Question 6 of 54

Ferris has been assigned the task of selecting security for his company’s wireless network. It is important that he pick the strongest form of wireless security. Which one of the following is the strongest wireless security?
Answer

Suggested Answer

The suggested answer is C.

Community Votes

No votes yet

Join the discussion to cast yours

Question 7 of 54

Tom is explaining historical cryptography to a class of security students. Which of the following ciphers is a subset of the Vigenère cipher?
Answer

Suggested Answer

The suggested answer is C.

Community Votes1 vote
BMost voted
100%
Question 8 of 54

What is a variation of DES that uses a technique called Key Whitening?
Answer

Suggested Answer

The suggested answer is C.

Community Votes1 vote
CSuggested
100%
Question 9 of 54

While many companies are working on quantum computing, what is the current biggest challenge?
Answer

Suggested Answer

The suggested answer is B.

Community Votes

No votes yet

Join the discussion to cast yours

Question 10 of 54

Which of the following techniques is used (other than brute force) to attempt to derive a key?
Answer

Suggested Answer

The suggested answer is D.

Community Votes

No votes yet

Join the discussion to cast yours