All Coursera Quiz Answers

Test your knowledge: Encryption methods Quiz Answers

In this article i am gone to share Coursera Course: Assets, Threats, and Vulnerabilities Week 2 Practice quiz | Test your knowledge: Encryption methods Quiz Answers with you..

Enroll Link: Assets, Threats, and Vulnerabilities

This is the fifth course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need to apply for an entry-level cybersecurity job. You’ll build on your understanding of the topics that were introduced in the fourth Google Cybersecurity Certificate course.


Also visit:  Test your knowledge: Safeguard information Quiz Answer


 

Test your knowledge: Encryption methods Quiz Answers

Question 1)
Which of the following elements are required when using encryption? Select all that apply.

  • Certificate
  • Key
  • Cipher
  • Token

Question 2)
Which technologies are used in public key infrastructure (PKI) to securely exchange information online? Select two answers.

  • Digital certificates
  • General Data Protection Regulation (GDPR)
  • Encryption algorithms
  • Platform as a service (PaaS)

Question 3)
Fill in the blank: _____ encryption produces a public and private key pair.

  • Hashing
  • Asymmetric
  • Salting
  • Symmetric

Question 4)
An attacker gains access to a database where user passwords are secured with the SHA-256 hashing algorithm. Can the attacker decrypt the user passwords?

  • Yes. Hash algorithms produce a decryption key.
  • No. Hash algorithms do not produce decryption keys.

Question 5)
What term describes being unable to deny that information is authentic?

  • Integrity
  • Confidentiality
  • Non-repudiation
  • Availability