1.
What classic cipher is shown in this image?
2.
Which one of the following is an incorrect mod equation?
3.
Which of the following answers is the word SECURITY after having been encrypted using a Transposition Cipher?
4.
DES is often defined as no longer "secure enough" to handle high security requirements. Why is this?
5.
Which cryptographic process took advantage of a physical machine using rotors?
6.
When using multiple alphabets, what type of cipher is being used?
7.
The computer you are currently using is running Linux, and you are logged into the system with your normal user account. An application you wish to run requires root access to execute. Which of the following can you do to have the application execute, and not have the security of the system lowered?
8.
You have decided to alter the default permissions of files on your SuSe Linux system. To do so, you are going to change the umask settings. Where is the umask setting located?
9.
Which of the following pieces of information are found in the Inode, on a Linux system?
10.
You wish to manage your Linux system remotely, using a web browser. Which of the following tools will allow you to accomplish your task?