A) symmetric-key
B) asymmetric-key
C) public-key
D) open-key
Correct Answer
verified
Multiple Choice
A) confidentiality, cryptography, and nonrepudiation
B) confidentiality, encryption, and decryption
C) confidentiality, integrity, and availability
D) confidentiality, denial of service, and masquerading
Correct Answer
verified
Multiple Choice
A) symmetric-key
B) asymmetric-key
C) public-key
D) open-key
Correct Answer
verified
Multiple Choice
A) symmetric-key
B) asymmetric-key
C) secret-key
D) private-key
Correct Answer
verified
Multiple Choice
A) Nonrepudiation
B) Integrity
C) Authentication
D) encryption and decryption
Correct Answer
verified
Multiple Choice
A) Replaying
B) Modification
C) Denial of service
D) Decoding
Correct Answer
verified
Multiple Choice
A) Symmetric-key
B) Asymmetric-key
C) Public-key
D) Open-key
Correct Answer
verified
Multiple Choice
A) encryption key only
B) decryption key only
C) both encryption and decryption keys
D) neither encryption key nor decryption key
Correct Answer
verified
Multiple Choice
A) entity authentication
B) message integrity
C) message authentication
D) message encryption
Correct Answer
verified
Multiple Choice
A) Encryption/decryption
B) Digital signature
C) Compression
D) Key-exchange
Correct Answer
verified
Multiple Choice
A) Steganography
B) Cryptography
C) Compressing
D) Authentication
Correct Answer
verified
Multiple Choice
A) Symmetric-key
B) Asymmetric-key
C) Secret-key
D) Open-key
Correct Answer
verified
Multiple Choice
A) Cryptography
B) Steganography
C) Compressing
D) Authentication
Correct Answer
verified
Multiple Choice
A) user A
B) user B
C) the network
D) a third party.
Correct Answer
verified
Multiple Choice
A) asymmetric-key
B) symmetric-key
C) substitution
D) transposition
Correct Answer
verified
Multiple Choice
A) Nonrepudiation
B) Message integrity
C) Authentication
D) Secrecy
Correct Answer
verified
Multiple Choice
A) Masquerading
B) Traffic Analysis
C) Denial of service
D) Encoding
Correct Answer
verified
Showing 1 - 17 of 17
Related Exams