Filters
Question type

Study Flashcards

A mathematical ____________________ is a "secret mechanism that enables you to easily accomplish the reverse function in a one-way function."

Correct Answer

verifed

verified

____ attacks are a collection of brute-force methods that attempt to deduce statistical relationships between the structure of the unknown key and the ciphertext that is the output of the cryptosystem.


A) Timing
B) Dictionary
C) Correlation
D) Man-in-the-middle

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Privacy Enhanced Mail was proposed by the Internet Engineering Task Force and is a standard that uses 3DES symmetric key encryption and RSA for key exchanges and digital signatures._________________________

A) True
B) False

Correct Answer

verifed

verified

A(n)distinguished name uniquely identifies a certificate entity,to a user's public key._________________________

A) True
B) False

Correct Answer

verifed

verified

____ is the entire range of values that can possibly be used to construct an individual key.


A) Code
B) Keyspace
C) Algorithm
D) Cryptogram

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

In IPSEC ____________________ mode,only the IP data is encrypted,not the IP headers.

Correct Answer

verifed

verified

The AES algorithm was the first public key encryption algorithm.

A) True
B) False

Correct Answer

verifed

verified

Once the attacker has successfully broken an encryption,he or she may launch a replay attack,which is an attempt to resubmit a recording of the deciphered authentication to gain entry into a secure source.

A) True
B) False

Correct Answer

verifed

verified

SSL builds on the encoding format of the Multipurpose Internet Mail Extensions protocol and uses digital signatures based on public key cryptosystems to secure e-mail.

A) True
B) False

Correct Answer

verifed

verified

Secure Multipurpose Internet Mail Extensions builds on the encoding format of the Multipurpose Internet Mail Extensions protocol and uses digital signatures based on public key cryptosystems to secure e-mail._________________________

A) True
B) False

Correct Answer

verifed

verified

A(n)man-in-the-middle attack attempts to intercept a public key or even to insert a known key structure in place of the requested public key._________________________

A) True
B) False

Correct Answer

verifed

verified

The more common name for asymmetric encryption is ____________________-key encryption.

Correct Answer

verifed

verified

In a(n)word attack,the attacker encrypts every word in a dictionary using the same cryptosystem as used by the target._________________________

A) True
B) False

Correct Answer

verifed

verified

The ____ is responsible for the fragmentation,compression,encryption,and attachment of an SSL header to the cleartext prior to transmission.


A) Standard HTTP
B) SFTP
C) S-HTTP
D) SSL Record Protocol

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

In a ____ attack,the attacker eavesdrops during the victim's session and uses statistical analysis of patterns and inter-keystroke timings to discern sensitive session information.


A) replay
B) timing
C) correlation
D) dictionary

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

More advanced substitution ciphers use two or more alphabets,and are referred to as ____ substitutions.


A) multialphabetic
B) monoalphabetic
C) polyalphabetic
D) polynomic

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

In a(n)____________________ attack,the attacker eavesdrops on the victim's session and uses statistical analysis of patterns and inter-keystroke timings to discern sensitive session information.

Correct Answer

verifed

verified

Symmetric encryption uses two different but related keys,and either key can be used to encrypt or decrypt the message._________________________

A) True
B) False

Correct Answer

verifed

verified

Netscape developed the ____________________ Layer protocol to use public key encryption to secure a channel over the Internet,thus enabling secure communications.

Correct Answer

verifed

verified

Secure Soc...

View Answer

____________________ is the process of making and using codes to secure the transmission of information.

Correct Answer

verifed

verified

Showing 41 - 60 of 108

Related Exams

Show Answer