Exam 5: Cryptography and Data Protection

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is data encryption standard (DES)?

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

A

_______ of information means, only authorized users are capable of accessing the information.

Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
Verified

D

This helps in identifying the origin of information and authentic user. This referred to here as __________

Free
(Multiple Choice)
4.7/5
(33)
Correct Answer:
Verified

C

In asymmetric key cryptography, the two keys e and d, have special relationship to

(Multiple Choice)
4.8/5
(29)

_________________ is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa.

(Multiple Choice)
4.7/5
(27)

______________ is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it.

(Multiple Choice)
4.8/5
(27)

When you use the word ______it means you are protecting your data from getting disclosed.

(Multiple Choice)
4.9/5
(38)

Which is the largest disadvantage of the symmetric Encryption?

(Multiple Choice)
4.9/5
(38)

A asymmetric-key (or public key ) cipher uses

(Multiple Choice)
4.7/5
(40)

A company requires its users to change passwords every month. This improves the ________ of the network.

(Multiple Choice)
4.7/5
(32)

In asymmetric key cryptography, the private key is kept by __________

(Multiple Choice)
4.8/5
(37)

What type of attack uses a fraudulent server with a relay address?

(Multiple Choice)
4.7/5
(31)

The procedure to add bits to the last block is termed as _________________

(Multiple Choice)
4.9/5
(35)

Conventional cryptography is also known as _____________ or symmetric-key encryption.

(Multiple Choice)
4.8/5
(32)

The ________ is encrypted text.

(Multiple Choice)
4.9/5
(38)

Which one of the following algorithm is not used in asymmetric-key cryptography?

(Multiple Choice)
4.9/5
(35)

What does OSI stand for in the OSI Security Architecure?

(Multiple Choice)
4.9/5
(34)

In cryptography, the order of the letters in a message is rearranged by __________

(Multiple Choice)
4.9/5
(36)

Data ___________ is used to ensure confidentiality.

(Multiple Choice)
4.7/5
(32)

_______ means the protection of data from modification by unknown users.

(Multiple Choice)
4.9/5
(43)
Showing 1 - 20 of 22
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)