Filters
Question type

Study Flashcards

Originally released as freeware, ____________________ is a hybrid cryptosystem that combines some of the best available cryptographic algorithms as an open-source de facto standard for encryption and authentication of e-mail and file storage.

Correct Answer

verifed

verified

Pretty Goo...

View Answer

A message ____________________ is a fingerprint of the author's message that is compared with the recipient's locally calculated hash of the same message.

Correct Answer

verifed

verified

A method of encryption that requires the same secret key to encipher and decipher the message is known as __________ encryption.


A)  asymmetric
B)  symmetric 
C)  public
D)  private

Correct Answer

verifed

verified

Diffie-Hellman key exchange uses asymmetric encryption to exchange session keys. _________________________

Correct Answer

verifed

verified

Encryption is the process of converting the ciphertext message back into plaintext so that it can be readily understood. _________________________

Correct Answer

verifed

verified

Usually, as the length of a cryptovariable increases, the number of random guesses that have to be made in order to break the code is reduced.

Correct Answer

verifed

verified

Digital signatures should be created using processes and products that are based on the __________.


A)  DSS
B)  NIST 
C)  SSL
D)  HTTPS

Correct Answer

verifed

verified

In addition to being credited with inventing a substitution cipher, Julius Caesar was associated with an early version of the transposition cipher.

Correct Answer

verifed

verified

Netscape developed the ____________________ Layer protocol to use public-key encryption to secure a channel over the Internet, thus enabling secure communications.

Correct Answer

verifed

verified

Secure Soc...

View Answer

The AES algorithm was the first public-key encryption algorithm to use a 256-bit key length.

Correct Answer

verifed

verified

Nonrepudiation means that customers or partners can be held accountable for transactions, such as online purchases, which they cannot later deny.

Correct Answer

verifed

verified

More advanced substitution ciphers use two or more alphabets, and are referred to as __________ substitutions.


A)  multialphabetic
B)  monoalphabetic 
C)  polyalphabetic
D)  polynomic

Correct Answer

verifed

verified

S-HTTP is an extended version of Hypertext Transfer Protocol that provides for the encryption of protected e-mail transmitted via the Internet between a client and server. _________________________

Correct Answer

verifed

verified

A(n) ____________________ or cryptosystem is an encryption method or process encompassing the algorithm, key(s) or cryptovariable(s), and procedures used to perform encryption and decryption.

Correct Answer

verifed

verified

PKI systems are based on public-key cryptosystems and include digital certificates and certificate authorities.

Correct Answer

verifed

verified

The permutation cipher simply rearranges the values within a block to create the ciphertext.

Correct Answer

verifed

verified

The science of encryption is known as ____________________.

Correct Answer

verifed

verified

Using a database of precomputed hashes from sequentially calculated passwords called a(n) __________, an attacker can simply look up a hashed password and read out the text version.


A)  timing matrix
B)  agile scrum 
C)  rainbow table
D)  smurf list

Correct Answer

verifed

verified

Common implementations of a registration authority (RA) include functions to issue digital certificates to users and servers.

Correct Answer

verifed

verified

Hash algorithms are public functions that create a message digest by converting variable-length messages into a single fixed-length value. _________________________

Correct Answer

verifed

verified

Showing 41 - 60 of 109

Related Exams

Show Answer