Tuesday, January 14, 2014

CIS 481-20: INTRO TO INFORM SECURITY CH8

  • Question 1

    2 out of 2 points
    The ____ algorithm was the first public key encryption algorithm developed (in 1977) and published for commercial use.
    Selected Answer:
    Correct 
    RSA
    Correct Answer:
    Correct RSA
  • Question 2

    2 out of 2 points
    ____ is the process of converting an original message into a form that is unreadable to unauthorized individuals.
    Selected Answer:
    Correct 
    Encryption
    Correct Answer:
    Correct Encryption
  • Question 3

    1 out of 1 points
    The most popular modern version of steganography involves hiding information within files that appear to contain digital pictures or other images.
    Selected Answer:
    Correct True
    Correct Answer:
    Correct True
  • Question 4

    1 out of 1 points
    Nonrepudiation means that customers or partners can be held accountable for transactions, such as online purchases, which they cannot later deny.
    Selected Answer:
    Correct True
    Correct Answer:
    Correct True
  • Question 5

    2 out of 2 points
    ____ are encrypted messages that can be mathematically proven to be authentic.
    Selected Answer:
    Correct 
    Digital signatures
    Correct Answer:
    Correct Digital signatures
  • Question 6

    2 out of 2 points
    ____ is a hybrid cryptosystem originally designed in 1991 by Phil Zimmermann.
    Selected Answer:
    Correct 
    PGP
    Correct Answer:
    Correct PGP
  • Question 7

    1 out of 1 points
    Symmetric encryption uses two different but related keys, and either key can be used to encrypt or decrypt the message.
    Selected Answer:
    Correct False
    Correct Answer:
    Correct False
  • Question 8

    2 out of 2 points
    ____ is the information used in conjunction with an algorithm to create the ciphertext from the plaintext or derive the plaintext from the ciphertext.
    Selected Answer:
    Correct 
    Key
    Correct Answer:
    Correct Key
  • Question 9

    1 out of 1 points
    Hash algorithms are publicly known functions that create a value by converting variable-length messages into a single fixed-length value.
    Selected Answer:
    Correct True
    Correct Answer:
    Correct True
  • Question 10

    2 out of 2 points
    ____ attacks are a collection of brute-force methods that attempt to deduce statistical relationships between the structure of the unknown key and the ciphertext that is the output of the cryptosystem.
    Selected Answer:
    Correct 
    Correlation
    Correct Answer:
    Correct Correlation
  • Question 11

    2 out of 2 points
    Substitution ciphers that use two or more alphabets, and are referred to as ____ substitutions.
    Selected Answer:
    Correct 
    polyalphabetic
    Correct Answer:
    Correct polyalphabetic
  • Question 12

    2 out of 2 points
    ____ is an integrated system of software, encryption methodologies, protocols, legal agreements, and third-party services that enables users to communicate securely.
    Selected Answer:
    Correct 
    PKI
    Correct Answer:
    Correct PKI
  • Question 13

    2 out of 2 points
    ____ functions are mathematical algorithms that generate a message summary or digest to confirm the identity of a specific message and to confirm that there have not been any changes to the content.
    Selected Answer:
    Correct 
    Hash
    Correct Answer:
    Correct Hash
  • Question 14

    2 out of 2 points
    A method of encryption that requires the same secret key to encipher and decipher the message is known as ____ encryption.
    Selected Answer:
    Correct 
    symmetric
    Correct Answer:
    Correct symmetric
  • Question 15

    1 out of 1 points
    When an asymmetric cryptographic process uses the sender’s private key to encrypt a message, the sender’s public key must be used to decrypt the message.
    Selected Answer:
    Correct True
    Correct Answer:
    Correct True

No comments:

Post a Comment