Exam 2: Cryptographic Tools
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication44 Questions
Exam 4: Access Control45 Questions
Exam 5: Database Security45 Questions
Exam 6: Malicious Software44 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow45 Questions
Exam 11: Software Security45 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Trusted Computing and Multilevel Security45 Questions
Exam 14: It Security Management and Risk Assessment45 Questions
Exam 15: It Security Controls, plans, and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
An important element in many computer security services and
applications is the use of cryptographic algorithms.
Free
(True/False)
4.8/5
(41)
Correct Answer:
True
Public-key encryption was first publicly proposed by __________ in 1976.
Free
(Short Answer)
4.9/5
(34)
Correct Answer:
Diffie and Hellman
__________ is a procedure that allows communicating parties to verify that received or stored messages are authentic.
Free
(Multiple Choice)
4.7/5
(33)
Correct Answer:
C
The __________ is a pair of keys that have been selected so that if one is used for encryption,the other is used for decryption.
(Short Answer)
4.9/5
(34)
On average,__________ of all possible keys must be tried in order to achieve success with a brute-force attack.
(Multiple Choice)
4.9/5
(25)
A _________ protects against an attack in which one party generates a message for another party to sign.
(Multiple Choice)
4.9/5
(33)
Symmetric encryption is used primarily to provide confidentiality.
(True/False)
5.0/5
(34)
A __________ processes the plaintext input in fixed-size blocks and produces a block of ciphertext of equal size for each plaintext block.
(Short Answer)
4.9/5
(38)
The purpose of the __________ algorithm is to enable two users to securely reach agreement about a shared secret that can be used as a secret key for subsequent symmetric encryption of messages.
(Short Answer)
4.9/5
(37)
A _________ is a hardware device that sits between servers and storage systems and encrypts all data going from the server to the storage system and decrypts data going in the opposite direction.
(Short Answer)
4.8/5
(35)
The original message or data that is fed into the algorithm is __________.
(Multiple Choice)
4.7/5
(44)
A __________ is to try every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained.
(Multiple Choice)
4.7/5
(33)
Also referred to as single-key encryption,the universal technique for providing confidentiality for transmitted or stored data is __________ .
(Short Answer)
4.9/5
(46)
__________ is a block cipher in which the plaintext and ciphertext are integers between 0 and n-1 for some n.
(Multiple Choice)
5.0/5
(35)
The purpose of the DSS algorithm is to enable two users to securely
reach agreement about a shared secret that can be used as a secret key
for subsequent symmetric encryption of messages.
(True/False)
4.9/5
(41)
Combined one byte at a time with the plaintext stream using the XOR operation,a __________ is the output of the pseudorandom bit generator.
(Multiple Choice)
4.9/5
(37)
The most important symmetric algorithms,all of which are block ciphers,are the DES,triple DES,and the __________.
(Multiple Choice)
4.8/5
(32)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)