Exam 8: Cryptography
Exam 1: Introduction to Information Security87 Questions
Exam 2: The Need for Security91 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security83 Questions
Exam 4: Planning for Security109 Questions
Exam 5: Risk Management108 Questions
Exam 6: Security Technology: Access Controls, Firewalls, and VPNS106 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools107 Questions
Exam 8: Cryptography109 Questions
Exam 9: Physical Security77 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel77 Questions
Exam 12: Information Security Maintenance116 Questions
Select questions type
S-HTTP is an extended version of Hypertext Transfer Protocol that provides for the encryption of protected e-mail transmitted via the Internet between a client and server. _________________________
(True/False)
4.9/5
(37)
PKI systems are based on public-key cryptosystems and include digital certificates and certificate authorities.
(True/False)
5.0/5
(30)
A method of encryption that requires the same secret key to encipher and decipher the message is known as __________ encryption.
(Multiple Choice)
4.7/5
(29)
More advanced substitution ciphers use two or more alphabets, and are referred to as __________ substitutions.
(Multiple Choice)
4.8/5
(35)
In addition to being credited with inventing a substitution cipher, Julius Caesar was associated with an early version of the transposition cipher.
(True/False)
4.7/5
(46)
Digital signatures should be created using processes and products that are based on the __________.
(Multiple Choice)
4.7/5
(33)
A(n) ____________________ or cryptosystem is an encryption method or process encompassing the algorithm, key(s) or cryptovariable(s), and procedures used to perform encryption and decryption.
(Short Answer)
4.9/5
(35)
The permutation cipher simply rearranges the values within a block to create the ciphertext.
(True/False)
4.8/5
(32)
Encryption is the process of converting the ciphertext message back into plaintext so that it can be readily understood. _________________________
(True/False)
4.8/5
(39)
The AES algorithm was the first public-key encryption algorithm to use a 256-bit key length.
(True/False)
4.9/5
(46)
Usually, as the length of a cryptovariable increases, the number of random guesses that have to be made in order to break the code is reduced.
(True/False)
4.8/5
(40)
A message ____________________ is a fingerprint of the author's message that is compared with the recipient's locally calculated hash of the same message.
(Short Answer)
4.9/5
(26)
Originally released as freeware, ____________________ is a hybrid cryptosystem that combines some of the best available cryptographic algorithms as an open-source de facto standard for encryption and authentication of e-mail and file storage.
(Short Answer)
4.8/5
(40)
Netscape developed the ____________________ Layer protocol to use public-key encryption to secure a channel over the Internet, thus enabling secure communications.
(Short Answer)
4.8/5
(34)
Hash algorithms are public functions that create a message digest by converting variable-length messages into a single fixed-length value. _________________________
(True/False)
4.9/5
(43)
Using a database of precomputed hashes from sequentially calculated passwords called a(n) __________, an attacker can simply look up a hashed password and read out the text version.
(Multiple Choice)
4.8/5
(35)
Diffie-Hellman key exchange uses asymmetric encryption to exchange session keys. _________________________
(True/False)
5.0/5
(30)
Common implementations of a registration authority (RA) include functions to issue digital certificates to users and servers.
(True/False)
4.9/5
(33)
Nonrepudiation means that customers or partners can be held accountable for transactions, such as online purchases, which they cannot later deny.
(True/False)
4.9/5
(44)
Showing 41 - 60 of 109
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)