of the following manages digital certificates?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":1,"explanation":"A certificate authority is responsible for issuing and managing digital certificates as well as keys.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412463,"quiz_id":"20976","answer_id":null,"answerType_id":"0","created_at":"2018-03-22 00:16:38","updated_at":"2018-03-22 00:18:07","questionName":"Asymmetric encryption is also referred to as which of the following?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":2,"explanation":"Asymmetric encryption uses two separate keys and is referred to as public key cryptography. Symmetric algorithms use only one key that is used by both the sender and receiver.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412472,"quiz_id":"20976","answer_id":null,"answerType_id":"0","created_at":"2018-03-22 00:16:38","updated_at":"2018-03-22 00:18:07","questionName":"SSL is a mechanism for which of the following?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":11,"explanation":"SSL is used to secure data when it is being transmitted from client to server and back. The system is supported by most clients, including web browsers and email clients.","question_score_id":null,"lang":null,"questionAudioPath":null}]