Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Principles of Information Security Study Set 1
Quiz 8: Cryptography
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 41
True/False
The number of horizontal and vertical pixels captured and recorded is known as the image's depth._________________________
Question 42
True/False
In transport mode the entire IP packet is encrypted and is then placed as the content portion of another IP packet._________________________
Question 43
Multiple Choice
Bit stream methods commonly use algorithm functions like the exclusive OR operation (____) .
Question 44
Multiple Choice
____ is the amount of effort (usually in hours) required to perform cryptanalysis to decode an encrypted message when the key or algorithm (or both) are unknown.
Question 45
True/False
A(n)distinguished name uniquely identifies a certificate entity,to a user's public key._________________________
Question 46
Multiple Choice
____ is the process of converting an original message into a form that is unreadable to unauthorized individuals.
Question 47
True/False
PGP uses the freeware ZIP algorithm to compress the message after it has been digitally signed but before it is encrypted._________________________
Question 48
True/False
ESP in transport mode can be used to establish a virtual private network,assuring encryption and authentication between networks communicating via the Internet._________________________
Question 49
True/False
The most popular modern version of steganography involves hiding information within files that contain digital pictures or other images._________________________
Question 50
True/False
Privacy Enhanced Mail was proposed by the Internet Engineering Task Force and is a standard that uses 3DES symmetric key encryption and RSA for key exchanges and digital signatures._________________________
Question 51
True/False
Internet Protocol Security is designed to protect data integrity,user confidentiality,and authenticity at the IP packet level._________________________
Question 52
True/False
Secure HTTP provides the Internet communication services between client and host without consideration for encryption of the data that is transmitted between client and server._________________________
Question 53
True/False
A(n)response attack is an attempt to resubmit a recording of the deciphered authentication to gain entry into a secure source._________________________
Question 54
True/False
An attacker may obtain duplicate texts,one in ciphertext and one in plaintext,and thus reverse-engineer the encryption algorithm in a known-plaintext attack scheme._________________________
Question 55
True/False
Secure Multipurpose Internet Mail Extensions builds on the encoding format of the Multipurpose Internet Mail Extensions protocol and uses digital signatures based on public key cryptosystems to secure e-mail._________________________