Question 1
The ____ algorithm was the first public key encryption algorithm developed (in 1977) and published for commercial use.Selected Answer: 
 
RSACorrect Answer: 
 RSAQuestion 2
____ is the process of converting an original message into a form that is unreadable to unauthorized individuals.Selected Answer: 
 
EncryptionCorrect Answer: 
 EncryptionQuestion 3
The most popular modern version of steganography involves hiding information within files that appear to contain digital pictures or other images.Selected Answer: 
 TrueCorrect Answer: 
 TrueQuestion 4
Nonrepudiation means that customers or partners can be held accountable for transactions, such as online purchases, which they cannot later deny.Selected Answer: 
 TrueCorrect Answer: 
 TrueQuestion 5
____ are encrypted messages that can be mathematically proven to be authentic.Selected Answer: 
 
Digital signaturesCorrect Answer: 
 Digital signaturesQuestion 6
____ is a hybrid cryptosystem originally designed in 1991 by Phil Zimmermann.Selected Answer: 
 
PGPCorrect Answer: 
 PGPQuestion 7
Symmetric encryption uses two different but related keys, and either key can be used to encrypt or decrypt the message.Selected Answer: 
 FalseCorrect Answer: 
 FalseQuestion 8
____ is the information used in conjunction with an algorithm to create the ciphertext from the plaintext or derive the plaintext from the ciphertext.Selected Answer: 
 
KeyCorrect Answer: 
 KeyQuestion 9
Hash algorithms are publicly known functions that create a value by converting variable-length messages into a single fixed-length value.Selected Answer: 
 TrueCorrect Answer: 
 TrueQuestion 10
____ attacks are a collection of brute-force methods that attempt to deduce statistical relationships between the structure of the unknown key and the ciphertext that is the output of the cryptosystem.Selected Answer: 
 
CorrelationCorrect Answer: 
 CorrelationQuestion 11
Substitution ciphers that use two or more alphabets, and are referred to as ____ substitutions.Selected Answer: 
 
polyalphabeticCorrect Answer: 
 polyalphabeticQuestion 12
____ is an integrated system of software, encryption methodologies, protocols, legal agreements, and third-party services that enables users to communicate securely.Selected Answer: 
 
PKICorrect Answer: 
 PKIQuestion 13
____ functions are mathematical algorithms that generate a message summary or digest to confirm the identity of a specific message and to confirm that there have not been any changes to the content.Selected Answer: 
 
HashCorrect Answer: 
 HashQuestion 14
A method of encryption that requires the same secret key to encipher and decipher the message is known as ____ encryption.Selected Answer: 
 
symmetricCorrect Answer: 
 symmetricQuestion 15
When an asymmetric cryptographic process uses the sender’s private key to encrypt a message, the sender’s public key must be used to decrypt the message.Selected Answer: 
 TrueCorrect Answer: 
 True
Tuesday, January 14, 2014
CIS 481-20: INTRO TO INFORM SECURITY CH8
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment