Exam 8: Cryptography
Exam 1: Introduction to Information Security87 Questions
Exam 2: The Need for Security91 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security83 Questions
Exam 4: Planning for Security109 Questions
Exam 5: Risk Management108 Questions
Exam 6: Security Technology: Access Controls, Firewalls, and VPNS106 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools107 Questions
Exam 8: Cryptography109 Questions
Exam 9: Physical Security77 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel77 Questions
Exam 12: Information Security Maintenance116 Questions
Select questions type
Sequence encryption is a series of encryptions and decryptions between a number of systems, wherein each system in a network decrypts the message sent to it and then reencrypts it using different keys and sends it to the next neighbor. This process continues until the message reaches the final destination.
Free
(True/False)
4.9/5
(38)
Correct Answer:
False
Within a PKI, a(n)registration authority issues, manages, authenticates, signs, and revokes users' digital certificates, which typically contain the user name, public key, and other identifying information. _________________________
Free
(True/False)
4.7/5
(36)
Correct Answer:
False
Digital ____________________ are encrypted messages that can be mathematically proven to be authentic.
Free
(Short Answer)
4.9/5
(35)
Correct Answer:
signatures
A digital ____________________ is an electronic document or container file that contains a key value and identifying information about the entity that controls the key.
(Short Answer)
4.9/5
(35)
The S-HTTP security solution provides six services: authentication by digital signatures, message encryption, compression, e-mail compatibility, segmentation, and key management.
(True/False)
4.8/5
(45)
The Digital Signature Standard established by NIST is used for electronic document authentication by federal information systems. It is based on a variant of the ElGamal algorithm. _________________________
(True/False)
4.9/5
(33)
Bluetooth is a de facto industry standard for short-range wireless communications between devices.
(True/False)
4.9/5
(36)
In 1917, Gilbert S. Vernam, an AT&T employee, invented a polyalphabetic cipher machine that used a non-repeating random key.
(True/False)
4.8/5
(36)
In a book cipher, the key consists of a list of codes representing the page number, line number, and word number of the plaintext word. _________________________
(True/False)
4.9/5
(36)
The process of hiding messages within the digital encoding of a picture or graphic is called ____________________.
(Short Answer)
4.9/5
(36)
Bit stream methods commonly use algorithm functions like the exclusive OR operation (__________).
(Multiple Choice)
4.9/5
(40)
__________ is a protocol that can be used to secure communications across any IP-based network such as LANs, WANs, and the Internet.
(Multiple Choice)
4.8/5
(31)
____________________ is the process of making and using codes to secure the transmission of information.
(Short Answer)
4.8/5
(36)
The more common name for asymmetric encryption is ____________________-key encryption.
(Short Answer)
4.9/5
(36)
A cryptovariable is a value representing the application of a hash algorithm on a message.
(True/False)
4.9/5
(42)
To perform the Caesar cipher encryption operation, the pad values are added to numeric values that represent the plaintext that needs to be encrypted.
(True/False)
4.9/5
(34)
Showing 1 - 20 of 109
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)