Test 1 Information[Back] This outlines the details of the first test, and is based on units 1 to 4: Practice Tests

Test details
 Understands the operation of a shiftedalphabet/code shifting encryption. Caeser
 Understands the range of asymmetric encryption algorithms.
 Understands the operation of Vigenere encryption algorithms. Vigenere
 Understands how many encryption keys map to the number of bits in the key.Keys
 Calculates the time to crack a code using brute force, and given specifications. Computing Power
 Calculates the time to crack a code using brute force, with increasing computing power.
 Understands the difference between stream and block encryption.
 Understands the decryption process in publickey encryption.
 Understands the usage of private keys in authentication.
 Understands how the recipient authenticates the sender.
 Understands the main parameters of a digital certificate.
 Understands the applications which are signed by certificates.
 Understands the operation of the MD5 signature. MD5
 Understands the hash conversion to Base64. Base64
 Understands key entropy.Entropy
 Calculates the exchange parameters for the DiffieHellman method. Diffie
 Understands the operation of DiffieHellman.
 Understands the concept of port scanning.
 Understands the concept of host scanning.
 Understands Snort rules for destination ports.
 Understands Snort rules for source ports.
 Understands the direction of TCP ports.
 Understands how an agentbased system can detect threats.
 Understands the usage of client TCP ports.
 Understands the significance of the threeway handshake for a clientserver connection. Entropy
 Understand the usage of the threeway handshake for detection of events.
 Understand the usage of TCP flags.
 Understands Labs 17.