Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Principles of Information Security
Quiz 8: Cryptography
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 61
Multiple Choice
DES uses a(n) ___________-bit block size.
Question 62
Multiple Choice
More advanced substitution ciphers use two or more alphabets, and are referred to as __________ substitutions.
Question 63
Multiple Choice
In PKI, the CA periodically distributes a(n) _________ to all users that identifies all revoked certificates.
Question 64
Multiple Choice
A method of encryption that requires the same secret key to encipher and decipher the message is known as __________ encryption.
Question 65
Multiple Choice
The __________ is responsible for the fragmentation, compression, encryption, and attachment of an SSL header to the cleartext prior to transmission.
Question 66
Multiple Choice
__________ functions are mathematical algorithms that generate a message summary or digest to confirm the identity of a specific message and to confirm that there have not been any changes to the content.
Question 67
Multiple Choice
__________ was developed by Phil Zimmermann and uses the IDEA cipher for message encoding.
Question 68
Multiple Choice
__________ is the current federal information processing standard that specifies a cryptographic algorithm used within the U.S. government to protect information in federal agencies that are not a part of the national defense infrastructure.