Deck 16: Security

Full screen (f)
exit full mode
Question
In __________cryptography, the same key is used by the sender and the receiver.

A) symmetric-key
B) asymmetric-key
C) public-key
D) open-key
Use Space or
up arrow
down arrow
to flip the card.
Question
___________ means that the data must arrive at the receiver exactly as they were sent.

A) Nonrepudiation
B) Message integrity
C) Authentication
D) Secrecy
Question
_________ cryptography is often used for long messages.

A) Symmetric-key
B) Asymmetric-key
C) Public-key
D) Open-key
Question
In the asymmetric-key method used for confidentiality, which key(s) is (are) publicly known?

A) encryption key only
B) decryption key only
C) both encryption and decryption keys
D) neither encryption key nor decryption key
Question
In RSA, if user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key of _______.

A) user A
B) user B
C) the network
D) a third party.
Question
The RSA algorithm for confidentiality uses _______ cryptography.

A) asymmetric-key
B) symmetric-key
C) substitution
D) transposition
Question
__________means that the sender and the receiver expect confidentiality.

A) Nonrepudiation
B) Integrity
C) Authentication
D) encryption and decryption
Question
In _________ cryptography, the same key is used in both directions.

A) symmetric-key
B) asymmetric-key
C) public-key
D) open-key
Question
Which of the following attacks is threatening availability?

A) Replaying
B) Modification
C) Denial of service
D) Decoding
Question
In __________ cryptography, everyone has access to everyone's public key.

A) symmetric-key
B) asymmetric-key
C) secret-key
D) private-key
Question
In ___________, the identity of a party is verified once for the entire duration of system access.

A) entity authentication
B) message integrity
C) message authentication
D) message encryption
Question
Which of the following attacks is threatening integrity?

A) Masquerading
B) Traffic Analysis
C) Denial of service
D) Encoding
Question
_____________ means concealing the contents of a message by enciphering.

A) Steganography
B) Cryptography
C) Compressing
D) Authentication
Question
______________means concealing the message by covering it with something else.

A) Cryptography
B) Steganography
C) Compressing
D) Authentication
Question
___________ cryptography is often used for short messages.

A) Symmetric-key
B) Asymmetric-key
C) Secret-key
D) Open-key
Question
Three security goals are _____.

A) confidentiality, cryptography, and nonrepudiation
B) confidentiality, encryption, and decryption
C) confidentiality, integrity, and availability
D) confidentiality, denial of service, and masquerading
Question
______________ can provide authentication, integrity, and nonrepudiation for a message.

A) Encryption/decryption
B) Digital signature
C) Compression
D) Key-exchange
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/17
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 16: Security
1
In __________cryptography, the same key is used by the sender and the receiver.

A) symmetric-key
B) asymmetric-key
C) public-key
D) open-key
A
2
___________ means that the data must arrive at the receiver exactly as they were sent.

A) Nonrepudiation
B) Message integrity
C) Authentication
D) Secrecy
B
3
_________ cryptography is often used for long messages.

A) Symmetric-key
B) Asymmetric-key
C) Public-key
D) Open-key
A
4
In the asymmetric-key method used for confidentiality, which key(s) is (are) publicly known?

A) encryption key only
B) decryption key only
C) both encryption and decryption keys
D) neither encryption key nor decryption key
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
5
In RSA, if user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key of _______.

A) user A
B) user B
C) the network
D) a third party.
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
6
The RSA algorithm for confidentiality uses _______ cryptography.

A) asymmetric-key
B) symmetric-key
C) substitution
D) transposition
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
7
__________means that the sender and the receiver expect confidentiality.

A) Nonrepudiation
B) Integrity
C) Authentication
D) encryption and decryption
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
8
In _________ cryptography, the same key is used in both directions.

A) symmetric-key
B) asymmetric-key
C) public-key
D) open-key
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following attacks is threatening availability?

A) Replaying
B) Modification
C) Denial of service
D) Decoding
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
10
In __________ cryptography, everyone has access to everyone's public key.

A) symmetric-key
B) asymmetric-key
C) secret-key
D) private-key
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
11
In ___________, the identity of a party is verified once for the entire duration of system access.

A) entity authentication
B) message integrity
C) message authentication
D) message encryption
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following attacks is threatening integrity?

A) Masquerading
B) Traffic Analysis
C) Denial of service
D) Encoding
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
13
_____________ means concealing the contents of a message by enciphering.

A) Steganography
B) Cryptography
C) Compressing
D) Authentication
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
14
______________means concealing the message by covering it with something else.

A) Cryptography
B) Steganography
C) Compressing
D) Authentication
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
15
___________ cryptography is often used for short messages.

A) Symmetric-key
B) Asymmetric-key
C) Secret-key
D) Open-key
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
16
Three security goals are _____.

A) confidentiality, cryptography, and nonrepudiation
B) confidentiality, encryption, and decryption
C) confidentiality, integrity, and availability
D) confidentiality, denial of service, and masquerading
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
17
______________ can provide authentication, integrity, and nonrepudiation for a message.

A) Encryption/decryption
B) Digital signature
C) Compression
D) Key-exchange
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 17 flashcards in this deck.