Exam 9: Encryption - The Foundation for the Virtual Private Network

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The process of assuring that parties to a transaction are authentic, so that they cannot later deny having participated is called repudiation.

(True/False)
4.9/5
(37)

Match each item with a statement below. -The entire range of values that can possibly be used to construct an individual key.

(Multiple Choice)
4.9/5
(29)

Define encryption.

(Essay)
4.9/5
(29)

What are three commonly used functions used by encryption algorithms?

(Essay)
4.8/5
(29)

What is a man-in-the-middle attack?

(Essay)
4.8/5
(28)

____ was developed as an improvement to DES and uses as many as three keys in succession.

(Multiple Choice)
4.8/5
(37)

____ is the process of deciphering the original message from an encrypted message without knowing the algorithms and keys used to perform the encryption.

(Multiple Choice)
4.9/5
(38)

What is a timing attack?

(Essay)
4.9/5
(37)
Showing 41 - 48 of 48
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)