Copyright
Computer Science 202: Network and System Security  /  Computer Science Courses

Test Prep Plan - Take a practice test

Take this practice test to check your existing knowledge of the course material. We'll review your answers and create a Test Prep Plan for you based on your results.
How Test Prep Plans work
1
Answer 50 questions
Test your existing knowledge.
2
View your test results
Based on your results, we'll create a customized Test Prep Plan just for you!
3
Study smarter
Study more effectively: skip concepts you already know and focus on what you still need to learn.

Network Encryption Chapter Exam

Exam Instructions:

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Page 1

Question 1 1. What replaced TKIP?

Question 2 2. What does AES stand for?

Question 3 3. Secure user authentication in cryptography is achieved by _____.

Question 4 4. Cryptography is used to conceal data in transmission by the use of _____.

Question 5 5. _____ is the process of converting information in one form, to another.

Page 2

Question 6 6. RSA is commonly used for _____.

Question 7 7. Encryption is based on _____.

Question 8 8. The roots of modern encryption can be traced back almost _____ years.

Question 9 9. _____ is the process of converting information in one form, to another.

Question 10 10. Public key encryption uses _____ to encrypt and decrypt.

Page 3

Question 11 11. Symmetric encryption uses:

Question 12 12. A key is:

Question 13 13. The acronym AES stands for?

Question 14 14. The National Institute of Standards and Technology (NIST) released AES in what year?

Question 15 15. The Data Encryption Standard:

Page 4

Question 16 16. A benefit of symmetric encryption is:

Question 17 17. The network transport layer is _____.

Question 18 18. HTTP stands for _____.

Question 19 19. _____ determine(s) if an attacker has captured or altered message packets passed between the client and the sender.

Question 20 20. WPA stands for _____.

Page 5

Question 21 21. The _____ is the message that will be encrypted

Question 22 22. In symmetric encryption the key is _____ by sender and receiver

Question 23 23. This method uses two keys as part of its encryption/decryption

Question 24 24. IPSec stands for:

Question 25 25. What did WPA include that WEP did NOT?

Page 6

Question 26 26. In cryptography, checksums are used to _____.

Question 27 27. RSA is named after the researchers (_____ ) who proposed it.

Question 28 28. Modern encryption is classified as _____ or _____.

Question 29 29. Public key encryption strength relies on the fact that _____ is hard, and _____ is easy.

Question 30 30. Encryption strength is a measure of:

Network Encryption Chapter Exam Instructions

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Support