Exam 3: Cryptography

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which algorithm was the first asymmetric, or public-key, encryption algorithm developed (in 1977) and published for commercial use?

(Multiple Choice)
4.8/5
(45)

Match each item with a statement below. a.Algorithm f.Encipher b.Cryptosystem g.Steganography c.Cryptogram h.Substitution d.Code i.Transposition e.Decipher -The process of converting components (words or phrases) of an unencrypted message into encrypted components

(Short Answer)
4.9/5
(38)

____ provides verification that a message was sent by a particular sender and cannot be refuted.

(Multiple Choice)
4.8/5
(42)

What protocol is planned as a replacement for TKIP in WPA?

(Multiple Choice)
4.9/5
(43)

Bit stream methods commonly use algorithm functions like ____.

(Multiple Choice)
4.9/5
(26)

Which cipher uses a stencil or template with holes cut out?

(Multiple Choice)
4.8/5
(37)

Why was WPA2 created?

(Essay)
4.8/5
(44)

An X.509 v3 certificate binds a ____, which uniquely identifies a certificate entity, to a user's public key.

(Multiple Choice)
4.9/5
(47)

The science of encryption, known as ____________________, encompasses both cryptography and cryptanalysis.

(Short Answer)
4.9/5
(42)

Describe three functions of a certificate authority (CA).

(Essay)
4.8/5
(36)

Match each item with a statement below. a.Algorithm f.Encipher b.Cryptosystem g.Steganography c.Cryptogram h.Substitution d.Code i.Transposition e.Decipher -To decrypt, decode, or convert ciphertext into the equivalent plaintext

(Short Answer)
4.7/5
(35)

Encryption methodologies that require the same secret key to encipher and decipher the message are using ____ encryption or symmetric encryption.

(Multiple Choice)
4.8/5
(35)

When deploying ciphers, users have to decide on the ____ of the cryptovariable or key.

(Multiple Choice)
4.8/5
(32)

____________________ keys are limited-use symmetric keys for temporary communications; they allow two organizations to conduct quick, efficient, secure communications based on symmetric encryption.

(Short Answer)
4.9/5
(36)

____________________ functions are mathematical algorithms that generate a message summary or digest (sometimes called a fingerprint) that can be used to confirm the identity of a specific message and/or confirm that there have not been any changes to the content.

(Short Answer)
4.8/5
(36)

Match each item with a statement below. a.Algorithm f.Encipher b.Cryptosystem g.Steganography c.Cryptogram h.Substitution d.Code i.Transposition e.Decipher -The process of rearranging plaintext values to form ciphertext

(Short Answer)
4.7/5
(43)

____ is an open-source protocol framework for security development within the TCP/IP family of protocol standards.

(Multiple Choice)
4.9/5
(33)

Where is information most vulnerable?

(Multiple Choice)
4.7/5
(37)

Hash ____ are mathematical functions that create a hash value, also known as a message digest, by converting variable-length messages into a single fixed-length value.

(Multiple Choice)
4.9/5
(48)

Match each item with a statement below. a.Algorithm f.Encipher b.Cryptosystem g.Steganography c.Cryptogram h.Substitution d.Code i.Transposition e.Decipher -The encoded message resulting from an encryption

(Short Answer)
4.9/5
(30)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)