MIS Security: Chapter 9

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

_________ is the act of unscrambling ciphertext into plaintext - decryption - salt value - hash - algorithm

Decryption

decryption is the act of unscrambling ciphertext into plaintex. True or false.

True

a salt value is a set of random characters that you can combine with an actual input key to create the encryption key. True or false.

True.

encryption is the act of scrambling plaintext into ciphertext. true or false.

Truth

what term is used to describe a type of crytography that uses a cipher with two separate keys, one for encryption and one for decryption, so that correspondents do not first have to exchange secret information to communicate securely? - hash - key distribution - symmetric key cryptography - asymmetric key cryptography

asymmetric (public) key cryptography

in a ____________, the cryptanalyst can encrypt any information and observe the output. This is the best for the cryptanalyst. - chosen-plaintext attack - chosen-ciphertext attack - ciphertext-only attack - known-plaintext attack

chosen plain text attack

in a __________________ cryptanalysts submit data coded with the same cipher and key they are trying to break to the decryption device to see either the plaintext output or the effect the decrypted message has on some system - ciphertext-only attack (COA) - chosen-plaintext attack - known-plaintext attack (KPA) - chosen-ciphertext attack

chosen-ciphertext attack

which of the following is the definition of Vigenerecipher? - an encryption cipher that is a product cipher with a 56-bit key consisting of 16 iterations of substitution and transformation - encryption cipher that uses multiple encryption schemes in succession - encryption cipher that replaces bits, characters, or blocks of information with other bits, characters, or blocks - encryption cipher that shifts each letter in the english alphabet a fixed number of positions, with Z wrapping back to A.

encryption cipher that uses multiple encryption schemes in succession

in a chosen-plaintext attack, cryptanalysts submit data coded with the same cipher and key they are trying to break to the decryption device to see either the plaintext output or the effect the decrypted message has on some system. True or false.

false - its a chosen - ciphertext attack

a __________ is an encryption key used to encrypt other keys before transmitting them. - key distribution - private (symmetric) key - key directory - key-encrypting key

key-encrypting key

what name is given to an encryption cipher that uniquely maps any letter to any other letter? - simple substitution cipher - product cipher - standard cipher - transposition cipher

simple substitution cipher

Certain security objectives add value to information systems. ____________ provides an exact time when a producer creates or sends information - ownership - timestamping - revocation - message authentication

timestamping

a crypto accelerator offloads cryptographic routines from the main processor to cards that have chipsets designed for fast encryption. true or false

true

an asymmetric key distribution system has no need for couriers, back channels, or expensive storage or inventory plans. True or False?

true

in a _______ cryptanalyst has access only to a segment of encrypted data, and has no choice as to what that data might be. - known-plaintext attack - ciphertext-only attack - chosen-ciphertext attack - chosen-plaintext attack

ciphertext only attack

in a known-plaintext attack, the cryptanalyst has access only to a segment of encrypted data, and has no choice as to what that data might be. True or false.

false - this is ciphertext-only attack

a ________ is one of the simplest substitution ciphers. It shifts each letter in the English alphabet a fixed number of positions, with Z wrapping back to A. - vigernere cipher - product cipher - transposition cipher - caesar cipher

Caesar cipher

what is meant by key distribution? - a trusted entity that stores and distributes verified digital certificates - an encryption cipher that uses the same key to encrypt and decrypt information - a trusted repository of all public keys - the process of issuing keys to valid users of a cryptosystem so they can communicate

the process of issuing keys to valid users of a cryptosystem so they can communicate

what is meant by key distribution? - trusted repository of all public keys - trusted entity that stores and distributes verified digital certificates. - encryption cipher that uses the same key, to encrypt and decrypt information - the process of issuing keys to valid users of a cryptosystem so they can communicate

the process of issuing keys to valid users of a cryptosystem so they can communicate


Set pelajaran terkait

ASB 222 Ancient Cities and Lost Tribes: Module 2

View Set

Final Exam Org Strategy and Policy Dr. Perez Batres MSU

View Set

Developmental Psychology TEST 2 Chapters 5,6,8, &9

View Set

Chap 12 Mastering Biology Assignment

View Set

The World Tang Soo Do Association History

View Set

Le premier Travail de Damien Ch 1-2

View Set