Computer Science  >  QUESTIONS & ANSWERS  >  Information Security Fundamentals CIST 1401: Chapters 9-15 (All)

Information Security Fundamentals CIST 1401: Chapters 9-15

Document Content and Description Below

Information Security Fundamentals CIST 1401: Chapters 9-15 What mathematical problem forms the basis of most modern cryptographic algorithms? a) Factoring large primes b) Traveling salesman proble ... m c) Quantum mechanics d) Birthday problem - ANS - a) Factoring large primes In a chosen-ciphertext attack, cryptanalysts submit data coded with the same cipher and key they are trying to break to the decryption device to see either the plaintext output or the effect the decrypted message has on some system. a) True b) False - ANS - a) True Integrity-checking tools use cryptographic methods to make sure nothing and no one has modified the software. a) True b) False - ANS - a) True A person demonstrates anonymity when posting information to a web discussion site without authorities knowing who he or she is. a) True b) False - ANS - a) True Bob received a message from Alice that contains a digital signature. What cryptographic key does Bob use to verify the digital signature? a) Alice's public key b) Alice's private key c) Bob's public key d) Bob's private key - ANS - a) Alice's public key Which approach to cryptography provides the strongest theoretical protection? a) Quantum cryptography b) Asymmetric cryptography c) Elliptic curve cryptography d) Classic cryptography - ANS - a) Quantum cryptography You must always use the same algorithm to encrypt information and decrypt the same information. a) True b) False - ANS - b) False The hash message authentication code (HMAC) is a hash function that uses a key to create a hash, or message digest. a) True b) False - ANS - A digitized signature is a combination of a strong hash of a message and a secret key. a) True b) False - ANS - b) False A substitution cipher replaces bits, characters, or blocks of information with other bits, characters, or blocks. a) True b) False - ANS - a) True Alice would like to send a message to Bob securely and wishes to encrypt the contents of the message. What key does she use to encrypt this message? a) Alice's public key b) Alice's private key c) Bob's public key d) Bob's private key - ANS - c) Bob's public key An algorithm is a repeatable process that produces the same result when it receives the same input a) True b) False - ANS - a) True Which of the following allows a certificate authority (CA) to revoke a compromised digital certificate in real time? a) Certificate revocation list (CRL) b) International Data Encryption A [Show More]

Last updated: 3 years ago

Preview 1 out of 30 pages

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)
Preview image of Information Security Fundamentals CIST 1401: Chapters 9-15 document

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Reviews( 0 )

$10.00

Buy Now

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Instant download

Can't find what you want? Try our AI powered Search

91
0

Document information


Connected school, study & course


About the document


Uploaded On

Sep 27, 2022

Number of pages

30

Written in

All

Seller


Profile illustration for Nutmegs
Nutmegs

Member since 4 years

607 Documents Sold

Reviews Received
77
14
8
2
21
Additional information

This document has been written for:

Uploaded

Sep 27, 2022

Downloads

 0

Views

 91

Document Keyword Tags


$10.00
What is Scholarfriends

Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·