Exam 2: Cryptographic Tools
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication45 Questions
Exam 4: Access Control45 Questions
Exam 5: Database and Cloud Security45 Questions
Exam 6: Malicious Software45 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow45 Questions
Exam 11: Software Security45 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Cloud and Iot Security45 Questions
Exam 14: IT Security Management and Risk Assessment45 Questions
Exam 15: IT Security Controls, Plans, and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
__________ is provided by means of a co-processor board embedded in the tape drive and tape library hardware.
(Short Answer)
4.9/5
(33)
Cryptanalytic attacks try every possible key on a piece of ciphertextuntil an intelligible translation into plaintext is obtained.
(True/False)
4.9/5
(31)
Modes of operation are the alternative techniques that have beendeveloped to increase the security of symmetric block encryption for large sequences of data.
(True/False)
4.8/5
(36)
An important element in many computer security services andapplications is the use of cryptographic algorithms.
(True/False)
4.9/5
(44)
The purpose of a __________ is to produce a "fingerprint" of a file, message, or other block of data.
(Multiple Choice)
4.9/5
(34)
A __________ processes the input elements continuously, producing output one element at a time.
(Short Answer)
4.7/5
(36)
If the only form of attack that could be made on an encryption algorithm is brute-force, then the way to counter such attacks would be to __________ .
(Multiple Choice)
4.8/5
(29)
In July 1998 the __________ announced that it had broken a DES encryption using a special purpose "DES cracker" machine.
(Short Answer)
4.9/5
(28)
The most important symmetric algorithms, all of which are block ciphers, are the DES, triple DES, and the __________.
(Multiple Choice)
4.9/5
(28)
A message authentication code is a small block of data generated by asecret key and appended to a message.
(True/False)
4.8/5
(36)
A __________ is created by using a secure hash function to generate a hash value for a message and then encrypting the hash code with a private key.
(Multiple Choice)
4.8/5
(36)
A __________ is to try every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained.
(Multiple Choice)
4.8/5
(33)
Digital signatures and key management are the two most important applications of __________ encryption.
(Multiple Choice)
4.8/5
(30)
A _________ protects against an attack in which one party generates a message for another party to sign.
(Multiple Choice)
4.9/5
(42)
The __________ is a pair of keys that have been selected so that if one is used for encryption, the other is used for decryption.
(Short Answer)
4.8/5
(27)
The two criteria used to validate that a sequence of numbers is random are independence and _________ .
(Short Answer)
4.9/5
(27)
A __________ processes the plaintext input in fixed-size blocks and produces a block of ciphertext of equal size for each plaintext block.
(Short Answer)
4.7/5
(34)
A _________ is a hardware device that sits between servers and storage systems and encrypts all data going from the server to the storage system and decrypts data going in the opposite direction.
(Short Answer)
4.8/5
(34)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)