Info security (Test 4)

¡Supera tus tareas y exámenes ahora con Quizwiz!

What type of key or keys are used in symmetric cryptography?

A shared private key

If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message?

Alice's public key

Encrypts a hash with a shared secret key

Hashed Message Authentication Code

Which of the following is a protection provided by hashing

Integrity

Mary wants to send a message to Sam. She wants to digitally sign the message to prove that she sent it. Which key would Mary use to create the digital signature?

Mary's private key

Proving that a user sent an email message is known as _____.

Non-repudiation

Mary wants to send a message to Sam so that only Sam can read it. Which key would be used to encrypt the message?

Sam's public key

Which is the cryptography mechanism that hides secret communications within various forms of data?

Steganography

You have just downloaded a file. You create a hash of the file and compare the hash posted on the website. The two hashes match. What do you know about the file.

Your copy is the same as the one posted on the website

What is data called that is to be encrypted by inputting it into a cryptographic algorithm?

plaintext

Which type of cipher changes the position of the characters in a plain text message?

transposition

A digital signature can provide each of the following benefits except

verify the receiver


Conjuntos de estudio relacionados

Chapter 2: Quality Assurance and legal Issues in Healthcare

View Set

Chapter 18-Connecticut Laws and Rules Pertinent to Insurance

View Set

(Complete) Ch. 07: long-term assets

View Set

Chapter 4 - Life Policy Provisions & Options

View Set

Chapter 32 Animal Diversity and evolution of body plans

View Set

Life, Accident, Health & Disability Insurance

View Set

Call of the Wild - Chapter 4 Study Questions

View Set