1. Which of the following sentences is true?
Evaluate your answer
2. Which of the following sentences is true?
Evaluate your answer
3. When public key cryptography is used to provide confidentiality
Evaluate your answer
4. When public key cryptography is used to provide authentication
Evaluate your answer
5. Regarding the modes of operation of block cipher algorithms, which of the following sentences is false?
Evaluate your answer
6. Which of the following sentences is true regarding modes of operation in block cipher algorithms
Evaluate your answer
7. The state update mechanism
Evaluate your answer
8. Which of the following sentences is false regarding hybrid encryption:
Evaluate your answer
9. Regarding hash functions, is it false that:
Evaluate your answer
10. The digital signature must fulfil:
Evaluate your answer
11. A digital certificate
Evaluate your answer
12. A digital certificate must be revoked when
Evaluate your answer
13. The certification authority
Evaluate your answer
14. Which of the following sentences is false regarding the certificate revocation list (CRL)
Evaluate your answer
15. The use of digital certificates
Evaluate your answer
16. In order to verify a digital signature, it is required
Evaluate your answer
17. Regarding cybercrime, which of the following sentences is false?
Evaluate your answer
18. Examples of active attacks are:
| | a) | |
| | b) | |
| | c) | |
| | d) | |
Evaluate your answer
19. Examples of passive attacks are:
Evaluate your answer
20. Which of the following sentences is a bad prevention tip?
Evaluate your answer