Quiz 8 Coms System Security

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What mathematical problem forms the basis of most modern cryptographic algorithms?

Factoring large primes

When Patricia receives a message from Gary, she wants to be able to demonstrate to Sue that the message actually came from Gary. What goal of cryptography is Patricia attempting to achieve?

Nonrepudiation

What standard is NOT secure and should never be used on modern wireless networks?

Wired Equivalent Privacy (WEP)

Which information security objective allows trusted entities to endorse information?

Certification

A digitized signature is a combination of a strong hash of a message and a secret key.

False

Alice would like to send a message to Bob using a digital signature. What cryptographic key does Alice use to create the digital signature?

Alice's private key

Gary is sending a message to Patricia. He wants to ensure that nobody tampers with the message while it is in transit. What goal of cryptography is Gary attempting to achieve?

Integrity

Which approach to cryptography provides the strongest theoretical protection?

Quantum cryptography

What is NOT a symmetric encryption algorithm?

Rivest-Shamir-Adelman (RSA)

What is NOT an effective key distribution method for plaintext encryption keys?

Unencrypted email


Set pelajaran terkait

Intro to Theatre - Notes and quizes for the final exam Chapter 10-17

View Set

Unit 2 - Debt, Bonds, Money Market Instruments

View Set

Latin American History - Unit 3 Vocabulary (Ch. 4, 5, & 6)

View Set

History Alive - 7th Grade - Chapter 23: Maya Quiz

View Set

BUS 250 CH.20 (worksheets & homework)

View Set

Unit 6 Lesson 1: Una comida en el campo

View Set