Deck 16: Security

ملء الشاشة (f)
exit full mode
سؤال
In __________cryptography, the same key is used by the sender and the receiver.

A) symmetric-key
B) asymmetric-key
C) public-key
D) open-key
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
___________ means that the data must arrive at the receiver exactly as they were sent.

A) Nonrepudiation
B) Message integrity
C) Authentication
D) Secrecy
سؤال
_________ cryptography is often used for long messages.

A) Symmetric-key
B) Asymmetric-key
C) Public-key
D) Open-key
سؤال
In the asymmetric-key method used for confidentiality, which key(s) is (are) publicly known?

A) encryption key only
B) decryption key only
C) both encryption and decryption keys
D) neither encryption key nor decryption key
سؤال
In RSA, if user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key of _______.

A) user A
B) user B
C) the network
D) a third party.
سؤال
The RSA algorithm for confidentiality uses _______ cryptography.

A) asymmetric-key
B) symmetric-key
C) substitution
D) transposition
سؤال
__________means that the sender and the receiver expect confidentiality.

A) Nonrepudiation
B) Integrity
C) Authentication
D) encryption and decryption
سؤال
In _________ cryptography, the same key is used in both directions.

A) symmetric-key
B) asymmetric-key
C) public-key
D) open-key
سؤال
Which of the following attacks is threatening availability?

A) Replaying
B) Modification
C) Denial of service
D) Decoding
سؤال
In __________ cryptography, everyone has access to everyone's public key.

A) symmetric-key
B) asymmetric-key
C) secret-key
D) private-key
سؤال
In ___________, the identity of a party is verified once for the entire duration of system access.

A) entity authentication
B) message integrity
C) message authentication
D) message encryption
سؤال
Which of the following attacks is threatening integrity?

A) Masquerading
B) Traffic Analysis
C) Denial of service
D) Encoding
سؤال
_____________ means concealing the contents of a message by enciphering.

A) Steganography
B) Cryptography
C) Compressing
D) Authentication
سؤال
______________means concealing the message by covering it with something else.

A) Cryptography
B) Steganography
C) Compressing
D) Authentication
سؤال
___________ cryptography is often used for short messages.

A) Symmetric-key
B) Asymmetric-key
C) Secret-key
D) Open-key
سؤال
Three security goals are _____.

A) confidentiality, cryptography, and nonrepudiation
B) confidentiality, encryption, and decryption
C) confidentiality, integrity, and availability
D) confidentiality, denial of service, and masquerading
سؤال
______________ can provide authentication, integrity, and nonrepudiation for a message.

A) Encryption/decryption
B) Digital signature
C) Compression
D) Key-exchange
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/17
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 16: Security
1
In __________cryptography, the same key is used by the sender and the receiver.

A) symmetric-key
B) asymmetric-key
C) public-key
D) open-key
A
2
___________ means that the data must arrive at the receiver exactly as they were sent.

A) Nonrepudiation
B) Message integrity
C) Authentication
D) Secrecy
B
3
_________ cryptography is often used for long messages.

A) Symmetric-key
B) Asymmetric-key
C) Public-key
D) Open-key
A
4
In the asymmetric-key method used for confidentiality, which key(s) is (are) publicly known?

A) encryption key only
B) decryption key only
C) both encryption and decryption keys
D) neither encryption key nor decryption key
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
5
In RSA, if user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key of _______.

A) user A
B) user B
C) the network
D) a third party.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
6
The RSA algorithm for confidentiality uses _______ cryptography.

A) asymmetric-key
B) symmetric-key
C) substitution
D) transposition
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
7
__________means that the sender and the receiver expect confidentiality.

A) Nonrepudiation
B) Integrity
C) Authentication
D) encryption and decryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
8
In _________ cryptography, the same key is used in both directions.

A) symmetric-key
B) asymmetric-key
C) public-key
D) open-key
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which of the following attacks is threatening availability?

A) Replaying
B) Modification
C) Denial of service
D) Decoding
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
10
In __________ cryptography, everyone has access to everyone's public key.

A) symmetric-key
B) asymmetric-key
C) secret-key
D) private-key
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
11
In ___________, the identity of a party is verified once for the entire duration of system access.

A) entity authentication
B) message integrity
C) message authentication
D) message encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which of the following attacks is threatening integrity?

A) Masquerading
B) Traffic Analysis
C) Denial of service
D) Encoding
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
13
_____________ means concealing the contents of a message by enciphering.

A) Steganography
B) Cryptography
C) Compressing
D) Authentication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
14
______________means concealing the message by covering it with something else.

A) Cryptography
B) Steganography
C) Compressing
D) Authentication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
15
___________ cryptography is often used for short messages.

A) Symmetric-key
B) Asymmetric-key
C) Secret-key
D) Open-key
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
16
Three security goals are _____.

A) confidentiality, cryptography, and nonrepudiation
B) confidentiality, encryption, and decryption
C) confidentiality, integrity, and availability
D) confidentiality, denial of service, and masquerading
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
17
______________ can provide authentication, integrity, and nonrepudiation for a message.

A) Encryption/decryption
B) Digital signature
C) Compression
D) Key-exchange
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.