Cybersecurity Chapter 8 Quiz

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What is most true regarding certified encryption methods?

There is no such thing as certified encryption.

Why is binary mathematical encryption not secure?

It does not change letter or word frequency.

What is the advantage of a symmetric key system using 64-bit blocks?

It is fast.

What is most likely to be true of an encryption method that is advertised as unbreakable?

It is likely to be exaggerated.

What is the main problem with simple substitution?

It maintains letter and word frequency.

What is most true regarding new encryption methods?

Never use them until they have been proven.

What is PGP?

Pretty Good Privacy, a public key encryption method

What type of encryption uses different keys to encrypt and decrypt the message?

Public key

What is true regarding binary operations and encryption?

They can form a part of viable encryption methods.

Which binary mathematical operation can be used for simple (but unsecured) encryption method and is in fact a part of modern symmetric ciphers?

XOR

What size key does a DES system use?

56 bit

What is available as an add-in for most email clients?

PGP

What is the oldest encryption method discussed in the textbook?

Caesar cipher

What should you be most careful of when looking for an encryption method to use?

How long the algorithm has been around

What is an encryption methods that uses two or more different shifts?

Multi-alphabet encryption

What method uses a variable-length symmetric key?

Blowfish

What accurately defines encryption?

Changing a message so that it can only be easily read by the intended recipient

What is a symmetric key system that uses 64-bit blocks?

DES


संबंधित स्टडी सेट्स

Chapter 15 Extra Credit Questions

View Set

Chapter 14: Managerial Decision-Making Under Uncertainty

View Set

Honors Physics-Chapter 3 CONCEPTUAL QUESTIONS

View Set

AQA A-Level Chemistry: acids and bases

View Set

Series 63 wrong answers to study

View Set