Show
Home Subjects Expert solutions Create Log in Sign up Upgrade to remove ads Only ₩37,125/year
Terms in this set (20)Alice and Bob would like to communicate with each other using a session key but they do not already have a shared secret key. Which algorithm can they use to exchange a secret key? Diffie-Hellman Alice would like to send a message to Bob securely and wishes to encrypt the contents of the message. What key does she use to encrypt this message? Bob's public key What type of function generates the unique value that corresponds to the contents of a message and is used to create a digital signature? Hash What mathematical problem forms the basis of most modern cryptographic algorithms? Factoring large primes Which type of cipher works by rearranging the characters in a message? Transposition Which information security objective allows trusted entities to endorse information? Certification What standard is NOT secure and should never be used on modern wireless networks? Wired Equivalent Privacy (WEP) Bob received a message from Alice that contains a digital signature. What cryptographic key does Bob use to verify the digital signature? Alice's public key Betty receives a ciphertext message from her colleague Tim. What type of function does Betty need to use to read the plaintext message? Decryption What is NOT an effective key distribution method for plaintext encryption keys? Unencrypted email What is NOT a symmetric encryption algorithm? ? RSA, marked wrong When Patricia receives a message from Gary, she wants to be able to demonstrate to Sue that the message actually came from Gary. What goal of cryptography is Patricia attempting to achieve? Nonrepudiation What is the only unbreakable cipher when it is used properly? Vernam Which cryptographic attack offers cryptanalysts the most information about how an encryption algorithm works? Chosen plaintext Which set of characteristics describes the Caesar cipher accurately? Symmetric, stream, substitution Which approach to cryptography provides the strongest theoretical protection? Quantum Cryptography
What is NOT a valid encryption key length for use with the Blowfish algorithm? 512 bits Alice would like to send a message to Bob using a digital signature. What cryptographic key does Alice use to create the digital signature? Alice's private key Gary is sending a message to Patricia. He wants to ensure that nobody tampers with the message while it is in transit. What goal of cryptography is Gary attempting to achieve? Integrity Which of the following allows a certificate authority (CA) to revoke a compromised digital certificate in real time? Online Certificate Status Protocol (OCSP) Students also viewedLab 8 Assessment Quiz40 terms mbarrow4PLUS Fundamental Information Security Chapter 9: Crypto…30 terms grayson_bullock6 Chapter 10 Quiz39 terms mbarrow4PLUS Quiz 9 Information Security Fundamentals32 terms DRx_ Sets found in the same folderChapter 10 Quiz39 terms mbarrow4PLUS Quiz 9 Information Security Fundamentals32 terms DRx_ Chapter 11 Quiz40 terms mbarrow4PLUS Lab 8 Assessment Quiz40 terms mbarrow4PLUS Other sets by this creatorCNT4155 module 613 terms Daniel_Bauza CNT4155 module 520 terms Daniel_Bauza iot sec 5s50 terms Daniel_Bauza iot sec 4a45 terms Daniel_Bauza Verified questionscomputer science Assuming that a Random object called generator has been created, what is the range of the result of each of the following expressions? a. generator.nextInt(20), b. generator.nextlnt(8)+1, c. generator.nextlnt(45)+10, d. generator.nextlnt(100)-50. Verified answer computer science How can we modify almost any algorithm to have a good best-case running time? Verified answer
computer science A file of 4,096 blocks is to be sorted with an available buffer space of 64 blocks. How many passes will be needed in the merge phase of the external sort-merge algorithm? Verified answer
computer science Which of the following is not a part of the IPO pattern? a) Input b) Program c) Process d) Output Verified answer Recommended textbook solutionsInformation Technology Project Management: Providing Measurable Organizational Value5th EditionJack T. Marchewka 346 solutions Information Technology Project Management: Providing Measurable Organizational Value5th EditionJack T. Marchewka 346 solutions Computer Organization and Design MIPS Edition: The Hardware/Software Interface5th EditionDavid A. Patterson, John L. Hennessy 220 solutions
Fundamentals of Database Systems7th EditionRamez Elmasri, Shamkant B. Navathe 687 solutions Other Quizlet setsAIS final MC35 terms Chad_Kort GEOG 1200 Final114 terms julianne__mae Economics Final Exam89 terms amazingandrew1568 Test 5 - Week 1 combined set67 terms Julius_Pallotta What type of function generates the unique value that corresponds to the contents of a message?What type of function generates the unique value that corresponds to the contents of a message and is used to create a digital signature? Explanation: Hash functions create a unique, fixed-length output for any given input. This hash value, also known as a message digest, is used to create a digital signature.
What type of cipher replaces bits characters or blocks of information with other bits characters or blocks?Substitution ciphers.
Replace bits, characters, or character blocks in plaintext with alternate bits, characters or character blocks to produce ciphertext. A substitution cipher may be monoalphabetic or polyalphabetic: A single alphabet is used to encrypt the entire plaintext message.
Which algorithm can they use to exchange a secret key?The Diffie-Hellman algorithm will be used to establish a secure communication channel. This channel is used by the systems to exchange a private key. This private key is then used to do symmetric encryption between the two systems.
What standard is not secure and should never be used on modern wireless networks quizlet?What standard is NOT secure and should never be used on modern wireless networks? The Diffie-Hellman (DHE) algorithm is the basis for several common key exchange protocols, including Diffie-Hellman in Ephemeral mode (DHE) and Elliptic Curve DHE (ECDHE).
|