Deck 3: Cryptography and Security: Part B

Full screen (f)
exit full mode
Question
An attack in which the user receives unwanted amount of e- mails.

A)smurfing
B)denial of service
C)e-mail bombing
D)ping storm
Use Space or
up arrow
down arrow
to flip the card.
Question
In same keys are implemented for encrypting as well as decrypting the information.

A)symmetric key encryption
B)asymmetric key encryption
C)asymmetric key decryption
D)hash-based key encryption
Question
The procedure to add bits to the last block is termed as

A)decryption
B)hashing
C)tuning
D)padding
Question
In asymmetric key cryptography, the private key is kept by

A)sender
B)receiver
C)sender and receiver
D)all the connected devices to the network
Question
Cryptanalysis is used __________________________________________

A)to find some insecurity in a cryptographic scheme
B)to increase the speed
C)to encrypt the data
D)to make new ciphers
Question
Conventional cryptography is also known as or symmetric-key encryption.

A)secret-key
B)public key
C)protected key
D)primary key
Question
________________________________________________________is the art & science of cracking the cipher-text without knowing the key.

A)cracking
B)cryptanalysis
C)cryptography
D)crypto-hacking
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/7
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 3: Cryptography and Security: Part B
1
An attack in which the user receives unwanted amount of e- mails.

A)smurfing
B)denial of service
C)e-mail bombing
D)ping storm
e-mail bombing
2
In same keys are implemented for encrypting as well as decrypting the information.

A)symmetric key encryption
B)asymmetric key encryption
C)asymmetric key decryption
D)hash-based key encryption
symmetric key encryption
3
The procedure to add bits to the last block is termed as

A)decryption
B)hashing
C)tuning
D)padding
padding
4
In asymmetric key cryptography, the private key is kept by

A)sender
B)receiver
C)sender and receiver
D)all the connected devices to the network
Unlock Deck
Unlock for access to all 7 flashcards in this deck.
Unlock Deck
k this deck
5
Cryptanalysis is used __________________________________________

A)to find some insecurity in a cryptographic scheme
B)to increase the speed
C)to encrypt the data
D)to make new ciphers
Unlock Deck
Unlock for access to all 7 flashcards in this deck.
Unlock Deck
k this deck
6
Conventional cryptography is also known as or symmetric-key encryption.

A)secret-key
B)public key
C)protected key
D)primary key
Unlock Deck
Unlock for access to all 7 flashcards in this deck.
Unlock Deck
k this deck
7
________________________________________________________is the art & science of cracking the cipher-text without knowing the key.

A)cracking
B)cryptanalysis
C)cryptography
D)crypto-hacking
Unlock Deck
Unlock for access to all 7 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 7 flashcards in this deck.