We have sent an email with your new password.


Chapter 7

20 Kesyon  I  By [email protected]
Chapter 7

  
Changes are done, please start the quiz.


Question Excerpt

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
1.  The permutation cipher simply rearranges the values within a block to create the ciphertext.
1.
2.
2.  Hashing functions require the use of keys.
1.
2.
3.  The asymmetric encryption systems use a single key to both encrypt and decrypt a message.
1.
2.
4.  PKI systems are based on public key cryptosystems and include digital certificates and certificate authorities.
1.
2.
5.  The encapsulating security payload protocol provides secrecy for the contents of network communications as well as system-to-system authentication and data integrity verification.
1.
2.
6.  ____ is the process of converting an original message into a form that is unreadable to unauthorized individuals.
1.
2.
3.
4.
7.  ____ is the information used in conjunction with an algorithm to create the ciphertext from the plaintext or derive the plaintext from the ciphertext.
1.
2.
3.
4.
8.  Bit stream methods commonly use algorithm functions like the exclusive OR operation (____).
1.
2.
3.
4.
9.  ____ functions are mathematical algorithms that generate a message summary or digest to confirm the identity of a specific message and to confirm that there have not been any changes to the content.
1.
2.
3.
4.
10.  DES uses a(n) ____-bit block size.
1.
2.
3.
4.
11.  ____ is a federal information processing standard that specifies a cryptographic algorithm used within the U.S. government to protect information in federal agencies that are not a part of the national defense infrastructure.
1.
2.
3.
4.
12.  The ____ algorithm was the first public key encryption algorithm developed (in 1977) and published for commercial use.
1.
2.
3.
4.
13.  ____ is an integrated system of software, encryption methodologies, protocols, legal agreements, and third-party services that enables users to communicate securely.
1.
2.
3.
4.
14.  ____ are encrypted messages that can be mathematically proven to be authentic
1.
2.
3.
4.
15.  The ____ is responsible for the fragmentation, compression, encryption, and attachment of an SSL header to the cleartext prior to transmission.
1.
2.
3.
4.
16.  The ____ protocol provides system-to-system authentication and data integrity verification, but does not provide secrecy for the content of a network communication.
1.
2.
3.
4.
17.  ____ is a hybrid cryptosystem that combines some of the best available cryptographic algorithms and has become the open-source de facto standard for encryption and authentication of e-mail and file storage applications.  
1.
2.
3.
4.
18.  ____ attacks are a collection of brute-force methods that attempt to deduce statistical relationships between the structure of the unknown key and the ciphertext that is the output of the cryptosystem.
1.
2.
3.
4.
19.  In a ____ attack, the attacker eavesdrops during the victim’s session and uses statistical analysis of patterns and inter-keystroke timings to discern sensitive session information.
1.
2.
3.
4.
20.  ____ is the protocol used to secure communications across any IP-based network such as LANs, WANs, and the Internet.
1.
2.
3.
4.
Back to top

Removing ad is a premium feature

Upgrade and get a lot more done!
Take Another Quiz