Deck 7: Encryption Controls
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/24
العب
ملء الشاشة (f)
Deck 7: Encryption Controls
1
Public Key cryptography refers to
A) The use of the same key for both encryption and decryption
B) The use of a secret algorithm for encryption and decryption
C) The use of a secret key only decryption
D) The use of a secret key for encryption
A) The use of the same key for both encryption and decryption
B) The use of a secret algorithm for encryption and decryption
C) The use of a secret key only decryption
D) The use of a secret key for encryption
C
2
Electronic Code Book ECB is not used for encryption since it has inadequate
A) Licensing flexibility
B) Recovery features
C) Diffusion of confusion
D) Parallelism
A) Licensing flexibility
B) Recovery features
C) Diffusion of confusion
D) Parallelism
Diffusion of confusion
3
Ciphertext is
A) The transformation of data to produce ciphertext
B) Text that is unintelligible to the reader
C) A sequence of symbols that controls the operations of encipherment and decipherment
D) A well-defined sequence of steps used to describe cryptographic processes
E) An encryption method that uses no keys
A) The transformation of data to produce ciphertext
B) Text that is unintelligible to the reader
C) A sequence of symbols that controls the operations of encipherment and decipherment
D) A well-defined sequence of steps used to describe cryptographic processes
E) An encryption method that uses no keys
B
4
Encryption is
A) The transformation of data to produce ciphertext
B) Text that is unintelligible to the reader
C) A sequence of symbols that controls the operations of encipherment and decipherment
D) A well-defined sequence of steps used to describe cryptographic processes
E) An encryption method that uses no keys
A) The transformation of data to produce ciphertext
B) Text that is unintelligible to the reader
C) A sequence of symbols that controls the operations of encipherment and decipherment
D) A well-defined sequence of steps used to describe cryptographic processes
E) An encryption method that uses no keys
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
5
The current standard for secret key encryption is
A) DES Data Encryption Standard
B) AES Advanced Encryption Standard
C) IDEA International Data Encryption Algorithm
D) SHA Secure Hash Algorithm
A) DES Data Encryption Standard
B) AES Advanced Encryption Standard
C) IDEA International Data Encryption Algorithm
D) SHA Secure Hash Algorithm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
6
Public key encryption techniques used in practice are based heavily on
A) Division operations
B) Set operations
C) Extraction operations
D) Modulus operations
A) Division operations
B) Set operations
C) Extraction operations
D) Modulus operations
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
7
Digital signatures are
A) The transformation of data to produce ciphertext
B) The use of cryptography that allows a user to prove the source and integrity of data
C) Text that is unintelligible to the reader
D) A sequence of symbols that controls the operations of encipherment and decipherment
A) The transformation of data to produce ciphertext
B) The use of cryptography that allows a user to prove the source and integrity of data
C) Text that is unintelligible to the reader
D) A sequence of symbols that controls the operations of encipherment and decipherment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
8
Block encryption uses both
A) Relational and Procedural operations
B) Substitution and permutation
C) Keys and hashes
D) Data and storage
A) Relational and Procedural operations
B) Substitution and permutation
C) Keys and hashes
D) Data and storage
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
9
The word Cipher is based on an Arabic word, cifr, that means
A) Sender
B) Secret
C) Nothing
D) Receiver
A) Sender
B) Secret
C) Nothing
D) Receiver
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
10
Cryptanalysis is
A) The art of breaking ciphertext
B) The transformation of data to produce ciphertext
C) The science of creating superior encryption algorithms
D) Text that is unintelligible to the reader
A) The art of breaking ciphertext
B) The transformation of data to produce ciphertext
C) The science of creating superior encryption algorithms
D) Text that is unintelligible to the reader
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
11
Hash functions are used primarily for
A) Sharing a secret key prior to network transmission
B) Storing data on hard drives
C) Encrypting data during transmission over a network
D) Saving passwords
A) Sharing a secret key prior to network transmission
B) Storing data on hard drives
C) Encrypting data during transmission over a network
D) Saving passwords
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
12
In the context of encryption, a key is
A) A well-defined sequence of steps used to describe cryptographic processes
B) An encryption method that uses no keys
C) A sequence of symbols that controls the operations of encipherment and decipherment
D) Text that is unintelligible to the reader
A) A well-defined sequence of steps used to describe cryptographic processes
B) An encryption method that uses no keys
C) A sequence of symbols that controls the operations of encipherment and decipherment
D) Text that is unintelligible to the reader
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
13
In using public key encryption, messages are deciphered using
A) A public key
B) A shared secret key
C) Any key
D) A private key
A) A public key
B) A shared secret key
C) Any key
D) A private key
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
14
Desirable properties In good encryption algorithms include
A) Generating characters that appear random
B) Generating output that appears to be of random length
C) Changing at least half the bits in the output when even one bit changes in the input
D) All the above
A) Generating characters that appear random
B) Generating output that appears to be of random length
C) Changing at least half the bits in the output when even one bit changes in the input
D) All the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
15
Claude Shannon developed the framework for secrecy known as
A) Confusion diffusion
B) 4P model
C) 4C model
D) Inversion of control
A) Confusion diffusion
B) 4P model
C) 4C model
D) Inversion of control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
16
The first documented instance of encryption was used by
A) Egyptian pharaoh Tutankhamun
B) Italian inventor Leonardo da Vinci
C) Italian artist Michelangelo
D) Roman Emperor Julius Caesar
A) Egyptian pharaoh Tutankhamun
B) Italian inventor Leonardo da Vinci
C) Italian artist Michelangelo
D) Roman Emperor Julius Caesar
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
17
Hash functions use
A) 2 keys
B) 1 key
C) 0 keys
D) Any of the above, depending upon the specific hash algorithm
A) 2 keys
B) 1 key
C) 0 keys
D) Any of the above, depending upon the specific hash algorithm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
18
A cryptographic algorithm is
A) Symbols that controls encipherment and decipherment
B) A well-defined sequence of steps used to describe cryptographic processes
C) An encryption method that uses no keys
D) Text that is unintelligible to the reader
A) Symbols that controls encipherment and decipherment
B) A well-defined sequence of steps used to describe cryptographic processes
C) An encryption method that uses no keys
D) Text that is unintelligible to the reader
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
19
Secret key cryptography refers to
A) The use of the same key for both encryption and decryption
B) The use of a secret algorithm for encryption and decryption
C) The use of a secret key only for decryption
D) The use of a secret key for encryption
A) The use of the same key for both encryption and decryption
B) The use of a secret algorithm for encryption and decryption
C) The use of a secret key only for decryption
D) The use of a secret key for encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
20
Public key encryption is used primarily for
A) Sharing a secret key prior to network transmission
B) Storing data on hard drives
C) Encrypting data during transmission over a network
D) Saving passwords
A) Sharing a secret key prior to network transmission
B) Storing data on hard drives
C) Encrypting data during transmission over a network
D) Saving passwords
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
21
The popular encryption method RSA is an example of
A) Secret key encryption
B) Public key encryption
C) Hash functions
D) AES
A) Secret key encryption
B) Public key encryption
C) Hash functions
D) AES
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
22
A certificate used in web applications contains the
A) Shared secret key prior to network transmission
B) The hash output of the data to be transmitted
C) Saved password of the end user for recovery
D) Public key of the server and information about the key provider
A) Shared secret key prior to network transmission
B) The hash output of the data to be transmitted
C) Saved password of the end user for recovery
D) Public key of the server and information about the key provider
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
23
For any given input, the length of its hash out is
A) Always shorter than the input
B) Depends upon the length of the input
C) Always the same
D) Always longer than the input
A) Always shorter than the input
B) Depends upon the length of the input
C) Always the same
D) Always longer than the input
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
24
The most common technologies used for secure network communication are
A) VPN and SSL
B) AES and DES
C) PKI and RSA
D) Diffusion and confusion
A) VPN and SSL
B) AES and DES
C) PKI and RSA
D) Diffusion and confusion
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck