CIST 1601 Chapter 8

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

The __________ algorithm, developed in 1977, was the first public-key encryption algorithm published for commercial use. a. MAC b. AES c. RSA d. DES

RSA

The __________ is responsible for the fragmentation, compression, encryption, and attachment of an SSL header to the cleartext prior to transmission. a. Standard HTTP b. SSL Record Protocol c. S-HTTP d. SFTP

SSL Record Protocol

__________ is the amount of effort (usually in hours) required to perform cryptanalysis to decode an encrypted message when the key or algorithm (or both) are unknown. a. A key b. An algorithm c. Work factor d. Code

Work factor

Bit stream methods commonly use algorithm functions like the exclusive OR operation (__________). a. XOR b. OR c. NOR d. EOR

XOR

A method of encryption that requires the same secret key to encipher and decipher the message is known as __________ encryption. a. asymmetric b. private c. symmetric d. public

symmetric

Pretty Good Privacy (PGP) uses the freeware ZIP algorithm to compress the message after it has been digitally signed but before it is encrypted. _________________________ True False

True

Within a PKI, a(n) registration authority issues, manages, authenticates, signs, and revokes users' digital certificates, which typically contain the user name, public key, and other identifying information. _________________________ True False

False

__________ functions are mathematical algorithms that generate a message summary or digest to confirm the identity of a specific message and to confirm that there have not been any changes to the content. a. Map b. Key c. Encryption d. Hash

Hash

A(n) distinguished name uniquely identifies a certificate entity to a user's public key. _________________________ True False

True

Ciphertext or a cryptogram is an encoded message, or a message that has been successfully encrypted. _________________________ True False

True

In transport mode the entire IP packet is encrypted and is then placed as the content portion of another IP packet. _________________________ True False

False

The S-HTTP security solution provides six services: authentication by digital signatures, message encryption, compression, e-mail compatibility, segmentation, and key management. True False

False

SHA-1 produces a(n) ___________-bit message digest, which can then be used as an input to a digital signature algorithm. a. 48 b. 56 c. 160 d. 256

160

Digital signatures should be created using processes and products that are based on the __________. a. SSL b. HTTPS c. NIST d. DSS

DSS

As DES became known as being too weak for highly classified communications, Double DES was created to provide a level of security far beyond that of DES. _________________________ True False

False


Kaugnay na mga set ng pag-aaral

Four Types of Nursing Assessments

View Set

Chapter 48 disorder of musculoskeletal function: trauma infection and neoplasm

View Set

Operations in Scientific Notation

View Set