Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Principles of Information Security
Quiz 8: Cryptography
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
True/False
To
encipher
means to decrypt, decode, or convert ciphertext into the equivalent plaintext. _________________________
Question 22
True/False
Nonrepudiation means that customers or partners can be held accountable for transactions, such as online purchases, which they cannot later deny.
Question 23
True/False
Ciphertext or a
cryptogram
is an encoded message, or a message that has been successfully encrypted. _________________________
Question 24
True/False
As DES became known as being too weak for highly classified communications,
Double
DES was created to provide a level of security far beyond that of DES. _________________________
Question 25
True/False
In a book cipher, the
key
consists of a list of codes representing the page number, line number, and word number of the plaintext word. _________________________
Question 26
True/False
AES implements a block cipher called the
Rijndael
Block Cipher. _________________________
Question 27
True/False
Hash algorithms are public functions that create a
message digest
by converting variable-length messages into a single fixed-length value. _________________________
Question 28
True/False
Secure Electronic Transactions was developed by MasterCard and Visa in 1997 to protect against electronic payment fraud.
Question 29
True/False
Bluetooth is a de facto industry standard for short-range wireless communications between devices.
Question 30
True/False
Steganography is a data hiding method that involves embedding information within other files, such as digital pictures or other images.
Question 31
True/False
SSL builds on the encoding format of the Multipurpose Internet Mail Extensions protocol and uses digital signatures based on public-key cryptosystems to secure e-mail.
Question 32
True/False
Internet Protocol Security (IPSec) is an open-source protocol framework for security development within the TCP/IP family of protocols.
Question 33
True/False
The most common hybrid system is based on the Diffie-Hellman key exchange, which is a method for exchanging private keys using public-key encryption.
Question 34
True/False
The encapsulating security payload protocol provides secrecy for the contents of network communications as well as system-to-system authentication and data integrity verification.
Question 35
True/False
Encryption
is the process of converting the ciphertext message back into plaintext so that it can be readily understood. _________________________
Question 36
True/False
A
multipart
authentication code (MAC) is a key-dependent, one-way hash function that allows only specific recipients (symmetric key holders) to access the message digest. _________________________
Question 37
True/False
The S-HTTP security solution provides six services: authentication by digital signatures, message encryption, compression, e-mail compatibility, segmentation, and key management.
Question 38
True/False
A(n)
key
is the set of steps used to convert an unencrypted message into an encrypted sequence of bits that represent the message; it sometimes refers to the programs that enable the cryptographic processes. _________________________