0
[{"id":58215,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-21 19:56:08","updated_at":"2016-04-21 19:56:08","questionName":"Which of the following statements pertaining to key management is INCORRECT?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":55037,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-16 00:24:50","updated_at":"2016-04-16 00:24:50","questionName":"To replace one letter of the alphabet by another value. It is sometimes accomplished by shifting the alphabet x number of places.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":53741,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-13 01:09:38","updated_at":"2016-04-13 01:18:22","questionName":"Which crypto cipher type is Diffie-Hellman?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":0,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":60419,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-29 01:18:07","updated_at":"2016-04-29 01:18:07","questionName":"What is the maximum allowable key size of the Rijndael encryption algorithm?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":60426,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-29 01:29:38","updated_at":"2016-04-29 01:29:38","questionName":"You are trying a new product out that can encrypt files which can then be mounted and appears as a disk drive on your computer when it's unlocked. As you install the product you are prompted to randomly run your mouse around to generate some random data for the application to use? What is this randomness called in the crypto world?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":60425,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-29 01:28:34","updated_at":"2016-04-29 01:28:34","questionName":"In this Block Cipher method of encryption, a relationship between the plaintext and the encryption key is so complicated that an attacker can't alter the plaintext to determine the key.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":60422,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-29 01:22:46","updated_at":"2016-04-29 01:22:46","questionName":"Which of the following is more suitable for a hardware implementation?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":55036,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-16 00:23:58","updated_at":"2016-04-16 00:23:58","questionName":"Block Cipher that scrambles the message by reordering the plaintext.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":55034,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-16 00:22:03","updated_at":"2016-04-16 00:22:03","questionName":"In this Block Cipher method of encryption, a single bit change in the plain text results in multiple changes permutated throughout the rest of the encryption cycles so in the end, the ciphertext has completely changed.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":60423,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-29 01:25:01","updated_at":"2016-04-29 01:25:01","questionName":"Which of the following would best define a digital envelope?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":55035,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-16 00:23:10","updated_at":"2016-04-16 00:23:10","questionName":"Uses a relationship between plaintext and the key that is so complex the attacker can't alter the plaintext, examine the cipher text to determine the key.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":53744,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-13 01:11:31","updated_at":"2016-04-13 01:18:22","questionName":"What type of crypto cipher is RSA?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":3,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":60424,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-29 01:27:17","updated_at":"2016-04-29 01:27:17","questionName":"Public Key Infrastructure (PKI) consists of programs, data formats, procedures, communication protocols, security policies, and public key cryptographic mechanisms working in a comprehensive manner to enable a wide range of dispersed people to communicate in a secure and predictable fashion. This infrastructure is based upon which of the following standard?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":53743,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-13 01:11:05","updated_at":"2016-04-13 01:18:22","questionName":"What type of crypto cipher is ECC?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":2,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":53742,"quiz_id":"4279","answer_id":null,"answerType_id":"0","created_at":"2016-04-13 01:10:24","updated_at":"2016-04-13 01:18:22","questionName":"What type of crypto cipher is El Galmal: DH+nonrepudiation?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":1,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null}]