Exam 5: Cryptography, Elliptic Curves, and Email Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

_________is the method for keeping sensitive information in email communication & accounts secure against unofficial access, loss, or compromise.

Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
Verified

A

In public key cryptosystem_______ keys are used for encryption and decryption.

Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
Verified

B

"In ECC, the inverse of point P =(x1, y1) is Q = (-x1, y1). "

Free
(True/False)
4.8/5
(38)
Correct Answer:
Verified

False

Which of them is not a major way of stealing email information?

(Multiple Choice)
4.8/5
(46)

In Elgamal cryptosystem, given the prime p=31,What is the respective plaintext character for C = (27, 20)?

(Multiple Choice)
4.9/5
(32)

Using email hacking illicit hackers can send & spread______virus________and spam emails.

(Multiple Choice)
4.8/5
(38)

PGP system uses

(Multiple Choice)
5.0/5
(37)

Which algorithm can be used to sign a message?

(Multiple Choice)
4.9/5
(41)

A cryptographic hash function has variable output length.

(True/False)
4.7/5
(32)

There are________major ways of stealing email information.

(Multiple Choice)
4.8/5
(46)

Which of them is an example of grabbing email information?

(Multiple Choice)
4.9/5
(37)

Fraudulent email messages are some fake email messages that seem legitimate which asks for your confidential bank details such as________details and passwords.

(Multiple Choice)
4.9/5
(36)

How many real and imaginary roots does the equation y2=x3-4x have

(Multiple Choice)
4.8/5
(35)

In the elliptic curve group defined by y2= x3- 17x + 16 over real numbers, what is P + Q if P = (0,-4) and Q = (1, 0)?

(Multiple Choice)
4.8/5
(33)

Unsolicited Bulk E-mails (UBI) are called

(Multiple Choice)
4.9/5
(38)

A set of numbers is called as super increasing if

(Multiple Choice)
4.8/5
(38)

------------ is the technique used for tricking users to disclose their username and passwords through fake pages.

(Multiple Choice)
4.7/5
(33)

In the elliptic curve group defined by y2= x3- 17x + 16 over real numbers, what is 2P if P = (4, 3.464)

(Multiple Choice)
4.7/5
(43)

In a trapdoor function, the functions are easy to go in

(Multiple Choice)
4.7/5
(34)

In public key cryptosystem which is kept as public?

(Multiple Choice)
4.9/5
(28)
Showing 1 - 20 of 25
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)