Question 1
The ____ algorithm was the first public key encryption algorithm developed (in 1977) and published for commercial use.Selected Answer:
RSACorrect Answer:
RSAQuestion 2
____ is the process of converting an original message into a form that is unreadable to unauthorized individuals.Selected Answer:
EncryptionCorrect Answer:
EncryptionQuestion 3
The most popular modern version of steganography involves hiding information within files that appear to contain digital pictures or other images.Selected Answer:
TrueCorrect Answer:
TrueQuestion 4
Nonrepudiation means that customers or partners can be held accountable for transactions, such as online purchases, which they cannot later deny.Selected Answer:
TrueCorrect Answer:
TrueQuestion 5
____ are encrypted messages that can be mathematically proven to be authentic.Selected Answer:
Digital signaturesCorrect Answer:
Digital signaturesQuestion 6
____ is a hybrid cryptosystem originally designed in 1991 by Phil Zimmermann.Selected Answer:
PGPCorrect Answer:
PGPQuestion 7
Symmetric encryption uses two different but related keys, and either key can be used to encrypt or decrypt the message.Selected Answer:
FalseCorrect Answer:
FalseQuestion 8
____ is the information used in conjunction with an algorithm to create the ciphertext from the plaintext or derive the plaintext from the ciphertext.Selected Answer:
KeyCorrect Answer:
KeyQuestion 9
Hash algorithms are publicly known functions that create a value by converting variable-length messages into a single fixed-length value.Selected Answer:
TrueCorrect Answer:
TrueQuestion 10
____ attacks are a collection of brute-force methods that attempt to deduce statistical relationships between the structure of the unknown key and the ciphertext that is the output of the cryptosystem.Selected Answer:
CorrelationCorrect Answer:
CorrelationQuestion 11
Substitution ciphers that use two or more alphabets, and are referred to as ____ substitutions.Selected Answer:
polyalphabeticCorrect Answer:
polyalphabeticQuestion 12
____ is an integrated system of software, encryption methodologies, protocols, legal agreements, and third-party services that enables users to communicate securely.Selected Answer:
PKICorrect Answer:
PKIQuestion 13
____ functions are mathematical algorithms that generate a message summary or digest to confirm the identity of a specific message and to confirm that there have not been any changes to the content.Selected Answer:
HashCorrect Answer:
HashQuestion 14
A method of encryption that requires the same secret key to encipher and decipher the message is known as ____ encryption.Selected Answer:
symmetricCorrect Answer:
symmetricQuestion 15
When an asymmetric cryptographic process uses the sender’s private key to encrypt a message, the sender’s public key must be used to decrypt the message.Selected Answer:
TrueCorrect Answer:
True
Tuesday, January 14, 2014
CIS 481-20: INTRO TO INFORM SECURITY CH8
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment