Deck 16: Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/17
Play
Full screen (f)
Deck 16: Security
1
In __________cryptography, the same key is used by the sender and the receiver.
A) symmetric-key
B) asymmetric-key
C) public-key
D) open-key
A) symmetric-key
B) asymmetric-key
C) public-key
D) open-key
A
2
___________ means that the data must arrive at the receiver exactly as they were sent.
A) Nonrepudiation
B) Message integrity
C) Authentication
D) Secrecy
A) Nonrepudiation
B) Message integrity
C) Authentication
D) Secrecy
B
3
_________ cryptography is often used for long messages.
A) Symmetric-key
B) Asymmetric-key
C) Public-key
D) Open-key
A) Symmetric-key
B) Asymmetric-key
C) Public-key
D) Open-key
A
4
In the asymmetric-key method used for confidentiality, which key(s) is (are) publicly known?
A) encryption key only
B) decryption key only
C) both encryption and decryption keys
D) neither encryption key nor decryption key
A) encryption key only
B) decryption key only
C) both encryption and decryption keys
D) neither encryption key nor decryption key
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
5
In RSA, if user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key of _______.
A) user A
B) user B
C) the network
D) a third party.
A) user A
B) user B
C) the network
D) a third party.
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
6
The RSA algorithm for confidentiality uses _______ cryptography.
A) asymmetric-key
B) symmetric-key
C) substitution
D) transposition
A) asymmetric-key
B) symmetric-key
C) substitution
D) transposition
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
7
__________means that the sender and the receiver expect confidentiality.
A) Nonrepudiation
B) Integrity
C) Authentication
D) encryption and decryption
A) Nonrepudiation
B) Integrity
C) Authentication
D) encryption and decryption
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
8
In _________ cryptography, the same key is used in both directions.
A) symmetric-key
B) asymmetric-key
C) public-key
D) open-key
A) symmetric-key
B) asymmetric-key
C) public-key
D) open-key
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following attacks is threatening availability?
A) Replaying
B) Modification
C) Denial of service
D) Decoding
A) Replaying
B) Modification
C) Denial of service
D) Decoding
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
10
In __________ cryptography, everyone has access to everyone's public key.
A) symmetric-key
B) asymmetric-key
C) secret-key
D) private-key
A) symmetric-key
B) asymmetric-key
C) secret-key
D) private-key
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
11
In ___________, the identity of a party is verified once for the entire duration of system access.
A) entity authentication
B) message integrity
C) message authentication
D) message encryption
A) entity authentication
B) message integrity
C) message authentication
D) message encryption
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following attacks is threatening integrity?
A) Masquerading
B) Traffic Analysis
C) Denial of service
D) Encoding
A) Masquerading
B) Traffic Analysis
C) Denial of service
D) Encoding
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
13
_____________ means concealing the contents of a message by enciphering.
A) Steganography
B) Cryptography
C) Compressing
D) Authentication
A) Steganography
B) Cryptography
C) Compressing
D) Authentication
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
14
______________means concealing the message by covering it with something else.
A) Cryptography
B) Steganography
C) Compressing
D) Authentication
A) Cryptography
B) Steganography
C) Compressing
D) Authentication
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
15
___________ cryptography is often used for short messages.
A) Symmetric-key
B) Asymmetric-key
C) Secret-key
D) Open-key
A) Symmetric-key
B) Asymmetric-key
C) Secret-key
D) Open-key
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
16
Three security goals are _____.
A) confidentiality, cryptography, and nonrepudiation
B) confidentiality, encryption, and decryption
C) confidentiality, integrity, and availability
D) confidentiality, denial of service, and masquerading
A) confidentiality, cryptography, and nonrepudiation
B) confidentiality, encryption, and decryption
C) confidentiality, integrity, and availability
D) confidentiality, denial of service, and masquerading
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
17
______________ can provide authentication, integrity, and nonrepudiation for a message.
A) Encryption/decryption
B) Digital signature
C) Compression
D) Key-exchange
A) Encryption/decryption
B) Digital signature
C) Compression
D) Key-exchange
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck