Exam 3: Cryptography

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In a replay attack, the attacker cannot read the contents of the replayed message.

Free
(True/False)
4.8/5
(32)
Correct Answer:
Verified

True

In public key encryption, "signing" is the act of ________.

Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
Verified

C

DES uses block encryption.

Free
(True/False)
4.9/5
(34)
Correct Answer:
Verified

True

To ensure that a digital certificate is valid, the receiver of the certificate must check ________.

(Multiple Choice)
4.9/5
(30)

Someone who pretends to be someone else is ________.

(Multiple Choice)
4.7/5
(39)

Signing a message digest means encrypting it with the sender's public key.

(True/False)
4.7/5
(30)

________ is the security guarantee that people who intercept messages cannot read them.

(Multiple Choice)
4.8/5
(48)

Quantum key cracking ________.

(Multiple Choice)
4.9/5
(33)

In public key encryption for authentication, the verifier decrypts the ciphertext with the supplicant's public key.

(True/False)
4.8/5
(34)

The supplicant creates a digital signature by ________.

(Multiple Choice)
4.9/5
(39)

What usually is the longest stage in a cryptographic system dialogue?

(Multiple Choice)
4.8/5
(37)

Which of the following is one of the effective key lengths in 3DES?

(Multiple Choice)
4.9/5
(34)

In authentication, the party trying to provide its identity to the other party is called the applicant.

(True/False)
4.9/5
(31)

In codes, code symbols may represent ________.

(Multiple Choice)
4.9/5
(35)

Strong RSA keys are at least ________ bits long.

(Multiple Choice)
4.8/5
(27)

Which of the following can be used as a keying method?

(Multiple Choice)
4.7/5
(33)

Which types of VPNs use VPN gateways?

(Multiple Choice)
4.8/5
(38)

If a key is 43 bits long, how much longer will it take to crack it by exhaustive search if it is extended to 50 bits?

(Multiple Choice)
4.8/5
(43)

Public key encryption is ________.

(Multiple Choice)
4.8/5
(39)

Nearly all encryption for confidentiality uses symmetric key encryption ciphers.

(True/False)
4.8/5
(35)
Showing 1 - 20 of 122
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)