Exam 6: Encryption

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

An improvement over the Caesar cipher is based on ____________ substitution.

Free
(Short Answer)
4.9/5
(30)
Correct Answer:
Verified

multi-alphabet

Which is a block cipher developed by Belgian researchers and providing 128-,192-,and 256-bit key sizes?

Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
Verified

A

XOR is a mathematical operation on performed on ____________ numbers that results in the basis for data encryption.

Free
(Short Answer)
4.8/5
(38)
Correct Answer:
Verified

binary

Which is a public key encryption standard developed by three mathematicians in 1977 that provides very high but slow security?

(Multiple Choice)
4.9/5
(36)

Which is NOT a part of a step in the XOR operation of encryption method.

(Multiple Choice)
4.8/5
(24)

The ____________ cipher is a very old encryption method used by ancient Romans.

(Short Answer)
4.8/5
(42)

Which is a powerful password cracker that works on Windows and Linux platforms?

(Multiple Choice)
4.8/5
(33)

Information about an individual or organizational identity,their public key,and its expiration date is contained in a digital certificate issued by a(n)____________.

(Short Answer)
4.8/5
(34)

Which is NOT an encryption method?

(Multiple Choice)
4.9/5
(41)

Which is a weakness of Data Encryption Standard?

(Multiple Choice)
4.9/5
(30)

Many encryption techniques such as XOR are easily broken because:

(Multiple Choice)
4.9/5
(32)

Which is NOT a way in which quantum physics might improve encryption in the future?

(Multiple Choice)
4.7/5
(42)

Operations not found in normal math that can be performed on binary numbers include all of the following EXCEPT:

(Multiple Choice)
4.8/5
(41)

Changing a message in a such a way that it can be read easily by the intended recipient but cannot be read easily by any intercepting party is called ____________.

(Short Answer)
4.9/5
(40)

Which is a symmetric block cipher developed in 1993 that provides variable-length key sizes ranging from 32 to 448 bits?

(Multiple Choice)
4.8/5
(36)

Attempting to determine a password by simply trying every possible combination within the set parameters until successful is called:

(Multiple Choice)
4.7/5
(33)

Limiting failed log in attempts minimizes the possibility that attackers will eventually determine a password while using software that repeatedly tries a large range of possibilities in a(n)____________ attack.

(Short Answer)
4.9/5
(38)

A free,non-commercial,symmetric block cipher called ____________ uses a variable-length key ranging from 32 to 448 bits.

(Short Answer)
4.7/5
(38)

Which type of encrypted communication is most common?

(Multiple Choice)
4.8/5
(43)

A(n)____________ is actually data attached to a file or e-mail to provide verification of the identity and\or origin of the file or e-mail.

(Short Answer)
4.8/5
(34)
Showing 1 - 20 of 25
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)