Exam 12: Cryptography

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

When an attacker has access to a password file,they can run a password-cracking program that uses a dictionary of known words or passwords as an input file.What type of attack is this attacker performing?

Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
Verified

D

Which of the following is a range of allowable values that is used to generate an encryption key?

Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
Verified

C

Which of the following refers to verifying the sender or receiver (or both)is who they claim to be?

Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
Verified

A

Which function ensures that a sender and receiver cannot deny sending or receiving a specific message?

(Multiple Choice)
4.8/5
(34)

If a security expert decides to study the process of breaking encryption algorithms,they are performing which of the following?

(Multiple Choice)
4.9/5
(29)

Cryptography is the process of converting plaintext,which is readable text,into unreadable or encrypted text called which if the following?

(Multiple Choice)
4.7/5
(31)

What is an encryption algorithm?

(Essay)
4.8/5
(27)

What is a digital signature?

(Essay)
4.8/5
(32)

In what type of attack does the attacker need access to the cryptosystem,and the ciphertext to be decrypted to yield the desired plaintext results?

(Multiple Choice)
4.9/5
(36)

What type of attack is being conducted when the attacker has messages in both encrypted form and decrypted forms?

(Multiple Choice)
4.9/5
(29)

Which of the following is a scripting language for Windows and Linux that performs repetitive tasks,such as password cracking?

(Multiple Choice)
4.9/5
(36)

Which of the following is the process of converting ciphertext back into plaintext?

(Multiple Choice)
4.8/5
(36)

Match each item with a statement below. -Used to find the same hash value for two different inputs and reveal any mathematical weaknesses in a hashing algorithm

(Multiple Choice)
4.8/5
(40)

How can confidentiality and authentication be achieved using public key cryptography?

(Essay)
5.0/5
(35)

What type of attack is being performed when an attacker intercepts the initial communications between a Web server and a Web browser while forcing a vulnerable server to insecurely renegotiate the encryption being used down to a weaker cipher?

(Multiple Choice)
4.7/5
(35)

What is a certificate?

(Essay)
4.9/5
(31)

Match each item with a statement below. -The use of random data alongside plaintext as an input to a hashing function so that the output is unique

(Multiple Choice)
4.8/5
(29)

What is Triple Data Encryption Standard (3DES)?

(Essay)
5.0/5
(36)

What encryption algorithm can be used for both encryption and digital signing,uses a one-way function,and is still widely used in e-commerce?

(Multiple Choice)
4.8/5
(30)

Match each item with a statement below. -Uses two keys: one to encrypt data and one to decrypt data

(Multiple Choice)
4.8/5
(37)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)