Cs627 Quiz 1 Fall 2024
Which encryption algorithm is considered asymmetric encryption technique?
Answer: RSA
What is the relationship between CVE and the National Vulnerability Database (NVD)?
Answer: CVE feeds into NVD, providing vulnerability data for analysis and reporting.
Which step in a Feistel Network involves applying a round function to the right half of the data?
Answer: XOR operation
Which encryption algorithm was selected as the Advanced Encryption Standard (AES) by NIST?
Answer: Rijndael
In vulnerability management life cycle, “Remediate” is the __________ step.
Answer: 3
There are _______ steps of vulnerability management life cycle.
Answer: 7
What is the purpose of a digital certificate in public-key cryptography?
Answer: Authentication
What is the minimum key length required for RSA encryption?
Answer: 1024 bits
Which of the following options is not a Qualys deployment option?
Answer: Mobile application
Which of the following is a feature of Nessus that helps in prioritizing vulnerabilities?
Answer: Risk scoring