Exam 3: Cryptography

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

The second stage of a cryptographic system standard is initial authentication.

Free
(True/False)
4.8/5
(33)
Correct Answer:
Verified

False

Quantum mechanics governs ________.

Free
(Multiple Choice)
4.9/5
(47)
Correct Answer:
Verified

C

What are IdenTrust, Sectifo, and GoDaddy?

Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
Verified

A

Who designed IPsec?

(Multiple Choice)
4.8/5
(30)

The Internet Engineering Task Force renamed ________ to the standard ________.

(Multiple Choice)
4.8/5
(29)

Which of the following is describes keys that are prohibitively time-consuming to crack?

(Multiple Choice)
4.9/5
(31)

Which of the following is FALSE about public key encryption ciphers?

(Multiple Choice)
4.7/5
(40)

What is the first task in establishing a cryptographic system?

(Multiple Choice)
4.8/5
(29)

Doubling the key length increases the number of possible keys by approximately double.

(True/False)
4.9/5
(33)

A ________ authenticates a single message with public key encryption.

(Multiple Choice)
4.8/5
(35)

One hashing method that is archaic and was primarily used in the past is MD5.

(True/False)
4.9/5
(34)

The weakest cipher in common use today is ________.

(Multiple Choice)
4.9/5
(38)

In IPsec, the IP refers to ________, and "sec" refers to ________.

(Multiple Choice)
4.9/5
(39)

SSL/TLS protection of application layer messages is transparent.

(True/False)
4.9/5
(28)

A specific set of options in SSL/TLS is called a(n) ________.

(Multiple Choice)
4.8/5
(37)

A(n) ________ is when an attacker intercepts messages being sent between two parties and forwards them on.

(Multiple Choice)
4.8/5
(32)

The weakest cipher suites in a cryptographic system standard may provide no protection at all.

(True/False)
4.8/5
(36)

Which of the following is NOT one of the three handshaking stages of a cryptographic system standard?

(Multiple Choice)
4.8/5
(37)

What does encryption and decryption require?

(Multiple Choice)
4.9/5
(30)

Which of the following is FALSE about hashing?

(Multiple Choice)
4.8/5
(40)
Showing 1 - 20 of 101
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)