10 May Question1._______________ is done by comparing the in
Question
1.
_______________ is done by comparing the input plaintext to the output ciphertext to try
to determine the key used to encrypt the information.
Correct Answer(s): Differential cryptanalysis
2.
The art of secret writing that enables an individual to hide the contents of a message from
all but the intended recipient is called
A) Key management
B) Steganography
C) Cryptanalysis
D) Cryptography
3.
PKI can be used as a measure to trust individuals we do not know.
A) True
B) False
4.
Keyspace refers to
A) All possible key values
B) The number of keys needed to encrypt or decrypt a message
C) The location where keys are stored
D) The portion of the algorithm that the key connects with to encrypt or decrypt a
message
5.
The benefit of SHA-1 over MD5 is that it is resistant to a collision attack.
A) True
B) False
6.
All of the following are asymmetric encryption algorithms EXCEPT:
A) ECC
B) RSA
C) 3DES
D) ElGamal
7.
The process for protecting intellectual property from unauthorized used is called
A) Digital signatures
B) Digital rights management
C) Key escrow
D) Anti-pirating management
8.
What is a certificate authority?
A) An entity that generates electronic credentials
B) An entity that requires proof of identity from the individual requesting a
certificate
C) A centralized directory in which the registered certificate is stored
D) An entity that generates a digitally signed identification certificate
9.
Hiding a text file in a jpg file is an example of steganography.
A) True
B) False
10.
The encryption method based on the idea of using a shared key for encryption and
decryption of data is
A) Symmetric encryption
B) Elliptical curve encryption
C) Hashing function
D) Asymmetric encryption
11.
The term used to describe a centralized directory that can be accessed by a subset of
individuals is _______________
Correct Answer(s): certificate repository
12.
The cipher that replaces each letter of the alphabet with a different letter (not in
sequence) is a
A) Substitution cipher
B) Vigenère cipher
C) Shift cipher
D) Transposition cipher
13.
All of the following are cryptographic applications EXCEPT:
A) FreeOTFE
B) PGP
C) StegDetect
D) GnuPG
14.
How is an outsourced CA different from a public CA?
A) It provides dedicated services, and possibly equipment, to an individual
company.
B) The CA is implemented, maintained, and controlled by the company that
implemented it.
C) The CA is already established and being used by many individuals and
companies.
D) The CA provides more flexibility for companies.
15.
The difference between centralized and decentralized infrastructures is
A) In a decentralized infrastructure, the certificate may have an extended lifetime.
B) The network administrator sets up the distribution points in centralized
infrastructures.
C) The location where the cryptographic key is generated and stored is different.
D) The key pairs and ce
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.
About Writedemy
We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.
How It Works
To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Are there Discounts?
All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.
