Exam 6: Cryptography

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

Which term is used for a message in its original format?

Free
(Multiple Choice)
5.0/5
(44)
Correct Answer:
Verified

D

Which term is used for the amount of time and resources that would be needed to break the encryption?

Free
(Multiple Choice)
4.8/5
(29)
Correct Answer:
Verified

C

Secure Sockets Layer (SSL) is a transport layer protocol that provides encryption, server and client authentication, and message integrity.

Free
(True/False)
4.9/5
(37)
Correct Answer:
Verified

True

The Caesar cipher and the Vigenere cipher are two of the earliest forms of substitution ciphers.

(True/False)
4.8/5
(37)

What is another term for a null cipher?

(Multiple Choice)
4.9/5
(35)

Which of the following is NOT an e-mail standard?

(Multiple Choice)
5.0/5
(32)

In a hybrid cipher, the asymmetric algorithm provides the keys used for encryption.

(True/False)
4.7/5
(35)

Diffie-Hellman provides secure key distribution, confidentiality, authentication, and nonrepudiation.

(True/False)
4.9/5
(42)

Substitution is also referred to as permutation.

(True/False)
4.8/5
(28)

DES and 3DES are symmetric algorithms.

(True/False)
4.8/5
(39)

What should you implement to prevent man-in-the-middle attacks against the Diffie-Hellman algorithm?

(Multiple Choice)
4.8/5
(29)

Which of the following is the most secure encryption scheme that can be used?

(Multiple Choice)
4.8/5
(36)

Julius Caesar created the scytale cipher.

(True/False)
4.9/5
(39)

Which of the following is NOT a symmetric algorithm?

(Multiple Choice)
4.8/5
(42)

The U.S. government requires the usage of SHA-2 instead of MD5.

(True/False)
4.8/5
(27)

Which hash function produces 128-, 160-, or 192-bit hash values after performing 24 rounds of computations on 512-bit blocks?

(Multiple Choice)
4.8/5
(30)

A key is a parameter that controls the transformation of plaintext into ciphertext or vice versa.

(True/False)
4.8/5
(36)

The U.S. federal government requires the use of DSA, RSA, or Elliptic Curve DSA (ECDSA) and SHA for digital signatures.

(True/False)
4.8/5
(38)

Which entity creates and signs digital certificates, maintains the certificates, and revokes them when necessary?

(Multiple Choice)
4.9/5
(35)

Which cipher uses 27 shift alphabets with letters being shifted up one place?

(Multiple Choice)
5.0/5
(29)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)