In the name of ALLAH, the Most Beneficent, the Most Merciful

Cs627 Quiz 1 Fall 2024

Cs627 Quiz 1 Fall 2024

 

Cs627 Quiz 1 Fall 2024



Which encryption algorithm is considered asymmetric encryption technique?

 

Answer: RSA

 

What is the relationship between CVE and the National Vulnerability Database (NVD)?

 

Answer: CVE feeds into NVD, providing vulnerability data for analysis and reporting.

 

Which step in a Feistel Network involves applying a round function to the right half of the data?

 

Answer: XOR operation

 

Which encryption algorithm was selected as the Advanced Encryption Standard (AES) by NIST?

 

Answer: Rijndael

 

In vulnerability management life cycle, “Remediate” is the __________ step.

 

Answer: 3

 

There are _______ steps of vulnerability management life cycle.

 

Answer: 7

 

What is the purpose of a digital certificate in public-key cryptography?

 

Answer: Authentication

 

What is the minimum key length required for RSA encryption?

 

Answer: 1024 bits

 

Which of the following options is not a Qualys deployment option?

 

Answer: Mobile application

 

Which of the following is a feature of Nessus that helps in prioritizing vulnerabilities?

 

Answer: Risk scoring

Post a Comment (0)
Previous Post Next Post
z
//1