Filters
Question type

Study Flashcards

The process of hiding messages within the digital encoding of a picture or graphic is called ____________________.

Correct Answer

verifed

verified

Attackers may conduct an encrypted-plaintext attack by sending potential victims a specific text that they are sure the victims will forward on to others.

Correct Answer

verifed

verified

An X.509 v3 certificate binds a ____,which uniquely identifies a certificate entity,to a user's public key.


A) message digest
B) fingerprint
C) distinguished name
D) digital signature

Correct Answer

verifed

verified

Secure Electronic Transactions was developed by MasterCard and VISA in 1997 to protect against electronic payment fraud.

Correct Answer

verifed

verified

____ was developed by Phil Zimmermann and uses the IDEA Cipher for message encoding.


A) PEM
B) PGP
C) S/MIME
D) SSL

Correct Answer

verifed

verified

An attacker may obtain duplicate texts,one in ciphertext and one in plaintext,and thus reverse-engineer the encryption algorithm in a known-plaintext attack scheme._________________________

Correct Answer

verifed

verified

Popular cryptosystems use a hybrid combination of symmetric and asymmetric algorithms.

Correct Answer

verifed

verified

____________________ or cryptosystem is an encryption method or process encompassing the algorithm,key(s)or cryptovariable(s),and procedures used to perform encryption and decryption.

Correct Answer

verifed

verified

The asymmetric encryption systems use a single key to both encrypt and decrypt a message.

Correct Answer

verifed

verified

The number of horizontal and vertical pixels captured and recorded is known as the image's depth._________________________

Correct Answer

verifed

verified

Hashing functions require the use of keys.

Correct Answer

verifed

verified

The most common hybrid system is based on the Diffie-Hellman key exchange,which is a method for exchanging private keys using public key encryption.

Correct Answer

verifed

verified

Bit stream methods commonly use algorithm functions like the exclusive OR operation (____) .


A) XOR
B) EOR
C) NOR
D) OR

Correct Answer

verifed

verified

PGP uses the freeware ZIP algorithm to compress the message after it has been digitally signed but before it is encrypted._________________________

Correct Answer

verifed

verified

Describe digital certificates.

Correct Answer

verifed

verified

Digital certificates are public-key cont...

View Answer

Digital signatures should be created using processes and products that are based on the ____.


A) DSS
B) NIST
C) SSL
D) HTTPS

Correct Answer

verifed

verified

One encryption method made popular by spy movies involves using the text in a book as the key to decrypt a message.

Correct Answer

verifed

verified

A(n)registration authority issues,manages,authenticates,signs,and revokes users' digital certificates,which typically contain the user name,public key,and other identifying information._________________________

Correct Answer

verifed

verified

____ are encrypted messages that can be mathematically proven to be authentic.


A) Digital signatures
B) MAC
C) Message certificates
D) Message digests

Correct Answer

verifed

verified

To perform the Caesar cipher encryption operation,the pad values are added to numeric values that represent the plaintext that needs to be encrypted.

Correct Answer

verifed

verified

Showing 21 - 40 of 108

Related Exams

Show Answer