SEC280 Week 3 Quiz New (2019) – Full Score – Study Guide – Perfect Solution

Lab Price = $9
Please feel free to send us your queries at: [email protected]
P.S: This is just a study guide. The questions may not appear exactly like this.
Payment methods

Add to Cart

Buy Now

View Cart


Problem Statement
Question 1
(TCO 4) The Vigenère cipher works as a(n) _____.
1. asymmetric-encryption cipher
2. transposition and substitution cipher
3. polyalphabetic-transposition cipher
4. polyalphabetic-substitution cipher

Question 2
(TCO 4) What is a registration authority?
1. An entity that requires proof of identity from the individual requesting a certificate.
2. An entity that generates a digitally signed identification certificate
3. A centralized directory where the registered certificate is stored
4. An entity that generates electronic credentials

Question 3
(TCO 4) A corporate spy copies proprietary information into a text file and then hides the text file in an image file. The image file is then posted on the company’s website for others who know where to look to extract the information. This is the example of _____.
1. social engineering
2. steganography
3. cryptography
4. cryptanalysis

Question 4
(TCO 4) Keyspace refers to _____.
1. the location where keys are stored
2. the number of keys needed to encrypt or decrypt a message
3. all the possible key values
4. the portion of the algorithm that the key connects with to encrypt or decrypt a message

Question 5
(TCO 4) Which of the following is not a hashing algorithm?
1. SHA1
2. MD2
3. SHA13
4. MD5

Question 6
(TCO 4) What is a public-key infrastructure?
1. A structure that enables parties to use communications such as e-mail
2. A structure that provides all of the components needed for entities to communicate securely and in a predictable manner
3. A structure that enables secure communications in chat rooms and when instant messaging and text messaging
4. Another name for digital signatures

Question 7
(TCO 5) What is a certificate repository?
1. A directory that calculates a message digest for the certificate
2. An entity that generates electronic credentials
3. A directory that requires a centralized infrastructure
4. A centralized directory where the registered certificate is stored

Question 8
(TCO 4) Attackers need a certain amount of information before launching their attack. One common place to find information that could be useful to the attacker is to go through the trash of the target. The process of going through a target’s trash is known in the community as _____.
1. trash rummaging
2. garbage surfing
3. piggy diving
4. dumpster diving

Question 9
(TCO 5) What are the different fields within a digital certificate?

1. Version number, subject, public key, issuer, serial number, validity, and certificate
2. Usage, signature algorithm, and extensions
3. Key encipherment, data encipherment, CRL sign, keycert sign, and nonrepudiation
4. End entity, CA, cross certification, and policy certification

Question 10
(TCO 5) An in-house certificate authority is _____.
1. a CA that is already established and being used by many individuals and companies
2. a certificate authority that is maintained and controlled by the company that implemented it
3. a CA that provides dedicated services, and possibly equipment, to an individual company
4. a CA that provides more flexibility for companies

Relevant Material
Instructions
* If you want to purchase multiple products then click on “Buy Now” button which will give you ADD TO CART option.Please note that the payment is done through PayPal.
* You can also use 2CO option if you want to purchase through Credit Cards/Paypal but make sure you put the correct billing information otherwise you wont be able to receive any download link.
* Your paypal has to be pre-loaded in order to complete the purchase or otherwise please discuss it with us at [email protected].
* As soon as the payment is received, download link of the solution will automatically be sent to the address used in selected payment method.
* Please check your junk mails as the download link email might go there and please be patient for the download link email. Sometimes, due to server congestion, you may receive download link with a delay.
* All the contents are compressed in one zip folder.
* In case if you get stuck at any point during the payment process, please immediately contact us at [email protected] and we will fix it with you.
* We try our best to reach back to you on immediate basis. However, please wait for atleast 8 hours for a response from our side. Afterall, we are humans.
* Comments/Feedbacks are truely welcomed and there might be some incentives for you for the next lab/quiz/assignment.
* In case of any query, please donot hesitate to contact us at [email protected].
* MOST IMPORTANT Please use the tutorials as a guide and they need NOT to be used for any submission. Just take help from the material.
******************************************** Good Luck ***************************************************
Privacy Policy
We take your privacy seriously and will take all measures to protect your personal information.
Any personal information received will only be used to fill your order. We will not sell or redistribute your information to anyone.
Refund Policy
Incase you face any issues with the tutorial, please free to contact us on [email protected]
We will try our best to resolve the issue and if still persists we can discuss for a refund in case its required.
Lab Price = $9
Please feel free to send us your queries at: [email protected]

Payment methods

Add to Cart

Buy Now

View Cart

Leave a Reply