Exam 8: Encryption

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

IPsec can only encrypt the packet data but not the header information.

Free
(True/False)
4.9/5
(37)
Correct Answer:
Verified

False

_________ is a block cipher that uses a variable-length key ranging from 32 to 448 bits.

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

C

Which of these is NOT one of the two basic types of cryptography?

Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
Verified

C

A(n)________ refers to the bits that are combined with the plain text to encrypt it.

(Multiple Choice)
4.8/5
(31)

Using the __________ cipher you choose some number by which to shift each letter of a text.

(Multiple Choice)
4.9/5
(38)

Using the _________ cipher you select multiple numbers by which to shift letters.

(Multiple Choice)
4.8/5
(25)

__________ is the art to write in or decipher secret code.

(Multiple Choice)
4.8/5
(38)

Kerberos is an authentication protocol that uses a ticket granting system that sends an encrypted ticket to the user's machine.

(True/False)
4.9/5
(34)

A(n)___________is a mathematical process for doing something.

(Multiple Choice)
4.8/5
(38)

With ______________ encryption,one key is used to encrypt a message,and another is used to decrypt the message.

(Multiple Choice)
4.8/5
(32)

With asymmetric cryptography a different ______ is used to encrypt the message and to decrypt the message.

(Multiple Choice)
4.9/5
(32)

Cipher text is encrypted text.

(True/False)
4.8/5
(39)

Which of these is NOT a type of symmetric algorithm?

(Multiple Choice)
4.9/5
(24)

______________ is the process to scramble a message or other information so that it cannot be easily read.

(Multiple Choice)
4.8/5
(38)

Which of the following is an operation used on binary numbers not found in normal math?

(Multiple Choice)
4.8/5
(28)

__________refers to encrypted text.

(Multiple Choice)
4.9/5
(27)

PGP involves only private key encryption.

(True/False)
4.8/5
(35)

Public key encryption is fast becoming the most widely used type of encryption because there are no issues to deal with concerning distribution of keys.

(True/False)
4.9/5
(33)

A virtual private network is a way to use the Internet to create a connection between a remote user and a central location.

(True/False)
4.7/5
(29)

Windows stores passwords using a method called __________.

(Multiple Choice)
4.8/5
(42)
Showing 1 - 20 of 25
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)