Exam 5: Cryptography

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n)_______________ is a step-by-step,recursive computational procedure for solving a problem in a finite number of steps.

(Short Answer)
4.8/5
(26)

A corporate spy copies proprietary information into a text file and then hides the text file in an image file.The image file is then posted on the company's web site for others who know where to look to extract the information.This is the example of the use of

(Multiple Choice)
4.8/5
(33)

Cryptographic algorithms are used for all of the following EXCEPT:

(Multiple Choice)
4.9/5
(40)

An attacker is able to decrypt a message by finding a key that was not securely stored and should have been revoked.The is the result of

(Multiple Choice)
5.0/5
(36)

Keyspace refers to

(Multiple Choice)
4.8/5
(36)

Hashing algorithms can be compromised

(Multiple Choice)
4.9/5
(38)

The ROT13 cipher is an example of a

(Multiple Choice)
4.9/5
(42)

The strength of a symmetric encryption is based on the secrecy of the algorithm,but the key can be public.

(True/False)
4.7/5
(32)

What application of encryption verifies that a document was sent by the person it says it is from?

(Multiple Choice)
4.9/5
(29)
Showing 41 - 49 of 49
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)