Exam 9: Encryption - The Foundation for the Virtual Private Network

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The formula ____ represents the application of encryption (E) to a message (M) to create ciphertext (C)

Free
(Multiple Choice)
4.7/5
(32)
Correct Answer:
Verified

B

The XOR cipher conversion subjects the bitstream to a Boolean XOR function against some other data stream typically a ____ stream "

Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
Verified

D

Rijndael is the block cipher algorithm behind what encryption standard?

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

A

Asymmetric encryption uses ____ separate keys for each message.

(Multiple Choice)
4.8/5
(32)

Describe asymmetric encryption.

(Essay)
4.8/5
(35)

What is a Vernam cipher?

(Essay)
4.8/5
(25)

The reverse of the asymmetric encryption process yields ____.

(Multiple Choice)
4.9/5
(38)

MasterCard and VISA developed ____ in 1997.

(Multiple Choice)
4.8/5
(40)

The ____ cipher rearranges the values within a block to create the ciphertext.

(Multiple Choice)
4.9/5
(42)

One of the most popular public key cryptosystems is a proprietary model named ____.

(Multiple Choice)
4.7/5
(37)

An attacker may obtain duplicate texts, one in ciphertext and one in plaintext, which enable the individual to reverse-engineer the encryption algorithm in a ____ attack.

(Multiple Choice)
4.9/5
(30)

Match each item with a statement below. -The encrypted or encoded message resulting from an encryption.

(Multiple Choice)
4.9/5
(39)

Historically, attempts to gain unauthorized access to secure communications have used brute force attacks.

(True/False)
4.9/5
(27)

AES has been the federally approved standard for nonclassified data since 2002.

(True/False)
4.9/5
(41)

____ attacks are collections of brute-force methods that attempt to deduce statistical relationships between the structure of the unknown key and the ciphertext that is the output of the cryptosystem.

(Multiple Choice)
4.9/5
(31)

Pretty Good Privacy (PGP) provides security for ____.

(Multiple Choice)
4.9/5
(39)

____ is the predominant cryptographic authentication and encryption protocol suite in use today.

(Multiple Choice)
4.8/5
(32)

PKI systems are based on public key cryptosystems and include digital certificates and certificate ____________________.

(Short Answer)
4.8/5
(41)

Match each item with a statement below. -The mathematical formula or method used to convert an unencrypted message into an encrypted message or vice versa.

(Multiple Choice)
4.8/5
(38)

Match each item with a statement below. -The set of transformations necessary to convert an unencrypted message into an encrypted message.

(Multiple Choice)
4.8/5
(37)
Showing 1 - 20 of 48
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)