Filters
Question type

Study Flashcards

Match each item with a statement below. -Operate on plaintext one bit at a time


A) asymmetric algorithm
B) DEA
C) symmetric algorithm
D) certificate
E) hashing algorithm
F) birthday attacks
G) stream cipher
H) PKI
I) key
J) salt

K) C) and E)
L) D) and J)

Correct Answer

verifed

verified

Match each item with a statement below. -A sequence of random bits generated from a range of allowable values


A) asymmetric algorithm
B) DEA
C) symmetric algorithm
D) certificate
E) hashing algorithm
F) birthday attacks
G) stream cipher
H) PKI
I) key
J) salt

K) B) and H)
L) B) and E)

Correct Answer

verifed

verified

What type of attack is being performed when the attacker has access to plaintext and ciphertext,and can choose which messages to encrypt?


A) chosen-ciphertext
B) chosen-plaintext
C) known plaintext
D) ciphertext-only

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

What is cryptanalysis?

Correct Answer

verifed

verified

As long as people attempt to create encr...

View Answer

What application is considered the original password-cracking program and is now used by many government agencies to test for password strength?


A) John the Ripper
B) Hydra (THC)
C) Pwdump3v2
D) L0phtcrack

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

Asymmetric algorithms are more scalable than symmetric algorithms.

A) True
B) False

Correct Answer

verifed

verified

Match each item with a statement below. -A digital document that verifies the two parties exchanging data over the Internet are really who they claim to be


A) asymmetric algorithm
B) DEA
C) symmetric algorithm
D) certificate
E) hashing algorithm
F) birthday attacks
G) stream cipher
H) PKI
I) key
J) salt

K) A) and G)
L) A) and I)

Correct Answer

verifed

verified

Which of the following is a function that takes a variable-length string or message and produces a fixed-length message digest?


A) RSA algorithm
B) hashing algorithm
C) data algorithm
D) VLS algorithm

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Match each item with a statement below. -A structure consisting of programs,protocols,and security policies for encrypting data and uses public key cryptography to protect data transmitted over the Internet


A) asymmetric algorithm
B) DEA
C) symmetric algorithm
D) certificate
E) hashing algorithm
F) birthday attacks
G) stream cipher
H) PKI
I) key
J) salt

K) B) and D)
L) A) and J)

Correct Answer

verifed

verified

What encryption algorithm is efficient requiring few resources,and is based on complex algebra and calculations on curves?


A) RSA
B) DES
C) ECC
D) IDEA

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

Showing 41 - 50 of 50

Related Exams

Show Answer