Exam 9: Encryption - The Foundation for the Virtual Private Network

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Describe some of the common protocols used to secure e-mail.

(Essay)
4.8/5
(29)

____ attacks can be successful when the ciphertext consists of relatively few characters.

(Multiple Choice)
4.9/5
(38)

Firewalls have always performed encryption-related functions.

(True/False)
5.0/5
(39)

Text that has been encrypted is called ____.

(Multiple Choice)
4.8/5
(37)

Session ____________________ are attacks involving a communication session that has already been established between a server and a client.

(Short Answer)
4.8/5
(27)

Pure asymmetric key encryption is widely used except in the area of certificates.

(True/False)
4.8/5
(30)

What are common implementations of PKI?

(Essay)
4.8/5
(38)

In ____________________ cipher conversion, the bit stream is subjected to a Boolean XOR function against some other data stream, typically a key stream.

(Short Answer)
4.7/5
(34)

Describe some of the challenges that organizations face when it comes to cryptographic controls.

(Essay)
4.9/5
(29)

Match each item with a statement below. -The information used in conjunction with the algorithm to create the ciphertext from the plaintext.

(Multiple Choice)
4.7/5
(37)

Match each item with a statement below. -The amount of effort (usually expressed in units of time) required to perform cryptanalysis on an encoded message.

(Multiple Choice)
4.8/5
(30)

Describe symmetric encryption.What is the weakness of this type of encryption?

(Essay)
4.7/5
(35)

According to the computer insurance agency Safeware, Inc.(www.safeware.com), a laptop is stolen every ____.

(Multiple Choice)
4.8/5
(34)

Match each item with a statement below. -To decrypt or convert ciphertext to plaintext.

(Multiple Choice)
4.9/5
(35)

In e-commerce, some cryptographic tools can be used to assure that parties to the transaction are authentic, so that they cannot later deny having participated in a transaction, a feature often called ____________________.

(Short Answer)
4.8/5
(34)

Match each item with a statement below. -To encrypt or convert plaintext to ciphertext.

(Multiple Choice)
4.9/5
(37)

The replacement of one alphabet character with another from more than one alphabets is known as

(Multiple Choice)
4.9/5
(39)

____ was developed by Netscape in 1994 to provide security for online electronic commerce transactions.

(Multiple Choice)
4.7/5
(43)

____ is a Kerberos service that generates and issues session keys.

(Multiple Choice)
4.9/5
(38)

Match each item with a statement below. -The transformation of the individual components (characters, bytes, or bits) of an unencrypted message into encrypted components.

(Multiple Choice)
4.7/5
(34)
Showing 21 - 40 of 48
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)