Filters
Question type

Study Flashcards

A __________ is to try every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained.


A) mode of operation
B) hash function
C) cryptanalysis
D) brute-force attack

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

The __________ is a pair of keys that have been selected so that if one is used for encryption, the other is used for decryption.

Correct Answer

verifed

verified

public and...

View Answer

A _________ protects against an attack in which one party generates a message for another party to sign.


A) data authenticator
B) strong hash function
C) weak hash function
D) digital signature

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Digital signatures and key management are the two most important applications of __________ encryption.


A) private-key
B) public-key
C) preimage resistant
D) advanced

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

A __________ processes the input elements continuously, producing output one element at a time.

Correct Answer

verifed

verified

Public-key cryptography is asymmetric.

A) True
B) False

Correct Answer

verifed

verified

If the only form of attack that could be made on an encryption algorithm is brute-force, then the way to counter such attacks would be to __________ .


A) use longer keys
B) use shorter keys
C) use more keys
D) use less keys

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Some form of protocol is needed for public-key distribution.

A) True
B) False

Correct Answer

verifed

verified

A __________ is created by using a secure hash function to generate a hash value for a message and then encrypting the hash code with a private key.


A) digital signature
B) keystream
C) one way hash function
D) secret key

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

A __________ processes the plaintext input in fixed-size blocks and produces a block of ciphertext of equal size for each plaintext block.

Correct Answer

verifed

verified

Cryptanalytic attacks try every possible key on a piece of ciphertextuntil an intelligible translation into plaintext is obtained.

A) True
B) False

Correct Answer

verifed

verified

In July 1998 the __________ announced that it had broken a DES encryption using a special purpose "DES cracker" machine.

Correct Answer

verifed

verified

Electronic...

View Answer

A _________ is a hardware device that sits between servers and storage systems and encrypts all data going from the server to the storage system and decrypts data going in the opposite direction.

Correct Answer

verifed

verified

An important element in many computer security services andapplications is the use of cryptographic algorithms.

A) True
B) False

Correct Answer

verifed

verified

A message authentication code is a small block of data generated by asecret key and appended to a message.

A) True
B) False

Correct Answer

verifed

verified

The purpose of a __________ is to produce a "fingerprint" of a file, message, or other block of data.


A) secret key
B) digital signature
C) keystream
D) hash function

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

The two criteria used to validate that a sequence of numbers is random are independence and _________ .

Correct Answer

verifed

verified

uniform di...

View Answer

__________ is provided by means of a co-processor board embedded in the tape drive and tape library hardware.

Correct Answer

verifed

verified

library-ba...

View Answer

Modes of operation are the alternative techniques that have beendeveloped to increase the security of symmetric block encryption for large sequences of data.

A) True
B) False

Correct Answer

verifed

verified

The most important symmetric algorithms, all of which are block ciphers, are the DES, triple DES, and the __________.


A) SHA
B) RSA
C) AES
D) DSS

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Showing 21 - 40 of 45

Related Exams

Show Answer