Exam 2: Cryptographic Tools
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication45 Questions
Exam 4: Access Control45 Questions
Exam 5: Database and Cloud Security45 Questions
Exam 6: Malicious Software44 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow44 Questions
Exam 11: Software Security43 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Trusted Computing and Multilevel Security45 Questions
Exam 14: It Security Management and Risk Assessment45 Questions
Exam 15: It Security Controls,plans,and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
A __________ processes the input elements continuously,producing output one element at a time.
Free
(Essay)
4.8/5
(35)
Correct Answer:
stream cipher
The __________ is a pair of keys that have been selected so that if one is used for encryption,the other is used for decryption.
Free
(Essay)
5.0/5
(32)
Correct Answer:
public and private key
A __________ attack exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used.
Free
(Essay)
4.8/5
(39)
Correct Answer:
cryptanalytic
The strength of a hash function against brute-force attacks depends
solely on the length of the hash code produced by the algorithm.
(True/False)
4.9/5
(37)
The simplest approach to multiple block encryption is known as __________ mode,in which plaintext is handled b bits at a time and each block of plaintext is encrypted using the same key.
(Essay)
4.8/5
(38)
In July 1998 the __________ announced that it had broken a DES encryption using a special purpose "DES cracker" machine.
(Essay)
4.8/5
(30)
A __________ is to try every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained.
(Multiple Choice)
4.9/5
(28)
Transmitted data stored locally are referred to as __________ .
(Multiple Choice)
4.8/5
(31)
A _________ is a hardware device that sits between servers and storage systems and encrypts all data going from the server to the storage system and decrypts data going in the opposite direction.
(Essay)
4.9/5
(35)
A __________ is created by using a secure hash function to generate a hash value for a message and then encrypting the hash code with a private key.
(Multiple Choice)
4.8/5
(30)
A __________ stream is one that is unpredictable without knowledge of the input key and which has an apparently random character.
(Essay)
4.9/5
(45)
__________ is a block cipher in which the plaintext and ciphertext are integers between 0 and n-1 for some n.
(Multiple Choice)
4.9/5
(39)
Digital signatures and key management are the two most important applications of __________ encryption.
(Multiple Choice)
4.8/5
(27)
Combined one byte at a time with the plaintext stream using the XOR operation,a __________ is the output of the pseudorandom bit generator.
(Multiple Choice)
4.8/5
(35)
__________ is provided by means of a co-processor board embedded in the tape drive and tape library hardware.
(Essay)
4.9/5
(33)
Public-key encryption was first publicly proposed by __________ in 1976.
(Essay)
4.8/5
(39)
Cryptanalytic attacks try every possible key on a piece of ciphertext
until an intelligible translation into plaintext is obtained.
(True/False)
4.8/5
(36)
__________ is a procedure that allows communicating parties to verify that received or stored messages are authentic.
(Multiple Choice)
4.7/5
(29)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)