Exam 21: Cryptography and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____________________ is a technique to detect changes to information rather than encrypt and decrypt information.

Free
(Short Answer)
4.8/5
(31)
Correct Answer:
Verified

Hashing

____ ciphers encrypt any number of bits

Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
Verified

C

A(n) ____________________ is a special word, phrase, or binary number that is used during encryption or decryption to manipulate the data.

Free
(Short Answer)
4.9/5
(29)
Correct Answer:
Verified

key

In ____ encryption, the single key must be shared between the individuals wishing to protect their data.

(Multiple Choice)
4.8/5
(27)

The ____ determines the level of data protection provided by the encryption technique.

(Multiple Choice)
4.9/5
(39)

Discuss the encryption strength of symmetric and asymmetric encryption.

(Essay)
4.7/5
(30)

A(n) ____________________ cipher is an algorithm that encrypts or decrypts blocks of data, such as 64-bit or 128-bit chunks of information at a time.

(Short Answer)
4.9/5
(33)

Symmetric encryption is generally thought to be more secure than asymmetric encryption.

(True/False)
4.7/5
(35)

Keeping secrets has become a major force in networking and communication.

(True/False)
4.8/5
(27)

The ____________________ of the WAV file determines how much data can be hidden inside it.

(Short Answer)
4.8/5
(41)

In the ____ cipher technique, the letters of the alphabet are shifted one or more positions to obtain the encryption alphabet.

(Multiple Choice)
4.8/5
(34)

How is data hidden inside a WAV?

(Essay)
4.9/5
(33)

Hashed data can be unhashed and turned back into their original form.

(True/False)
4.9/5
(32)

In ____ encryption, the private key is kept private, in the hands of a single individual.

(Multiple Choice)
4.8/5
(33)

Describe symmetric encryption.

(Essay)
4.9/5
(42)

A ____ is visible or invisible information added to an image, video, or audio that identifies the copyright owner of the media.

(Multiple Choice)
4.7/5
(32)

The hash value is called a ____.

(Multiple Choice)
4.8/5
(30)

Describe asymmetric encryption.

(Essay)
4.8/5
(40)
Match each item with a statement below.
Involves taking encrypted information and putting it back into the original form
Asymmetric encryption
Two keys are used to encrypt and decrypt the data
Symmetric encryption
A single key is used to encrypt and decrypt the data
Decryption
Correct Answer:
Verified
Premises:
Responses:
Involves taking encrypted information and putting it back into the original form
Asymmetric encryption
Two keys are used to encrypt and decrypt the data
Symmetric encryption
A single key is used to encrypt and decrypt the data
Decryption
The process to change something easy to read into something that is difficult to read
Encryption
Involves taking data and coding it into a different, unreadable form
Cryptography
(Matching)
4.9/5
(39)

Asymmetric encryption algorithms use ____________________ keys to perform the encryption and decryption.

(Short Answer)
4.8/5
(37)
Showing 1 - 20 of 26
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)