Exam 3: Basic Cryptography

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following are considered to be common asymmetric cryptographic algorithms? (Choose all that apply. )

(Multiple Choice)
4.8/5
(35)

What four basic protections can cryptography support?

(Essay)
4.8/5
(44)

Wireless data networks are particularly susceptible to known ciphertext attacks.

(True/False)
4.7/5
(35)

What alternative term can be used to describe asymmetric cryptographic algorithms?

(Multiple Choice)
4.8/5
(30)

If Bob receives an encrypted reply message from Alice,whose private key is used to decrypt the received message?

(Multiple Choice)
4.7/5
(41)

What term describes data actions being performed by endpoint devices,such as printing a report from a desktop computer?

(Multiple Choice)
4.8/5
(37)

What is a pseudorandom number generator?

(Essay)
4.9/5
(38)

Asymmetric cryptographic algorithms are also known as private key cryptography.

(True/False)
4.7/5
(38)

Explain how a hash algorithm works and how it is primarily used.

(Essay)
4.9/5
(29)

Data that is in an unencrypted form is referred to as which of the following?

(Multiple Choice)
4.9/5
(33)

What cryptographic method,first proposed in the mid-1980s,makes use of sloping curves instead of large prime numbers?

(Multiple Choice)
4.8/5
(29)

When Bob needs to send Alice a message with a digital signature,whose private key is used to encrypt the hash?

(Multiple Choice)
4.8/5
(37)

What is meant by the phrase "security through obscurity," and why is this concept not accurate?

(Essay)
4.9/5
(45)

How does a downgrade attack work?

(Essay)
4.8/5
(36)

What type of cipher takes one character and replaces it with one character,working one character at a time?

(Multiple Choice)
4.8/5
(36)

GNU Privacy Guard a proprietary software that runs on different operating systems.

(True/False)
4.9/5
(37)

How does asymmetric encryption work?

(Essay)
4.9/5
(33)

What type of cryptographic algorithm creates a unique digital fingerprint of a set of data?

(Multiple Choice)
4.9/5
(30)

What is the difference between a stream cipher and a block cipher?

(Essay)
4.9/5
(34)

After the DES cipher was broken and no longer considered secure,what encryption algorithm was made as its successor?

(Multiple Choice)
4.9/5
(28)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)