0
[{"id":53743,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-13 01:11:05","updated_at":"2016-04-13 01:18:22","questionName":"What type of crypto cipher is ECC?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":2,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":60426,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-29 01:29:38","updated_at":"2016-04-29 01:29:38","questionName":"You are trying a new product out that can encrypt files which can then be mounted and appears as a disk drive on your computer when it's unlocked. As you install the product you are prompted to randomly run your mouse around to generate some random data for the application to use? What is this randomness called in the crypto world?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":55035,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-16 00:23:10","updated_at":"2016-04-16 00:23:10","questionName":"Uses a relationship between plaintext and the key that is so complex the attacker can't alter the plaintext, examine the cipher text to determine the key.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":55034,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-16 00:22:03","updated_at":"2016-04-16 00:22:03","questionName":"In this Block Cipher method of encryption, a single bit change in the plain text results in multiple changes permutated throughout the rest of the encryption cycles so in the end, the ciphertext has completely changed.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":60424,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-29 01:27:17","updated_at":"2016-04-29 01:27:17","questionName":"Public Key Infrastructure (PKI) consists of programs, data formats, procedures, communication protocols, security policies, and public key cryptographic mechanisms working in a comprehensive manner to enable a wide range of dispersed people to communicate in a secure and predictable fashion. This infrastructure is based upon which of the following standard?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":60422,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-29 01:22:46","updated_at":"2016-04-29 01:22:46","questionName":"Which of the following is more suitable for a hardware implementation?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":55037,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-16 00:24:50","updated_at":"2016-04-16 00:24:50","questionName":"To replace one letter of the alphabet by another value. It is sometimes accomplished by shifting the alphabet x number of places.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":53742,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-13 01:10:24","updated_at":"2016-04-13 01:18:22","questionName":"What type of crypto cipher is El Galmal: DH+nonrepudiation?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":1,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":60425,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-29 01:28:34","updated_at":"2016-04-29 01:28:34","questionName":"In this Block Cipher method of encryption, a relationship between the plaintext and the encryption key is so complicated that an attacker can't alter the plaintext to determine the key.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":55036,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-16 00:23:58","updated_at":"2016-04-16 00:23:58","questionName":"Block Cipher that scrambles the message by reordering the plaintext.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":60419,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-29 01:18:07","updated_at":"2016-04-29 01:18:07","questionName":"What is the maximum allowable key size of the Rijndael encryption algorithm?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":58215,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-21 19:56:08","updated_at":"2016-04-21 19:56:08","questionName":"Which of the following statements pertaining to key management is INCORRECT?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":53744,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-13 01:11:31","updated_at":"2016-04-13 01:18:22","questionName":"What type of crypto cipher is RSA?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":3,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":53741,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-13 01:09:38","updated_at":"2016-04-13 01:18:22","questionName":"Which crypto cipher type is Diffie-Hellman?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":0,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":60423,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-29 01:25:01","updated_at":"2016-04-29 01:25:01","questionName":"Which of the following would best define a digital envelope?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null}]