Exam 5: Cryptography

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Explain two ways encryption was done in ancient times without computers.

Free
(Essay)
4.8/5
(31)
Correct Answer:
Verified

The Spartans used a ribbon and cylinder and did a transposition cipher.The Romans used a shift cipher.

Encrypting a message by simply rearranging the order of the letters is a function of the

Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
Verified

C

The process for protecting intellectual property from unauthorized use is called _______________

Free
(Short Answer)
4.8/5
(33)
Correct Answer:
Verified

digital rights management

A collision attack is type of denial-of-service flooding attack that causes the number of collisions on the network to increase and thus bring down the network.

(True/False)
4.8/5
(34)

All of the following are cryptographic applications EXCEPT:

(Multiple Choice)
4.9/5
(41)

Bob connects to a company web site.His browser indicates that the digital certificate of the web site is valid.This application of encryption is an example of

(Multiple Choice)
5.0/5
(28)

When a message sent by a user is digitally signed with a private key,the person will not be able to deny sending the message.This application of encryption is an example of

(Multiple Choice)
4.8/5
(25)

All of the following are asymmetric encryption algorithms EXCEPT:

(Multiple Choice)
4.8/5
(34)

_______________ puts the plaintext through a simplified cipher to try to deduce what the key is likely to be in a full version of the cipher.

(Short Answer)
4.9/5
(29)

_______________ are functions that difficult to process without the key but easy to process when you have the key.

(Short Answer)
4.9/5
(34)

Which of the following is NOT a hashing algorithm

(Multiple Choice)
4.9/5
(35)

Hiding a text file in a jpg file is an example of steganography.

(True/False)
4.8/5
(38)

Hashing functions are special mathematical functions that performs a two-way encryption.

(True/False)
4.9/5
(40)

All of the following are symmetric encryption algorithms EXCEPT:

(Multiple Choice)
4.7/5
(41)

DES,AES,RSA,and ECC are all examples of symmetric encryption.

(True/False)
4.8/5
(37)

_______________ is a form of cryptography technology that can detect the interception of transmitted key bits.

(Short Answer)
4.7/5
(39)

The Vigenère cipher is a polyalphabetic substitution cipher.

(True/False)
4.8/5
(45)

The Vigenère cipher works as a

(Multiple Choice)
4.8/5
(46)

The art of secret writing that enables an individual to hide the contents of a message from all but the intended recipient is called

(Multiple Choice)
4.8/5
(34)

Decryption is the process of creating ciphertext from plaintext.

(True/False)
4.8/5
(43)
Showing 1 - 20 of 49
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)