Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Invitation to Computer Science Study Set 2
Quiz 8: Information Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Question 1
True/False
A(n)asymmetric encryption algorithm requires the use of a secret key known to both the sender and receiver. _________________________
Question 2
True/False
When a user attempts to log on to the machine, a hash function reads the user ID and checks that the password matches the password for that user in the password file.
Question 3
Short Answer
The term ____________________ comes about because perpetrators cast out bait, in the form of email messages, to thousands of potential victims in the hope that one or two will "bite" and fall for the scam.
Question 4
True/False
The success of RSA encryption depends on the fact that it is extremely difficult to find the prime factors for n if n is a large number.
Question 5
True/False
A block cipher encodes one character at a time.
Question 6
True/False
To reduce the chance that two passwords will have the same hash value, a timestamp can be appended to a password, and the result is then run through the encryption algorithm and stored as the encrypted password in the password file.