Exam 3: Cryptography

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In a(n) ____________________ attack, the attacker eavesdrops on the victim's session and uses statistical analysis of patterns and inter-keystroke timings to discern sensitive session information.

Free
(Short Answer)
4.8/5
(35)
Correct Answer:
Verified

timing

In modulo 26, what happens if a number is larger than 26?

Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
Verified

C

Digital ____ authenticate the cryptographic key that is embedded in the certificate.

Free
(Multiple Choice)
4.7/5
(43)
Correct Answer:
Verified

C

Which cipher is made from a table of 26 distinct cipher alphabets?

(Multiple Choice)
4.9/5
(31)

Public-key encryption is based on a ____.

(Multiple Choice)
4.8/5
(35)

Which symmetric encryption cryptosystems was developed to replace both DES and 3DES?

(Multiple Choice)
4.8/5
(40)

Digital signatures are encrypted messages that can be mathematically proven authentic.

(True/False)
4.8/5
(29)

Describe the exclusive OR operation (XOR) function and explain where XOR encryption is used.

(Essay)
5.0/5
(32)

The XOR encryption method should be used by itself when an organization is transmitting or storing sensitive data.

(True/False)
4.7/5
(38)

Match each item with a statement below. a.Algorithm f.Encipher b.Cryptosystem g.Steganography c.Cryptogram h.Substitution d.Code i.Transposition e.Decipher -The programmatic steps used to convert an unencrypted message into an encrypted sequence of bits that represents the message

(Short Answer)
4.7/5
(32)

Match each item with a statement below. a.Algorithm f.Encipher b.Cryptosystem g.Steganography c.Cryptogram h.Substitution d.Code i.Transposition e.Decipher -The process of replacing plaintext values with other values to form ciphertext

(Short Answer)
4.8/5
(35)

Match each item with a statement below. a.Algorithm f.Encipher b.Cryptosystem g.Steganography c.Cryptogram h.Substitution d.Code i.Transposition e.Decipher -An encryption method or process encompassing the algorithm, key(s) and/or cryptovariable(s), and procedures used to perform encryption and decryption

(Short Answer)
4.8/5
(36)

Why is asymmetric encryption commonly referred to as public-key encryption?

(Essay)
4.8/5
(32)

What is a mathematical trapdoor and how is it used with encryption?

(Essay)
4.8/5
(40)

Which cipher simply rearranges the values within a block to create the ciphertext?

(Multiple Choice)
4.8/5
(37)

____ builds on the encoding format of the MIME protocol and uses digital signatures based on public-key cryptosystems to secure e-mail.

(Multiple Choice)
4.9/5
(42)

Match each item with a statement below. a.Algorithm f.Encipher b.Cryptosystem g.Steganography c.Cryptogram h.Substitution d.Code i.Transposition e.Decipher -To encrypt, encode, or convert plaintext into the equivalent ciphertext

(Short Answer)
4.8/5
(36)

Steganography is technically a form of cryptography.

(True/False)
4.7/5
(34)

Describe Public Key Infrastructure (PKI).

(Essay)
4.8/5
(37)

Explain how to perform the Vernam cipher encryption operation.

(Essay)
4.9/5
(34)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)