Exam 12: Cryptography

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In a ____ attack, the attacker has access to plaintext and ciphertext and the ability to choose which messages to encrypt.

(Multiple Choice)
4.9/5
(39)

The program ____ is one of the best programs available today for cracking password files.

(Multiple Choice)
4.8/5
(34)

How does public key infrastructure work?

(Essay)
4.8/5
(30)

In a ____ attack, the attacker has messages in both encrypted form and decrypted forms.

(Multiple Choice)
4.9/5
(35)

The Book of Jeremiah was written using a cipher, or key, known as ____.

(Multiple Choice)
4.9/5
(30)

What is a substitution cipher?

(Essay)
4.8/5
(28)

MATCHING Match each term with the correct statement below. -operates on blocks of plaintext

(Multiple Choice)
4.7/5
(36)

A certificate contains a unique serial number and must follow the ____ standard that describes the makings of a certificate.

(Multiple Choice)
4.7/5
(40)

How can confidentiality and authentication be achieved using public key cryptography?

(Essay)
4.9/5
(30)

MATCHING Match each term with the correct statement below. -digital document that verifies that the two parties exchanging data over the Internet are really who they claim to be

(Multiple Choice)
5.0/5
(38)

____ is an asymmetrical algorithm that can be used to encrypt data, create a digital signature, and exchange secret keys.

(Multiple Choice)
4.7/5
(38)

MATCHING Match each term with the correct statement below. -output of a hashing algorithm

(Multiple Choice)
4.8/5
(28)

____________________ attacks are used to find the same hash value for two different inputs.

(Short Answer)
4.9/5
(30)

In a ____ attack, after an attacker has access to a password file, he or she can run a password-cracking program that uses a dictionary of known words or passwords as an input file.

(Multiple Choice)
4.8/5
(36)

What is cryptanalysis?

(Essay)
4.9/5
(34)

Cryptography is the process of converting plaintext, which is readable text, into ____________________, which is unreadable or encrypted text.

(Short Answer)
4.9/5
(34)

MATCHING Match each term with the correct statement below. -operates on plaintext one bit at a time

(Multiple Choice)
4.8/5
(30)

____ is a hashing algorithm developed by Rivest in 1991.

(Multiple Choice)
4.8/5
(35)
Showing 41 - 58 of 58
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)