Info security (Test 4)
What type of key or keys are used in symmetric cryptography?
A shared private key
If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message?
Alice's public key
Encrypts a hash with a shared secret key
Hashed Message Authentication Code
Which of the following is a protection provided by hashing
Integrity
Mary wants to send a message to Sam. She wants to digitally sign the message to prove that she sent it. Which key would Mary use to create the digital signature?
Mary's private key
Proving that a user sent an email message is known as _____.
Non-repudiation
Mary wants to send a message to Sam so that only Sam can read it. Which key would be used to encrypt the message?
Sam's public key
Which is the cryptography mechanism that hides secret communications within various forms of data?
Steganography
You have just downloaded a file. You create a hash of the file and compare the hash posted on the website. The two hashes match. What do you know about the file.
Your copy is the same as the one posted on the website
What is data called that is to be encrypted by inputting it into a cryptographic algorithm?
plaintext
Which type of cipher changes the position of the characters in a plain text message?
transposition
A digital signature can provide each of the following benefits except
verify the receiver