Test your knowledge: Encryption methods Quiz Answers
In this article i am gone to share Coursera Course: Assets, Threats, and Vulnerabilities Week 2 Practice quiz | Test your knowledge: Encryption methods Quiz Answers with you..
Enroll Link: Assets, Threats, and Vulnerabilities
This is the fifth course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need to apply for an entry-level cybersecurity job. You’ll build on your understanding of the topics that were introduced in the fourth Google Cybersecurity Certificate course.
Also visit: Test your knowledge: Safeguard information Quiz Answer
Test your knowledge: Encryption methods Quiz Answers
Question 1)
Which of the following elements are required when using encryption? Select all that apply.
- Certificate
- Key
- Cipher
- Token
Question 2)
Which technologies are used in public key infrastructure (PKI) to securely exchange information online? Select two answers.
- Digital certificates
- General Data Protection Regulation (GDPR)
- Encryption algorithms
- Platform as a service (PaaS)
Question 3)
Fill in the blank: _____ encryption produces a public and private key pair.
- Hashing
- Asymmetric
- Salting
- Symmetric
Question 4)
An attacker gains access to a database where user passwords are secured with the SHA-256 hashing algorithm. Can the attacker decrypt the user passwords?
- Yes. Hash algorithms produce a decryption key.
- No. Hash algorithms do not produce decryption keys.
Question 5)
What term describes being unable to deny that information is authentic?
- Integrity
- Confidentiality
- Non-repudiation
- Availability