Deck 21: Cryptography and Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/30
Play
Full screen (f)
Deck 21: Cryptography and Security
1
____________________ is a technique to detect changes to information rather than encrypt and decrypt information.
Hashing
2
The hash value is called a ____.
A)cipher
B)digest
C)ciphertext
D)plaintext
A)cipher
B)digest
C)ciphertext
D)plaintext
B
3
In ____ encryption,the single key must be shared between the individuals wishing to protect their data.
A)asymmetric
B)public key
C)symmetric
D)shareable
A)asymmetric
B)public key
C)symmetric
D)shareable
C
4
In ____ encryption,the private key is kept private,in the hands of a single individual.
A)asymmetric
B)symmetric
C)private key
D)shared secret
A)asymmetric
B)symmetric
C)private key
D)shared secret
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
5
The ____ determines the level of data protection provided by the encryption technique.
A)encryption strength
B)storage technique
C)system entropy
D)key length
A)encryption strength
B)storage technique
C)system entropy
D)key length
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
6
A(n)____________________ is a special word,phrase,or binary number that is used during encryption or decryption to manipulate the data.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
7
Even the best encryption algorithm can be outdone by improper use.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
8
In the ____ cipher technique,the letters of the alphabet are shifted one or more positions to obtain the encryption alphabet.
A)Caesar
B)Roman
C)Augustus
D)Romani
A)Caesar
B)Roman
C)Augustus
D)Romani
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
9
A ____ is visible or invisible information added to an image,video,or audio that identifies the copyright owner of the media.
A)digital signature
B)digital footprint
C)digital fingerprint
D)digital watermark
A)digital signature
B)digital footprint
C)digital fingerprint
D)digital watermark
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
10
Keeping secrets has become a major force in networking and communication.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
11
____ ciphers encrypt any number of bits
A)Bit
B)Hash
C)Stream
D)Block
A)Bit
B)Hash
C)Stream
D)Block
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
12
____ is a fascinating and possibly dangerous technique for hiding one form of information inside another.
A)Sociology
B)Cryptography
C)Steganography
D)Social analytics
A)Sociology
B)Cryptography
C)Steganography
D)Social analytics
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
13
A JPG image is a complex data structure containing compressed DCT coefficients for ____ blocks of pixels.
A)4x4
B)8x8
C)16x16
D)32x32
A)4x4
B)8x8
C)16x16
D)32x32
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
14
Symmetric encryption algorithms use one key for both encryption and decryption.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
15
A(n)____________________ cipher is an algorithm that encrypts or decrypts blocks of data,such as 64-bit or 128-bit chunks of information at a time.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
16
Asymmetric encryption algorithms use ____________________ keys to perform the encryption and decryption.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
17
Hashed data can be unhashed and turned back into their original form.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
18
The power of a particular encryption technique is based on the ____.
A)key length
B)encryption strength
C)storage technique
D)system entropy
A)key length
B)encryption strength
C)storage technique
D)system entropy
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
19
The ____________________ of the WAV file determines how much data can be hidden inside it.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
20
Symmetric encryption is generally thought to be more secure than asymmetric encryption.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
21
MATCHING
Match each item with a statement below.
a.Encryption
d.Decryption
b.Symmetric encryption
e.Asymmetric encryption
c.Cryptography
A single key is used to encrypt and decrypt the data
Match each item with a statement below.
a.Encryption
d.Decryption
b.Symmetric encryption
e.Asymmetric encryption
c.Cryptography
A single key is used to encrypt and decrypt the data
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
22
Discuss the encryption strength of symmetric and asymmetric encryption.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
23
Describe symmetric encryption.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
24
Describe asymmetric encryption.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
25
MATCHING
Match each item with a statement below.
a.Encryption
d.Decryption
b.Symmetric encryption
e.Asymmetric encryption
c.Cryptography
The process to change something easy to read into something that is difficult to read
Match each item with a statement below.
a.Encryption
d.Decryption
b.Symmetric encryption
e.Asymmetric encryption
c.Cryptography
The process to change something easy to read into something that is difficult to read
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
26
MATCHING
Match each item with a statement below.
a.Encryption
d.Decryption
b.Symmetric encryption
e.Asymmetric encryption
c.Cryptography
Involves taking encrypted information and putting it back into the original form
Match each item with a statement below.
a.Encryption
d.Decryption
b.Symmetric encryption
e.Asymmetric encryption
c.Cryptography
Involves taking encrypted information and putting it back into the original form
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
27
MATCHING
Match each item with a statement below.
a.Encryption
d.Decryption
b.Symmetric encryption
e.Asymmetric encryption
c.Cryptography
Two keys are used to encrypt and decrypt the data
Match each item with a statement below.
a.Encryption
d.Decryption
b.Symmetric encryption
e.Asymmetric encryption
c.Cryptography
Two keys are used to encrypt and decrypt the data
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
28
How is data hidden inside a WAV?
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
29
What is a frequency analysis?
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
30
MATCHING
Match each item with a statement below.
a.Encryption
d.Decryption
b.Symmetric encryption
e.Asymmetric encryption
c.Cryptography
Involves taking data and coding it into a different,unreadable form
Match each item with a statement below.
a.Encryption
d.Decryption
b.Symmetric encryption
e.Asymmetric encryption
c.Cryptography
Involves taking data and coding it into a different,unreadable form
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck