Deck 3: Cryptography and Security: Part B
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/7
العب
ملء الشاشة (f)
Deck 3: Cryptography and Security: Part B
1
An attack in which the user receives unwanted amount of e- mails.
A)smurfing
B)denial of service
C)e-mail bombing
D)ping storm
A)smurfing
B)denial of service
C)e-mail bombing
D)ping storm
e-mail bombing
2
In same keys are implemented for encrypting as well as decrypting the information.
A)symmetric key encryption
B)asymmetric key encryption
C)asymmetric key decryption
D)hash-based key encryption
A)symmetric key encryption
B)asymmetric key encryption
C)asymmetric key decryption
D)hash-based key encryption
symmetric key encryption
3
The procedure to add bits to the last block is termed as
A)decryption
B)hashing
C)tuning
D)padding
A)decryption
B)hashing
C)tuning
D)padding
padding
4
In asymmetric key cryptography, the private key is kept by
A)sender
B)receiver
C)sender and receiver
D)all the connected devices to the network
A)sender
B)receiver
C)sender and receiver
D)all the connected devices to the network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 7 في هذه المجموعة.
فتح الحزمة
k this deck
5
Cryptanalysis is used __________________________________________
A)to find some insecurity in a cryptographic scheme
B)to increase the speed
C)to encrypt the data
D)to make new ciphers
A)to find some insecurity in a cryptographic scheme
B)to increase the speed
C)to encrypt the data
D)to make new ciphers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 7 في هذه المجموعة.
فتح الحزمة
k this deck
6
Conventional cryptography is also known as or symmetric-key encryption.
A)secret-key
B)public key
C)protected key
D)primary key
A)secret-key
B)public key
C)protected key
D)primary key
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 7 في هذه المجموعة.
فتح الحزمة
k this deck
7
________________________________________________________is the art & science of cracking the cipher-text without knowing the key.
A)cracking
B)cryptanalysis
C)cryptography
D)crypto-hacking
A)cracking
B)cryptanalysis
C)cryptography
D)crypto-hacking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 7 في هذه المجموعة.
فتح الحزمة
k this deck