Exam 3: Cryptography

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Using new and proprietary encryption ciphers is a good idea because cryptanalysts will not know them.

(True/False)
4.9/5
(45)

In public key encryption for authentication, the verifier decrypts the ciphertext with the verifier's public key.

(True/False)
4.9/5
(31)

Proving your identity to a communication partner is ________.

(Multiple Choice)
4.7/5
(36)

The person the supplicant claims to be is the true party.

(True/False)
4.8/5
(28)

In cryptographic systems, the negotiation of security methods and options takes place during the ________ handshaking stage.

(Multiple Choice)
4.7/5
(41)

Nonces can be used in ________.

(Multiple Choice)
4.9/5
(33)

Companies transmit over the wireless LANs because WLANs ________.

(Multiple Choice)
4.9/5
(36)

Julia encrypts a message to David using public key encryption for confidentiality. After encrypting the message, can Julia decrypt it?

(True/False)
4.8/5
(39)

Packaged sets of cryptographic countermeasures for protecting data transmission are ________.

(Multiple Choice)
4.8/5
(34)

MS-CHAP is used for ________ authentication.

(Multiple Choice)
4.8/5
(38)

IPsec tunnel mode ________.

(Multiple Choice)
4.9/5
(46)

The most popular public key encryption cipher is ________.

(Multiple Choice)
4.7/5
(35)

Which of the following fields are contained on a digital certificate?

(Multiple Choice)
4.7/5
(37)

When you make a purchase over the Internet, your sensitive traffic is almost always protected by ________ VPN transmission.

(Multiple Choice)
4.8/5
(37)

Most message-by-message authentication methods provide message integrity as a by-products.

(True/False)
4.8/5
(34)

Which of the following layers does IPsec protect?

(Multiple Choice)
4.9/5
(38)

The hash size in SHA-1 is 160 bits.

(True/False)
4.9/5
(34)

A ________ is a mathematical process used in encryption and decryption.

(Multiple Choice)
4.8/5
(44)

Site-to-site VPNs typically decrypt messages when they arrive from the outside.

(True/False)
4.9/5
(44)

The first task in establishing a cryptographic system is selecting a cryptographic system standard for the dialogue.

(True/False)
4.8/5
(35)
Showing 41 - 60 of 122
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)