Filters
Question type

Study Flashcards

As DES became known as being too weak for highly classified communications,Double DES was created to provide a level of security far beyond that of DES._________________________

A) True
B) False

Correct Answer

verifed

verified

A method of encryption that requires the same secret key to encipher and decipher the message is known as ____ encryption.


A) asymmetric
B) symmetric
C) public
D) private

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

When an asymmetric cryptographic process uses the sender's private key to encrypt a message,the sender's public key must be used to decrypt the message.

A) True
B) False

Correct Answer

verifed

verified

To ____________________ means to encrypt,encode,or convert plaintext into the equivalent ciphertext.

Correct Answer

verifed

verified

The ____________________ cipher simply rearranges the values within a block to create the ciphertext.

Correct Answer

verifed

verified

transposit...

View Answer

Sequence encryption is a series of encryptions and decryptions between a number of systems,wherein each system in a network decrypts the message sent to it and then reencrypts it using different keys and sends it to the next neighbor,and this process continues until the message reaches the final destination.

A) True
B) False

Correct Answer

verifed

verified

Digital ____________________ are encrypted messages that can be mathematically proven to be authentic.

Correct Answer

verifed

verified

A ____ is a key-dependent,one-way hash function that allows only specific recipients (symmetric key holders) to access the message digest.


A) signature
B) MAC
C) fingerprint
D) digest

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Julius Caesar was associated with an early version of the transposition cipher.

A) True
B) False

Correct Answer

verifed

verified

____ is the protocol used to secure communications across any IP-based network such as LANs,WANs,and the Internet.


A) PEM
B) SSH
C) IPSec
D) SET

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

The ____ algorithm was the first public key encryption algorithm developed (in 1977) and published for commercial use.


A) DES
B) RSA
C) MAC
D) AES

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

The 3DES implements a block cipher with a variable block length and a key length of 128,192,or 256 bits.

A) True
B) False

Correct Answer

verifed

verified

The permutation cipher simply rearranges the values within a block to create the ciphertext.

A) True
B) False

Correct Answer

verifed

verified

To use a(n)____________________ cipher,you substitute one value for another.

Correct Answer

verifed

verified

The application header protocol provides secrecy for the content of a network communication.

A) True
B) False

Correct Answer

verifed

verified

Internet Protocol Security is designed to protect data integrity,user confidentiality,and authenticity at the IP packet level._________________________

A) True
B) False

Correct Answer

verifed

verified

Standard-HTTP (S-HTTP)is an extended version of the Hypertext Transfer Protocol that provides for the encryption of individual messages transmitted via the Internet between a client and server.

A) True
B) False

Correct Answer

verifed

verified

In transport mode the entire IP packet is encrypted and is then placed as the content portion of another IP packet._________________________

A) True
B) False

Correct Answer

verifed

verified

The encapsulating security payload protocol provides secrecy for the contents of network communications as well as system-to-system authentication and data integrity verification.

A) True
B) False

Correct Answer

verifed

verified

You cannot combine the XOR operation with a block cipher operation.

A) True
B) False

Correct Answer

verifed

verified

Showing 81 - 100 of 108

Related Exams

Show Answer