Deck 3: Cryptography and Security: Part B
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/7
Play
Full screen (f)
Deck 3: Cryptography and Security: Part B
1
An attack in which the user receives unwanted amount of e- mails.
A)smurfing
B)denial of service
C)e-mail bombing
D)ping storm
A)smurfing
B)denial of service
C)e-mail bombing
D)ping storm
e-mail bombing
2
In same keys are implemented for encrypting as well as decrypting the information.
A)symmetric key encryption
B)asymmetric key encryption
C)asymmetric key decryption
D)hash-based key encryption
A)symmetric key encryption
B)asymmetric key encryption
C)asymmetric key decryption
D)hash-based key encryption
symmetric key encryption
3
The procedure to add bits to the last block is termed as
A)decryption
B)hashing
C)tuning
D)padding
A)decryption
B)hashing
C)tuning
D)padding
padding
4
In asymmetric key cryptography, the private key is kept by
A)sender
B)receiver
C)sender and receiver
D)all the connected devices to the network
A)sender
B)receiver
C)sender and receiver
D)all the connected devices to the network
Unlock Deck
Unlock for access to all 7 flashcards in this deck.
Unlock Deck
k this deck
5
Cryptanalysis is used __________________________________________
A)to find some insecurity in a cryptographic scheme
B)to increase the speed
C)to encrypt the data
D)to make new ciphers
A)to find some insecurity in a cryptographic scheme
B)to increase the speed
C)to encrypt the data
D)to make new ciphers
Unlock Deck
Unlock for access to all 7 flashcards in this deck.
Unlock Deck
k this deck
6
Conventional cryptography is also known as or symmetric-key encryption.
A)secret-key
B)public key
C)protected key
D)primary key
A)secret-key
B)public key
C)protected key
D)primary key
Unlock Deck
Unlock for access to all 7 flashcards in this deck.
Unlock Deck
k this deck
7
________________________________________________________is the art & science of cracking the cipher-text without knowing the key.
A)cracking
B)cryptanalysis
C)cryptography
D)crypto-hacking
A)cracking
B)cryptanalysis
C)cryptography
D)crypto-hacking
Unlock Deck
Unlock for access to all 7 flashcards in this deck.
Unlock Deck
k this deck