Filters
Question type

Study Flashcards

One encryption method made popular by spy movies involves using the text in a book as the key to decrypt a message.

A) True
B) False

Correct Answer

verifed

verified

A(n)registration authority issues,manages,authenticates,signs,and revokes users' digital certificates,which typically contain the user name,public key,and other identifying information._________________________

A) True
B) False

Correct Answer

verifed

verified

The process of hiding messages within the digital encoding of a picture or graphic is called ____________________.

Correct Answer

verifed

verified

Digital signatures should be created using processes and products that are based on the ____.


A) DSS
B) NIST
C) SSL
D) HTTPS

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

____ are encrypted messages that can be mathematically proven to be authentic.


A) Digital signatures
B) MAC
C) Message certificates
D) Message digests

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

The most common hybrid system is based on the Diffie-Hellman key exchange,which is a method for exchanging private keys using public key encryption.

A) True
B) False

Correct Answer

verifed

verified

The asymmetric encryption systems use a single key to both encrypt and decrypt a message.

A) True
B) False

Correct Answer

verifed

verified

An attacker may obtain duplicate texts,one in ciphertext and one in plaintext,and thus reverse-engineer the encryption algorithm in a known-plaintext attack scheme._________________________

A) True
B) False

Correct Answer

verifed

verified

The number of horizontal and vertical pixels captured and recorded is known as the image's depth._________________________

A) True
B) False

Correct Answer

verifed

verified

____________________ or cryptosystem is an encryption method or process encompassing the algorithm,key(s)or cryptovariable(s),and procedures used to perform encryption and decryption.

Correct Answer

verifed

verified

An X.509 v3 certificate binds a ____,which uniquely identifies a certificate entity,to a user's public key.


A) message digest
B) fingerprint
C) distinguished name
D) digital signature

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Secure Electronic Transactions was developed by MasterCard and VISA in 1997 to protect against electronic payment fraud.

A) True
B) False

Correct Answer

verifed

verified

____ was developed by Phil Zimmermann and uses the IDEA Cipher for message encoding.


A) PEM
B) PGP
C) S/MIME
D) SSL

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Hashing functions require the use of keys.

A) True
B) False

Correct Answer

verifed

verified

Describe digital certificates.

Correct Answer

verifed

verified

Digital certificates are public-key cont...

View Answer

Bit stream methods commonly use algorithm functions like the exclusive OR operation (____) .


A) XOR
B) EOR
C) NOR
D) OR

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Attackers may conduct an encrypted-plaintext attack by sending potential victims a specific text that they are sure the victims will forward on to others.

A) True
B) False

Correct Answer

verifed

verified

To perform the Caesar cipher encryption operation,the pad values are added to numeric values that represent the plaintext that needs to be encrypted.

A) True
B) False

Correct Answer

verifed

verified

PGP uses the freeware ZIP algorithm to compress the message after it has been digitally signed but before it is encrypted._________________________

A) True
B) False

Correct Answer

verifed

verified

Popular cryptosystems use a hybrid combination of symmetric and asymmetric algorithms.

A) True
B) False

Correct Answer

verifed

verified

Showing 21 - 40 of 108

Related Exams

Show Answer