A)To counter security attacks, and they make use of one or more security mechanisms to provide the service.
B)To learn or make use of information from the system but does not affect system resources
C)To provide timeliness of authorisation to use or manipulate information or resources
D)To bind information to an entity
E)To alter system resources or affect their operation.
A) A potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm.
B) Any action that compromises the security of information owned by an organization
C) All of the statement
D) A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization.
E) A process that is designed to detect, prevent, or recover from a security attack.
What does the fox say.
Option 2
A) Deciphering
B) Decryption
C) All of the statement
D) Encryption
E) Enciphering
A) processes the input elements continuously, producing output one element at a time, as it goes along
B) A procedure used during symmetric block encryption that makes an output block dependent not only on the current plaintext input block and key, but also on earlier input and/or output.
C) processes the input one block of elements at a time, producing an output block for each input block.
D) exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used
E) verification the integrity of a message
A) None of the statements
B) Letter
C) Twogram
D) Bigram
E) Digram
A) Decryption
B) Enciphering
C) All of the statements
D) Deciphering
E) Encryption
A) All of the statements
B) A process that is designed to detect, prevent, or recover from a security attack.
C) A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization.
D) A potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm.
E) Any action that compromises the security of information owned by an organization
A) Preventing or inhibiting the normal use or management of communications facilities
B) The passive capturing of a data unit and its subsequent retransmission to produce an unauthorized effect
C) One entity pretends to be a different entity
D) Restricting access to resources to privileged entities.
E) Altering some portion of a legitimate message, or that messages are delayed or reordered, to produce an unauthorized effect
A) Cipher
B) Encryption
C) Plaintext
D) Ciphertext
E) Decryption
A) User education
B) Reactive password checking
C) User-generated passwords
D) Computer-generated passwords
E) Proactive password checking
A) resource intensive
B) Others may not be good judges of what is a strong password.
C) users will not be able to remember them
D) any existing passwords remain vulnerable
E) many users will simply ignore the guidelines.
A) Masquerader
B) Crypto analyzer
C) Misfeasor
D) Clandestine user
E) Cryptologist
A) Masquerader
B) Misfeasor
C) Cryptologist
D) Clandestine user
E) Crypto analyzer
A) Hybrid Cryptosystem
B) Diffusion
C) Diffie-Hellman Algorithm
D) Digital signature
E) Man-in-the-middle attack
A) AES
B) RC4
C) RSA
D) DES
E) SHA1
A) It effectively increases the length of the password without requiring the user to remember two additional characters.
B) It prevents password from being corrupted by intruders.
C) It prevents the users from creating passwords.
D) It effectively decreases the length of the password without requiring the user to remember two additional characters.
E) It is used as a secret key for encryption password.
A) Computer-generated passwords
B) Reactive password checking
C) Proactive password checking
D) User education
E) User-generated passwords
A) It effectively decreases the length of the password without requiring the user to remember two additional characters
B) It prevents the users from creating passwords.
C) It prevents password from being corrupted by intruders
D) It prevents duplicate passwords from being visible in the password file
E) It is used as a secret key for encryption password.
A) User education
B) Proactive password checking
C) User-generated passwords
D) Reactive password checking
E) Computer-generated passwords
A) Stream
B) Asymmetric
C) Block
D) Classical
E) Public-key
A) The cryptosystem will stop working
B) the output will be gibberish
C) There is an error message
D) Nothing will happen
E) The output will not be visible
A) 8
B) 17
C) 16
D) 0
E) 9
A) 8
B) RC4 does not need padding
C) Depends on the size of the block
D) 2
E) 4
A) In symmetric-key cryptography, the key that is used to encrypt data is the same key that is used to decrypt it
B) In cryptography, to protect the contents of your files, you install a lock (a decryption algorithm) on your door (the computer).
C) The term “key” comes from the fact that the password you choose works in the same way that a conventional key works
D) The encryption algorithm performs its steps using the key to alter the ciphertext and convert it to plaintext
E) The decryption algorithm performs its steps using the key to alter the plaintext and convert it to ciphertext