Firnhaber - Chpt 11

5 Questions

Settings
Please wait...
Germany Quizzes & Trivia

4/16/2013


Questions and Answers
  • 1. 
    Alice wants to see Bob's digital signature, which key does she use to decrypt the hash?
    • A. 

      Alice's private key

    • B. 

      Bob's private key

    • C. 

      Alice's public key

    • D. 

      Bob's public key

  • 2. 
    Which two of the following streams of bits are combined using (XOR) to come up with the ciphertext
    • A. 

      Cleartext

    • B. 

      Cipher stream

    • C. 

      Plaintext

    • D. 

      Substitution cipher

  • 3. 
    NTRUEncrypt is used to encrypt customer credit card information at gasoline service stations.
    • A. 

      True

    • B. 

      False

  • 4. 
    In the SHA-2 variations the number following SHA indicates the _____________.
    • A. 

      Length in bits of the hash.

    • B. 

      Length in bits of the header.

    • C. 

      Prototype version number.

    • D. 

      Number of bytes in the padding.

  • 5. 
    The word cryptography derives from the  ___________.
    • A. 

      Latin words for random symbols.

    • B. 

      Latin words for hidden numbers.

    • C. 

      Greek words form hidden writing.

    • D. 

      Greek words for invisible codes.