Exam 5: Cryptography

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The benefit of SHA-1 over MD5 is that it is resistant to a collision attack.

(True/False)
4.9/5
(39)

The cipher that replaces each letter of the alphabet with a different letter (not in sequence)is a

(Multiple Choice)
4.7/5
(33)

Keeping a copy of an encryption key with a trusted third party is known as

(Multiple Choice)
4.8/5
(33)

The process for protecting intellectual property from unauthorized used is called

(Multiple Choice)
4.9/5
(33)

_______________ is the process of analyzing available information in an attempt to return the encrypted message to its original form.

(Short Answer)
4.7/5
(29)

A(n)_______________ is a special mathematical function that performs a one-way encryption.

(Short Answer)
4.8/5
(28)

Cryptography is the process of attempting to return an encrypted message to its original form.

(True/False)
4.8/5
(42)

A special mathematical function that performs one-way encryption is called

(Multiple Choice)
5.0/5
(34)

What is steganography and what danger does it pose to an organization's sensitive information.

(Essay)
4.8/5
(36)

Cryptography can be used to protect confidentiality and integrity as well be used to implement nonrepudiation,authentication,key escrow,digital signatures,and digital rights management.

(True/False)
5.0/5
(36)

Alice sends Bob a message along with an MD5 hash of the message.Upon receipt,Bob runs the MD5 hashing algorithm and finds that the hash matches the one sent by Alice.This application of encryption is an example of

(Multiple Choice)
4.9/5
(34)

The encryption method base on the idea of two keys,one that is public and one that is private is

(Multiple Choice)
5.0/5
(41)

Alice sends an e-mail that she encrypts with a shared key,which only she and Bob have.Upon receipt Bob decrypts the email and reads it.This application of encryption is an example of

(Multiple Choice)
5.0/5
(35)

_______________ is done by comparing the input plaintext to the output ciphertext to try to determine the key used to encrypt the information.

(Short Answer)
4.9/5
(38)

Agents intercept a message that is encrypted.They use various techniques to try and decipher the plain text message.This is an example of

(Multiple Choice)
4.7/5
(38)

What are some of the uses of cryptographic algorithms?

(Essay)
4.9/5
(36)

What is key management and why is it important?

(Essay)
4.8/5
(34)

The encryption method based on the idea of using a shared key for encryption and decryption of data is

(Multiple Choice)
4.9/5
(31)

Keeping a copy of the encryption key with a trusted third party is called _______________.

(Short Answer)
4.9/5
(35)

A _______________ is when a hash algorithm is compromised by an attacker finding two different messages that hash to the same value.

(Short Answer)
4.8/5
(34)
Showing 21 - 40 of 49
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)