Filters
Question type

A cryptovariable is a value representing the application of a hash algorithm on a message.

A) True
B) False

Correct Answer

verifed

verified

Digital ____________________ are public-key container files that allow computer programs to validate the key and identify to whom it belongs.

Correct Answer

verifed

verified

Within a PKI, a(n) registration authority issues, manages, authenticates, signs, and revokes users' digital certificates, which typically contain the user name, public key, and other identifying information. _________________________

A) True
B) False

Correct Answer

verifed

verified

__________ is the current federal information processing standard that specifies a cryptographic algorithm used within the U.S. government to protect information in federal agencies that are not a part of the national defense infrastructure.


A) DES
B) 2DES
C) AES
D) 3DES

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Digital signatures should be created using processes and products that are based on the __________.


A) DSS
B) NIST
C) SSL
D) HTTPS

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

In a book cipher, the key consists of a list of codes representing the page number, line number, and word number of the plaintext word. _________________________

A) True
B) False

Correct Answer

verifed

verified

S-HTTP is an extended version of Hypertext Transfer Protocol that provides for the encryption of protected e-mail transmitted via the Internet between a client and server. _________________________

A) True
B) False

Correct Answer

verifed

verified

You cannot combine the XOR operation with a block cipher operation.

A) True
B) False

Correct Answer

verifed

verified

A message ____________________ is a fingerprint of the author's message that is compared with the recipient's locally calculated hash of the same message.

Correct Answer

verifed

verified

In 1917, Gilbert S. Vernam, an AT&T employee, invented a polyalphabetic cipher machine that used a non-repeating random key.

A) True
B) False

Correct Answer

verifed

verified

In the context of a PKI, a(n) ____________________ authority operates under the trusted collaboration of the certificate authority and can be delegated day-to-day certification functions, such as verifying registration information about new registrants, generating end-user keys, revoking certificates, and validating that users possess a valid certificate.

Correct Answer

verifed

verified

Internet Protocol Security is designed to protect data integrity, user confidentiality, and authenticity at the IP packet level. _________________________

A) True
B) False

Correct Answer

verifed

verified

The ____________________ cipher simply rearranges the values within a block to create the ciphertext.

Correct Answer

verifed

verified

transposit...

View Answer

To encipher means to decrypt, decode, or convert ciphertext into the equivalent plaintext. _________________________

A) True
B) False

Correct Answer

verifed

verified

Also known as the one-time pad, the ____________________ cipher, which was developed at AT&T, uses a set of characters only one time for each encryption process.

Correct Answer

verifed

verified

A digital ____________________ is an electronic document or container file that contains a key value and identifying information about the entity that controls the key.

Correct Answer

verifed

verified

In transport mode the entire IP packet is encrypted and is then placed as the content portion of another IP packet. _________________________

A) True
B) False

Correct Answer

verifed

verified

A __________ is a key-dependent, one-way hash function that allows only specific recipients (symmetric key holders) to access the message digest.


A) signature
B) MAC
C) fingerprint
D) digest

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

____________________ is the process of making and using codes to secure the transmission of information.

Correct Answer

verifed

verified

Encryption is the process of converting the ciphertext message back into plaintext so that it can be readily understood. _________________________

A) True
B) False

Correct Answer

verifed

verified

Showing 21 - 40 of 109

Related Exams

Show Answer