Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Principles of Information Security
Quiz 8: Cryptography
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 41
Multiple Choice
__________ is the amount of effort (usually in hours) required to perform cryptanalysis to decode an encrypted message when the key or algorithm (or both) are unknown.
Question 42
True/False
The number of horizontal and vertical pixels captured and recorded is known as the image's
contrast
. _________________________
Question 43
True/False
Pretty Good Privacy (PGP)
uses the freeware ZIP algorithm to compress the message after it has been digitally signed but before it is encrypted. _________________________
Question 44
True/False
The
application header (AH)
protocol provides secrecy for the contents of network communications as well as system-to-system authentication and data integrity verification. _________________________
Question 45
True/False
UltraViolet wireless (UVW)
is a de facto industry standard for short-range wireless communications between devices. _________________________
Question 46
True/False
The most popular modern version of
steganography
involves hiding information within files that contain digital pictures or other images. _________________________
Question 47
True/False
Within a PKI, a(n)
registration
authority issues, manages, authenticates, signs, and revokes users' digital certificates, which typically contain the user name, public key, and other identifying information. _________________________