Exam 5: Basic Cryptography

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Match the following terms to the appropriate definitions -​An asymmetric encryption key that does have to be protected.

(Multiple Choice)
4.9/5
(37)

A Hardware Security Module (HSM) is essentially a chip on the motherboard of the computer that provides cryptographic services.

(True/False)
4.8/5
(30)

The simplest type of stream cipher, one in which one letter or character is exchanged for another, is known as what?

(Multiple Choice)
4.7/5
(29)

A ________________ involves combining plaintext with a random key to create ciphertext that cannot be broken mathematically.​

(Short Answer)
4.8/5
(34)

Steganography hides the existence of data within images by dividing and hiding portions of a file within the image.

(True/False)
4.7/5
(41)

Describe how a block cipher works.

(Essay)
4.9/5
(36)

Describe hard disk drive encryption.

(Essay)
4.8/5
(41)

What is the name of the open source asymmetric cryptography system that runs on Windows, UNIX, and Linux systems, and is compatible with PGP?

(Multiple Choice)
4.9/5
(33)

List and describe the characteristics a hashing algorithm must have to be considered secure.

(Essay)
4.8/5
(45)

What type of cryptographic algorithm is considered to be a one-way algorithm, in that its contents can't be used to reveal the original set of data?

(Multiple Choice)
4.9/5
(32)
Showing 41 - 50 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)