Exam 8: Cryptography
Exam 1: Introduction to Information Security87 Questions
Exam 2: The Need for Security91 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security83 Questions
Exam 4: Planning for Security109 Questions
Exam 5: Risk Management108 Questions
Exam 6: Security Technology: Access Controls, Firewalls, and VPNS106 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools107 Questions
Exam 8: Cryptography109 Questions
Exam 9: Physical Security77 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel77 Questions
Exam 12: Information Security Maintenance116 Questions
Select questions type
A brute force function is a mathematical algorithm that generates a message summary or digest (sometimes called a fingerprint) to confirm message identity and integrity.
(True/False)
4.8/5
(46)
Secure Multipurpose Internet Mail Extensions builds on the encoding format of the MIME protocol and uses digital signatures based on public-key cryptosystems to secure e-mail. _________________________
(True/False)
4.8/5
(45)
Standard HTTP (S-HTTP) is an extended version of the Hypertext Transfer Protocol that provides for the encryption of individual messages transmitted via the Internet between a client and server.
(True/False)
4.8/5
(37)
Symmetric encryption uses two different but related keys, and either key can be used to encrypt or decrypt the message. _________________________
(True/False)
4.8/5
(39)
A multipart authentication code (MAC) is a key-dependent, one-way hash function that allows only specific recipients (symmetric key holders) to access the message digest. _________________________
(True/False)
4.8/5
(35)
In 1953, Giovan Batista Bellaso introduced the idea of the passphrase (password) as a key for encryption.
(True/False)
4.9/5
(39)
The ____________________ cipher simply rearranges the values within a block to create the ciphertext.
(Short Answer)
4.8/5
(35)
The number of horizontal and vertical pixels captured and recorded is known as the image's contrast. _________________________
(True/False)
4.8/5
(33)
The application header (AH) protocol provides secrecy for the contents of network communications as well as system-to-system authentication and data integrity verification. _________________________
(True/False)
4.8/5
(32)
Showing 101 - 109 of 109
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)