Q1. In order to understand RS you must understand the key generation algorithm as well as the encryption and decryption algorithms. Which one of the following equations describes the encryption process for RSA?
A.Me mod n
B. Ce mod n
C. y2 = x3 + Ax + B
D. P = Cd mod n
Correct Answer: B
Q2. Why is quantum computing a threat to RSA?
A.The processing speed will brute force algorithms
B. Quantum computers can solve the discrete logarithm problem
C. Quantum computers can solve the birthday paradox
D. Quantum computers can factor large integers in polynomial time
v
Q3. Which one of the following wireless standards uses AES using the Counter Mode-Cipher Block Chaining (CBC)-Message Authentication Code (MAC) Protocol (CCMP)?
A.WEP2
B. WPA
C. WEP
D. WPA2
Correct Answer: D
Q4. Why is quantum computing a threat to RSA?
A.The processing speed will brute force algorithms
B. Quantum computers can solve the discrete logarithm problem
C. Quantum computers can solve the birthday paradox
D. Quantum computers can factor large integers in polynomial time
Correct Answer: D
$ 39
Reviews
There are no reviews yet.