11/10/2019Module 3 Quiz - Security Engineering: Information Security.Fall20191/16Module 3 Quiz - Security EngineeringDueNov 10 at 11:59pmPoints100Questions25AvailableNov 4 at 12am - Nov 10 at 11:59pm 7 daysTime Limit90 MinutesInstructionsA±empt HistoryAttemptTimeScoreLATESTAttempt 1 67 minutes64 out of 100Score for this quiz: 64out of 100Submitted Nov 10 at 6:33pmThis attempt took 67 minutes.You may only take the quiz once. Find the detailed information in Module 3 Quiz instruction. Clickthe Take the Quizbutton below to begin the quiz.0 / 4 ptsQuestion 1The strength of all cryptographically based mechanisms lies in large part inwhich of the following?The strength of the key size The protection provided to secret key material The security of communication protocol The strength of the cryptographic algorithm orrect Answerorrect AnswerYou AnsweredYou Answered4 / 4 ptsQuestion 2
11/10/2019Module 3 Quiz - Security Engineering: Information Security.Fall20192/16A birthday attack is targeted at which of the following?Correct!Correct!4 / 4 ptsQuestion 3Asymmetric authentication is susceptible to known attacks due to which ofthe following?Correct!Correct!
11/10/2019Module 3 Quiz - Security Engineering: Information Security.Fall20193/16