Exam 7: Encryption Controls

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The most common technologies used for secure network communication are

Free
(Multiple Choice)
4.8/5
(28)
Correct Answer:
Verified

A

The first documented instance of encryption was used by

Free
(Multiple Choice)
4.9/5
(26)
Correct Answer:
Verified

D

A cryptographic algorithm is

Free
(Multiple Choice)
4.8/5
(29)
Correct Answer:
Verified

B

Hash functions are used primarily for

(Multiple Choice)
4.7/5
(32)

Encryption is

(Multiple Choice)
4.8/5
(35)

The current standard for secret key encryption is

(Multiple Choice)
4.8/5
(44)

Ciphertext is

(Multiple Choice)
4.7/5
(38)

Hash functions use

(Multiple Choice)
4.8/5
(28)

In the context of encryption, a key is

(Multiple Choice)
4.8/5
(33)

The word Cipher is based on an Arabic word, cifr, that means

(Multiple Choice)
4.8/5
(33)

Digital signatures are

(Multiple Choice)
4.8/5
(28)

Public key encryption is used primarily for

(Multiple Choice)
4.9/5
(36)

Public key encryption techniques used in practice are based heavily on

(Multiple Choice)
4.8/5
(37)

In using public key encryption, messages are deciphered using

(Multiple Choice)
4.8/5
(34)

Desirable properties In good encryption algorithms include

(Multiple Choice)
4.9/5
(28)

Electronic Code Book ECB is not used for encryption since it has inadequate

(Multiple Choice)
4.9/5
(39)

Cryptanalysis is

(Multiple Choice)
4.8/5
(35)

For any given input, the length of its hash out is

(Multiple Choice)
4.8/5
(34)

A certificate used in web applications contains the

(Multiple Choice)
4.9/5
(28)

Block encryption uses both

(Multiple Choice)
5.0/5
(28)
Showing 1 - 20 of 24
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)