Deck 3: Cryptography and Security: Part B

ملء الشاشة (f)
exit full mode
سؤال
An attack in which the user receives unwanted amount of e- mails.

A)smurfing
B)denial of service
C)e-mail bombing
D)ping storm
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
In same keys are implemented for encrypting as well as decrypting the information.

A)symmetric key encryption
B)asymmetric key encryption
C)asymmetric key decryption
D)hash-based key encryption
سؤال
The procedure to add bits to the last block is termed as

A)decryption
B)hashing
C)tuning
D)padding
سؤال
In asymmetric key cryptography, the private key is kept by

A)sender
B)receiver
C)sender and receiver
D)all the connected devices to the network
سؤال
Cryptanalysis is used __________________________________________

A)to find some insecurity in a cryptographic scheme
B)to increase the speed
C)to encrypt the data
D)to make new ciphers
سؤال
Conventional cryptography is also known as or symmetric-key encryption.

A)secret-key
B)public key
C)protected key
D)primary key
سؤال
________________________________________________________is the art & science of cracking the cipher-text without knowing the key.

A)cracking
B)cryptanalysis
C)cryptography
D)crypto-hacking
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/7
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 3: Cryptography and Security: Part B
1
An attack in which the user receives unwanted amount of e- mails.

A)smurfing
B)denial of service
C)e-mail bombing
D)ping storm
e-mail bombing
2
In same keys are implemented for encrypting as well as decrypting the information.

A)symmetric key encryption
B)asymmetric key encryption
C)asymmetric key decryption
D)hash-based key encryption
symmetric key encryption
3
The procedure to add bits to the last block is termed as

A)decryption
B)hashing
C)tuning
D)padding
padding
4
In asymmetric key cryptography, the private key is kept by

A)sender
B)receiver
C)sender and receiver
D)all the connected devices to the network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 7 في هذه المجموعة.
فتح الحزمة
k this deck
5
Cryptanalysis is used __________________________________________

A)to find some insecurity in a cryptographic scheme
B)to increase the speed
C)to encrypt the data
D)to make new ciphers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 7 في هذه المجموعة.
فتح الحزمة
k this deck
6
Conventional cryptography is also known as or symmetric-key encryption.

A)secret-key
B)public key
C)protected key
D)primary key
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 7 في هذه المجموعة.
فتح الحزمة
k this deck
7
________________________________________________________is the art & science of cracking the cipher-text without knowing the key.

A)cracking
B)cryptanalysis
C)cryptography
D)crypto-hacking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 7 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 7 في هذه المجموعة.