Security + Mod 6

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Steganography

Which of the following hides the existence of information?

Verify the receiver

Egor wanted to use a digital signature. Which of the following benefits will the digital signature NOT provide?

It can only provide limited security

Which of the following is FALSE about "security through obscurity"?

It includes a pseudorandom number generator (PRNG).

Which of the following is NOT a characteristic of the Trusted Platform Module (TPM)?

SHA

Which of the following is NOT a symmetric cryptographic algorithm?

Digest

Which of the following is not to be decrypted but is only used for comparison purposes?

Alice's public key

If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message?

Risk

Which of these is NOT a basic security protection for information that cryptography can provide?

Collisions should occur no more than 15 percent of the time.

Which of these is NOT a characteristic of a secure hash algorithm?

Advanced Encryption Standard

Which of these is the strongest symmetric cryptographic algorithm?

Hardware Security Module (HSM)

Which of these provides cryptographic services and is external to the device?

Two files produce the same digest.

What is a collision?

Downgrade attack

Basil was reading about a new attack that forces the system to abandon a higher cryptographic security mode of operation and instead fall back to an older and less secure mode. What type of attack is this?

ROT13

Brielle is researching substitution ciphers. She came across a cipher in which the entire alphabet was rotated 13 steps. What type of cipher is this?

SHA3-512

Cicero is researching hash algorithms. Which algorithm would produce the longest and most secure digest?

Nonrepudiation

Cryptography can prevent an individual from fraudulently reneging on an action. What is this known as?

As computers become more powerful, the ability to compute factoring has increased.

Deo has been asked to explain RSA to his colleague. After his explanation, Deo is asked what, if any, weaknesses RSA has. How would Deo respond?

perfect forward secrecy

What are public key systems that generate different random public keys for each session?

Plaintext

What is data called that is to be encrypted by inputting it into a cryptographic algorithm?

The time between when a byte is input into a cryptographic cipher and when the output is obtained.

What is low latency?


संबंधित स्टडी सेट्स

Computer Science 307: Software Engineering : Chapter 3

View Set

Learning Curve: 11a The Psychoanalytic Perspective

View Set

Salesforce ADM 201 Exam Practice 940 Q&A

View Set

SB 12 Intro to Financial Accounting

View Set