Filters
Question type

Study Flashcards

The process of obtaining the plaintext message from a ciphertext message without knowing the keys used to perform the encryption is called ___________.

Correct Answer

verifed

verified

Steganography is a data hiding method that involves embedding information within other files, such as digital pictures or other images.

A) True
B) False

Correct Answer

verifed

verified

Pretty Good Privacy (PGP) uses the freeware ZIP algorithm to compress the message after it has been digitally signed but before it is encrypted. _________________________

A) True
B) False

Correct Answer

verifed

verified

A(n) distinguished name uniquely identifies a certificate entity to a user's public key. _________________________

A) True
B) False

Correct Answer

verifed

verified

__________ is the entire range of values that can possibly be used to construct an individual key.


A)  Code
B)  Keyspace 
C)  An algorithm
D)  A cryptogram

E) B) and D)
F) A) and C)

Correct Answer

verifed

verified

In the context of a PKI, a(n) ____________________ authority operates under the trusted collaboration of the certificate authority and can be delegated day-to-day certification functions, such as verifying registration information about new registrants, generating end-user keys, revoking certificates, and validating that users possess a valid certificate.

Correct Answer

verifed

verified

Describe symmetric and asymmetric encryption.

Correct Answer

verifed

verified

Symmetric Encryption. Encryption methodo...

View Answer

The successor to 3DES is the ____________________ Encryption Standard.

Correct Answer

verifed

verified

A mathematical ____________________ is a secret mechanism that enables you to easily accomplish the reverse function in a one-way function.

Correct Answer

verifed

verified

To use a(n) ____________________ cipher, you substitute one value for another.

Correct Answer

verifed

verified

The most popular modern version of steganography involves hiding information within files that contain digital pictures or other images. _________________________

A) True
B) False

Correct Answer

verifed

verified

__________ is an integrated system of software, encryption methodologies, protocols, legal agreements, and third-party services that enables users to communicate securely.


A)  MAC
B)  PKI 
C)  DES
D)  AES

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

At the World Championships in Athletics in Helsinki in August 2005, a virus called Cabir infected dozens of __________, the first time this occurred in a public setting.


A)  iPad tablets
B)  Bluetooth mobile phones 
C)  WiFi routers
D)  laptop Macintosh computers

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Hashing functions do not require the use of keys, but it is possible to attach a ____________________ code to allow only specified recipients to access the message digest.

Correct Answer

verifed

verified

message au...

View Answer

To encipher means to decrypt, decode, or convert ciphertext into the equivalent plaintext. _________________________

A) True
B) False

Correct Answer

verifed

verified

UltraViolet wireless (UVW) is a de facto industry standard for short-range wireless communications between devices. _________________________

A) True
B) False

Correct Answer

verifed

verified

In IPSec ____________________ mode, only the IP data is encrypted, not the IP headers.

Correct Answer

verifed

verified

Internet Protocol Security (IPSec) is an open-source protocol framework for security development within the TCP/IP family of protocols.

A) True
B) False

Correct Answer

verifed

verified

The __________ algorithm, developed in 1977, was the first public-key encryption algorithm published for commercial use.


A)  DES
B)  RSA 
C)  MAC
D)  AES

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

Ciphertext or a cryptogram is an encoded message, or a message that has been successfully encrypted. _________________________

A) True
B) False

Correct Answer

verifed

verified

Showing 81 - 100 of 109

Related Exams

Show Answer