Exam 21: Cryptography and Security

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

Symmetric encryption is generally thought to be more secure than asymmetric encryption.

Free
(True/False)
4.9/5
(36)
Correct Answer:
Verified

False

A(n)____________________ is a special word,phrase,or binary number that is used during encryption or decryption to manipulate the data.

Free
(Short Answer)
4.8/5
(40)
Correct Answer:
Verified

key

A JPG image is a complex data structure containing compressed DCT coefficients for ____ blocks of pixels.

Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
Verified

B

____ is a fascinating and possibly dangerous technique for hiding one form of information inside another.

(Multiple Choice)
4.8/5
(33)

Match each item with a statement below. -Involves taking encrypted information and putting it back into the original form

(Multiple Choice)
4.9/5
(31)

The ____________________ of the WAV file determines how much data can be hidden inside it.

(Short Answer)
4.8/5
(36)

Discuss the encryption strength of symmetric and asymmetric encryption.

(Essay)
4.9/5
(32)

A(n)____________________ cipher is an algorithm that encrypts or decrypts blocks of data,such as 64-bit or 128-bit chunks of information at a time.

(Short Answer)
4.8/5
(36)

Hashed data can be unhashed and turned back into their original form.

(True/False)
4.8/5
(40)

Symmetric encryption algorithms use one key for both encryption and decryption.

(True/False)
4.9/5
(41)

Describe symmetric encryption.

(Essay)
4.9/5
(33)

How is data hidden inside a WAV?

(Essay)
4.8/5
(38)

Asymmetric encryption algorithms use ____________________ keys to perform the encryption and decryption.

(Short Answer)
4.9/5
(35)

Match each item with a statement below. -Two keys are used to encrypt and decrypt the data

(Multiple Choice)
4.9/5
(41)

The power of a particular encryption technique is based on the ____.

(Multiple Choice)
4.9/5
(29)

The ____ determines the level of data protection provided by the encryption technique.

(Multiple Choice)
4.8/5
(33)

Match each item with a statement below. -Involves taking data and coding it into a different,unreadable form

(Multiple Choice)
4.8/5
(40)

____________________ is a technique to detect changes to information rather than encrypt and decrypt information.

(Short Answer)
4.9/5
(27)

Match each item with a statement below. -The process to change something easy to read into something that is difficult to read

(Multiple Choice)
4.7/5
(35)

Even the best encryption algorithm can be outdone by improper use.

(True/False)
4.9/5
(32)
Showing 1 - 20 of 30
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)