7.1.14

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following algorithms are used in asymmetric encryption? (Select two.)

Diffie-Hellman,RSA

Above all else, what must be protected to maintain the security and benefit of an asymmetric cryptographic solution, especially if it is widely used for digital certificates?

Private keys

Which of the following algorithms are used in symmetric encryption? (Select two.)

Blowfish,3DES

Which of the following can be classified as a stream cipher?

RC4

Mary wants to send a message to Sam in such a way that only Sam can read it. Which key should be used to encrypt the message?

Sam's public key

A receiver wants to verify the integrity of a message received from a sender. A hashing value is contained within the digital signature of the sender. Which of the following must the receiver use to access the hashing value and verify the integrity of the transmission?

Sender's public key

When a cryptographic system is used to protect data confidentiality, what actually takes place?

Unauthorized users are prevented from viewing or accessing the resource.

Which of the following encryption mechanisms offers the least security because of weak keys?

DES

Which type of password attack employs a list of pre-defined passwords that it tries against a login prompt?

Dictionary attack

Which term means a cryptography mechanism that hides secret communications within various forms of data?

Steganography


Conjuntos de estudio relacionados

Parts of Speech: Gerunds, Participles, and Infinitives

View Set

[Diabetes and Other Endocrine] Medical-Surgical Nursing Review Questions

View Set

Prakarya kelas 7 #makanan cepat saji

View Set

Med Surg I Prep U Chapter 10: Principles and Practices of Rehabilitation

View Set

Chapter 14: Later Life: The Physical Challenges of Old Age

View Set