100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

NETSEC 3 Exam Questions and Answers 100% Pass

Rating
-
Sold
-
Pages
32
Grade
A+
Uploaded on
05-02-2025
Written in
2024/2025

NETSEC 3 Exam Questions and Answers 100% Pass 1) ________ is the use of mathematical operations to protect messages travelling between parties or stored on a computer. A) Cryptography B) Encryption C) Authentication D) Confidentiality - A 2) ________ is the security guarantee that people who intercept messages cannot read them. A) Integrity B) Availability C) Confidentiality D) Encryption - C 3) Which of the following is transmitted across a network? 2Brittie Donald, All Rights Reserved © 2025 A) The plaintext B) The ciphertext C) Both A and B D) Neither A nor B - B 4) A ________ is a mathematical process used in encryption and decryption. A) key B) cipher C) plaintext D) coding method - B 5) A ________ is a random string of 40 to 4,000 bits (ones and zeros) used to encrypt messages. A) key B) cipher C) plaintext D) code - A 6) Someone who breaks encryption is called a ________. A) cracker 3Brittie Donald, All Rights Reserved © 2025 B) coder C) hacker D) cryptanalyst - D 7) ________ ciphers move letters around within a message but characters are not substituted. A) Transposition B) Substitution C) Both A and B D) Neither A nor B - A 8) ________ ciphers leave letters in their original positions. A) Transposition B) Substitution C) Both A and B D) Neither A nor B - B 9) In codes, code symbols may represent _______

Show more Read less
Institution
NETSEC
Module
NETSEC











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
NETSEC
Module
NETSEC

Document information

Uploaded on
February 5, 2025
Number of pages
32
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

NETSEC 3 Exam Questions and
Answers 100% Pass

1) ________ is the use of mathematical operations to protect messages travelling

between parties or stored on a computer.


A) Cryptography


B) Encryption


C) Authentication


D) Confidentiality - ✔✔A


2) ________ is the security guarantee that people who intercept messages cannot read

them.


A) Integrity


B) Availability


C) Confidentiality


D) Encryption - ✔✔C


3) Which of the following is transmitted across a network?



Brittie Donald, All Rights Reserved © 2025 1

,A) The plaintext


B) The ciphertext


C) Both A and B


D) Neither A nor B - ✔✔B


4) A ________ is a mathematical process used in encryption and decryption.


A) key


B) cipher


C) plaintext


D) coding method - ✔✔B


5) A ________ is a random string of 40 to 4,000 bits (ones and zeros) used to encrypt

messages.


A) key


B) cipher


C) plaintext


D) code - ✔✔A


6) Someone who breaks encryption is called a ________.


A) cracker



Brittie Donald, All Rights Reserved © 2025 2

,B) coder


C) hacker


D) cryptanalyst - ✔✔D


7) ________ ciphers move letters around within a message but characters are not

substituted.


A) Transposition


B) Substitution


C) Both A and B


D) Neither A nor B - ✔✔A


8) ________ ciphers leave letters in their original positions.


A) Transposition


B) Substitution


C) Both A and B


D) Neither A nor B - ✔✔B


9) In codes, code symbols may represent ________.


A) complete words


B) complete phrases



Brittie Donald, All Rights Reserved © 2025 3

, C) individual letters


D) All of the above - ✔✔D


10) When two parties communicate with each other using symmetric key encryption,

how many keys are used in total to encrypt and decrypt?


A) 1


B) 2


C) 4


D) 8 - ✔✔A


11) Nearly all encryption for confidentiality uses ________ encryption ciphers.


A) public key


B) symmetric key


C) hashing


D) None of the above - ✔✔B


12) Nearly all encryption for confidentiality uses symmetric key encryption ciphers. -

✔✔TRUE


13) The best way to thwart exhaustive searches by cryptanalysts is ________.


A) to use codes



Brittie Donald, All Rights Reserved © 2025 4
£9.97
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
BrittieDonald Howard Community College
Follow You need to be logged in order to follow users or courses
Sold
406
Member since
2 year
Number of followers
162
Documents
20923
Last sold
1 day ago
BrittieDonald Study Solutions.

Get Help in Your Due Online and Actual Exams, Assignments with Well Researched and Up-to date Study Materials for Guaranteed Success

3.4

91 reviews

5
41
4
13
3
7
2
5
1
25

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions