Filters
Question type

Study Flashcards

In __________cryptography, the same key is used by the sender and the receiver.


A) symmetric-key
B) asymmetric-key
C) public-key
D) open-key

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Three security goals are _____.


A) confidentiality, cryptography, and nonrepudiation
B) confidentiality, encryption, and decryption
C) confidentiality, integrity, and availability
D) confidentiality, denial of service, and masquerading

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

C

In _________ cryptography, the same key is used in both directions.


A) symmetric-key
B) asymmetric-key
C) public-key
D) open-key

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

A

In __________ cryptography, everyone has access to everyone's public key.


A) symmetric-key
B) asymmetric-key
C) secret-key
D) private-key

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

B

__________means that the sender and the receiver expect confidentiality.


A) Nonrepudiation
B) Integrity
C) Authentication
D) encryption and decryption

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

Which of the following attacks is threatening availability?


A) Replaying
B) Modification
C) Denial of service
D) Decoding

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

_________ cryptography is often used for long messages.


A) Symmetric-key
B) Asymmetric-key
C) Public-key
D) Open-key

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

In the asymmetric-key method used for confidentiality, which key(s) is (are) publicly known?


A) encryption key only
B) decryption key only
C) both encryption and decryption keys
D) neither encryption key nor decryption key

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

In ___________, the identity of a party is verified once for the entire duration of system access.


A) entity authentication
B) message integrity
C) message authentication
D) message encryption

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

______________ can provide authentication, integrity, and nonrepudiation for a message.


A) Encryption/decryption
B) Digital signature
C) Compression
D) Key-exchange

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

_____________ means concealing the contents of a message by enciphering.


A) Steganography
B) Cryptography
C) Compressing
D) Authentication

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

___________ cryptography is often used for short messages.


A) Symmetric-key
B) Asymmetric-key
C) Secret-key
D) Open-key

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

______________means concealing the message by covering it with something else.


A) Cryptography
B) Steganography
C) Compressing
D) Authentication

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

In RSA, if user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key of _______.


A) user A
B) user B
C) the network
D) a third party.

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

The RSA algorithm for confidentiality uses _______ cryptography.


A) asymmetric-key
B) symmetric-key
C) substitution
D) transposition

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

___________ means that the data must arrive at the receiver exactly as they were sent.


A) Nonrepudiation
B) Message integrity
C) Authentication
D) Secrecy

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

Which of the following attacks is threatening integrity?


A) Masquerading
B) Traffic Analysis
C) Denial of service
D) Encoding

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

Showing 1 - 17 of 17

Related Exams

Show Answer