Computer Science > QUESTIONS & ANSWERS > Information Security Fundamentals CIST 1401: Chapters 9-15 (All)
Information Security Fundamentals CIST 1401: Chapters 9-15 What mathematical problem forms the basis of most modern cryptographic algorithms? a) Factoring large primes b) Traveling salesman proble ... m c) Quantum mechanics d) Birthday problem - ANS - a) Factoring large primes In a chosen-ciphertext attack, cryptanalysts submit data coded with the same cipher and key they are trying to break to the decryption device to see either the plaintext output or the effect the decrypted message has on some system. a) True b) False - ANS - a) True Integrity-checking tools use cryptographic methods to make sure nothing and no one has modified the software. a) True b) False - ANS - a) True A person demonstrates anonymity when posting information to a web discussion site without authorities knowing who he or she is. a) True b) False - ANS - a) True Bob received a message from Alice that contains a digital signature. What cryptographic key does Bob use to verify the digital signature? a) Alice's public key b) Alice's private key c) Bob's public key d) Bob's private key - ANS - a) Alice's public key Which approach to cryptography provides the strongest theoretical protection? a) Quantum cryptography b) Asymmetric cryptography c) Elliptic curve cryptography d) Classic cryptography - ANS - a) Quantum cryptography You must always use the same algorithm to encrypt information and decrypt the same information. a) True b) False - ANS - b) False The hash message authentication code (HMAC) is a hash function that uses a key to create a hash, or message digest. a) True b) False - ANS - A digitized signature is a combination of a strong hash of a message and a secret key. a) True b) False - ANS - b) False A substitution cipher replaces bits, characters, or blocks of information with other bits, characters, or blocks. a) True b) False - ANS - a) True Alice would like to send a message to Bob securely and wishes to encrypt the contents of the message. What key does she use to encrypt this message? a) Alice's public key b) Alice's private key c) Bob's public key d) Bob's private key - ANS - c) Bob's public key An algorithm is a repeatable process that produces the same result when it receives the same input a) True b) False - ANS - a) True Which of the following allows a certificate authority (CA) to revoke a compromised digital certificate in real time? a) Certificate revocation list (CRL) b) International Data Encryption A [Show More]
Last updated: 3 years ago
Preview 1 out of 30 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Sep 27, 2022
Number of pages
30
Written in
All
This document has been written for:
Uploaded
Sep 27, 2022
Downloads
0
Views
91
Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·