Home Subjects Expert solutions Create Log in Sign up Upgrade to remove ads Only ₩37,125/year
Terms in this set (30)A keyword mixed alphabet cipher uses a cipher alphabet that consists of a keyword, minus duplicates, followed by the remaining letters of the alphabet true Which set of characteristics describes the Caesar cipher
accurately? Symmetric, stream, substitution Gary is sending a message to Patricia. He wants to ensure that nobody tampers with the message while it is in transit. What goal of cryptography is Gary attempting to
achieve? Integrity Digital signatures require asymmetric key cryptography. true What mathematical problem forms the basis of most modern cryptographic algorithms? Factoring large primes Which cryptographic attack offers cryptanalysts the most information about how an encryption algorithm works? Chosen plaintext The hash message authentication code
(HMAC) is a hash function that uses a key to create a hash, or message digest. true The financial industry created the ANSI X9.17 standard to define key management procedures. true When Patricia receives a message from Gary, she wants to be able to demonstrate to Sue that the message actually
came from Gary. What goal of cryptography is Patricia attempting to achieve? Nonrepudiation Which of the following allows a certificate authority (CA) to revoke a compromised digital certificate in real time? Certificate revocation list (CRL)International Data Encryption Transport Layer Security (TLS) Online Certificate Status Protocol (OCSP) Online Certificate Status Protocol (OCSP) What is NOT a symmetric encryption algorithm? Rivest-Shamir-Adelman (RSA)
A private key cipher is also called an asymmetric key cipher. true or false false In a chosen-ciphertext attack, cryptanalysts submit data coded with the same cipher and key they are trying to break to the decryption device to see either the plaintext output or the effect the decrypted message has on some system. true What is NOT an effective key distribution method for plaintext encryption keys? Unencrypted email Which information security objective allows trusted entities to endorse information? Authorization Certification Witnessing Certification Digital signatures require asymmetric key cryptography. true Betty receives a cipher text message from her colleague Tim. What type of function does Betty need to use to read the plaintext message? Hashing Decryption Validation Decryption A person demonstrates anonymity when posting information to a web discussion site without authorities knowing who he or she is. true Alice would like to send a message to Bob securely and wishes to encrypt the contents of the message. What key does she use to encrypt this message? Alice's private key Bob's public key Bob's private key Bob's public key A digitized signature is a combination of a strong hash of a message and a secret key. false Message authentication confirms the identity of the person who started a correspondence. true You must always use the same algorithm to encrypt information and decrypt the same information. false The term certificate authority (CA) refers to a trusted repository of all public keys. false Product cipher is an encryption
algorithm that has no corresponding decryption algorithm. false Which approach to cryptography provides the strongest theoretical protection? Asymmetric cryptography Elliptic curve cryptography Classic cryptography Quantum cryptography A salt
value is a set of random characters you can combine with an actual input key to create the encryption key. true Cryptographic key distribution is typically done by phone. false Bob received a message from Alice that contains a digital signature. What cryptographic key
does Bob use to verify the digital signature? Alice's private key Bob's public key Bob's private key Alice's public key What standard is NOT secure and should never be used on modern wireless networks? Wi-Fi Protected Access (WPA) Wi-Fi Protected Access version 2 (WPA2) 802.11ac Wired Equivalent Privacy (WEP) The Diffie-Hellman (DHE) algorithm is the basis for several common key exchange protocols, including Diffie-Hellman in Ephemeral mode (DHE) and Elliptic Curve DHE (ECDHE). true Students also viewedLab 8 Assessment Quiz40 terms mbarrow4PLUS Quiz 9 Information Security Fundamentals32 terms DRx_ Chapter 10 Quiz39 terms mbarrow4PLUS Chapter 920 terms reverish004 Sets found in the same folderFundamental Information Security Chapter 12: Infor…40 terms grayson_bullock6 Fundamental Information Security Chapter 15: U.S.…47 terms grayson_bullock6 Fundamental Information Security Chapter 13: Infor…44 terms grayson_bullock6 Quiz 7 Information Security Fundamentals29 terms ToothpickEse Other sets by this creatorFundamentals Networking Tech Chapter 841 terms grayson_bullock6 Fundamentals Networking Tech Chapter 438 terms grayson_bullock6 Fundamentals Networking Tech Chapter 345 terms grayson_bullock6 Fundamentals Networking Tech Chapter 1242 terms grayson_bullock6 Verified questions
computer science After the following statement executes, what elements will be stored in the myset set? myset = set('a bb ccc dddd') Verified answer
computer science Rectangle Information. This program displays information about a rectangle drawn by the user. $\mathbf{Input:}$ 2 mouse clicks for the opposite corners of a rectangle. $\mathbf{Output:}$ Draw the rectangle. Print the perimeter and area of the rectangle. $\mathbf{Formula:}$ $$ \begin{array}{c}{\text { area }=(\text {length})(\text {width})} \\ {\text {perimeter}=2(\text {length}+\text {width})}\end{array} $$ Verified answer computer science Show that the expression q² + (n - q - 1)² achieves a maximum over q = 0, 1, ..., n - 1 when q = 0 or q = n - 1. Verified answer
computer science A function with no return statement returns a) nothing b) its parameters c) its variables d) None Verified answer Recommended textbook solutionsInformation Technology Project Management: Providing Measurable Organizational Value5th EditionJack T. Marchewka 346 solutions Service Management: Operations, Strategy, and Information Technology7th EditionJames Fitzsimmons, Mona Fitzsimmons 103 solutions
Information Technology Project Management: Providing Measurable Organizational Value5th EditionJack T. Marchewka 346 solutions Computer Organization and Design MIPS Edition: The Hardware/Software Interface5th EditionDavid A. Patterson, John L. Hennessy 220 solutions Other Quizlet setsGnegy Neurotransmitters Lecture52 terms APBr0wn Mass Com Test #295 terms elizabeth_scull3 301 Quiz 124 terms joshunger_ What ISO security standard can help guide the creation of an organization's security policy?Defined within the ISO 27001 standard are information security guidelines, requirements intended to protect an organisation's data assets from loss or unauthorised access and recognised means of demonstrating their commitment to information security management through certification.
Which standard is not secure and should never be used on modern wireless networks?WEP was the first encryption protocol used to secure wireless networks and is now easily compromised and should never be used. TKIP shares many similarities with WEP encryption and is no longer considered secure. So it too should no longer be seriously considered when securing your network.
What standard is not secure and should never be used on modern wireless networks quizlet?What standard is NOT secure and should never be used on modern wireless networks? The Diffie-Hellman (DHE) algorithm is the basis for several common key exchange protocols, including Diffie-Hellman in Ephemeral mode (DHE) and Elliptic Curve DHE (ECDHE).
Which algorithm can they use to exchange a secret key?The Diffie-Hellman algorithm will be used to establish a secure communication channel. This channel is used by the systems to exchange a private key. This private key is then used to do symmetric encryption between the two systems.
When Patricia receives a message from Gary?When Patricia receives a message from Gary, she wants to be able to demonstrate to Sue that the message actually came from Gary. What goal of cryptography is Patricia attempting to achieve? Gary is sending a message to Patricia. He wants to ensure that nobody tampers with the message while it is in transit.
What is the only unbreakable cipher when it is used properly quizlet?What is the only unbreakable cipher when it is used properly? Explanation: The Vernam cipher, also known as a one-time pad, is unbreakable provided that the key is at least as long as the message and that each key is only used one time.
|