Exam 5: Cryptography

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Encrypted files can be transmitted in both electronic form and as written messages.

Free
(True/False)
4.9/5
(30)
Correct Answer:
Verified

True

What is a hash value and how does it verify message integrity?

Free
(Essay)
4.9/5
(37)
Correct Answer:
Verified

A hash value is a fixed-size string representing the original input's contents.If the input changes in any way,even by adding a period at the end of a sentence,the resulting output
has a different hash value.

Which of the following is the first step in the digital signature process where Mike sends a message to Sophie?

Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
Verified

A

Which of the following is true about Message Authentication Code.

(Multiple Choice)
4.8/5
(39)

Which of the following makes a single pass on data and generates a 128-bit hash value displayed as a 32-character hexadecimal number and is used in VPNs?

(Multiple Choice)
4.8/5
(26)

What three conditions must be true to make a hashing algorithm secure?

(Essay)
4.8/5
(37)

Which of the following is commonly used for verifying message integrity?

(Multiple Choice)
4.9/5
(31)

Which component of IPsec enables computers to exchange keys to make an SA?

(Multiple Choice)
4.9/5
(33)

Which of the following was developed as a way of enabling Web servers and browsers to exchange encrypted information and uses a hashed message authentication code to increase security?

(Multiple Choice)
4.9/5
(27)

MATCHING -A set of standard procedures that the Internet Engineering Task Force (IETF)developed for enabling secure communication on the Internet

(Multiple Choice)
5.0/5
(35)

Which of the following is NOT a critical goal of information security?

(Multiple Choice)
4.9/5
(35)

Which of the following is described as a 64-bit block cipher composed of a 16-round Feistel network and key-dependent S-box functions?

(Multiple Choice)
4.8/5
(39)

______________ cryptanalysis is applicable to block ciphers that use a substitution-permutation network including Rijndael,Twofish,and IDEA.

(Short Answer)
4.9/5
(29)

Which of the following is true about PRNGs?

(Multiple Choice)
4.9/5
(22)

In a passive attack,cryptanalysts eavesdrop on transmissions but don't interact with parties exchanging information.

(True/False)
4.8/5
(43)

MATCHING -the study of breaking encryption methods

(Multiple Choice)
4.9/5
(30)

Compare and contrast block cipher with stream cipher.

(Essay)
4.8/5
(33)

Which of the following best describes a CRL?

(Multiple Choice)
4.8/5
(33)

MATCHING -a type of encryption algorithm that encrypts groups of cleartext characters

(Multiple Choice)
5.0/5
(34)

The standardization of cryptographic protocols discourages attackers from trying to break them.

(True/False)
4.9/5
(35)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)