It 255

In: Computers and Technology

Submitted By superrock2k
Words 309
Pages 2
Rock Laguerre
Instructor: Nicole Taylor

1. _____________ offers a mechanism to accomplish four security goals: confidentiality, integrity, authentication, and non-repudiation.
A. Security association (SA)
B. Secure socket layer (SSL)
* C. Cryptography
D. None of the above

2. A strong hash function is designed so that a message cannot be forged that will result in the same hash as a legitimate message.
* True
B. False

3. The act of scrambling plaintext into ciphertext is known as __________
A. Decryption
* B. Encryption
C. Plaintext
D. Cleartext

4. An algorithm used for cryptographic purposes is known as a ______________
A. Hash
B. Private key
C. Public key
* D. Cypher

5. Encryption ciphers fall into two general categories: symmetric (private) key and asymmetric (public) key
* True
B. False

6. An encryption cipher that uses the same key to encrypt and decrypt is called a ____________ key
* Symmetric (private)
B. Asymmetric (public)
C. Key encrypting
D. None of the above

7. ______________ corroborates the identity of an entity, whether the sender, the sender’s computer, some device, or some information.
A. Non-repudiation
B. Confidentiality
C. Integrity
* D. Authentication

8. Which of the following is one of the four basic forms of a cryptographic attack?
A. Ciphertest-only attack
B. Known-plaintext attack
C. Chosen-plaintext attack
D. Chosen-ciphertext attack
* E. All the above

9. The two basic types of ciphers are transpositions and substitution
* True
B. False

10. A _____________ is used to detect forgeries.
A. Hash function
B. Checksum
* C. Hash value

11. DES, IDEA, RC4, and WEP are examples of ____________
A. Key revocation
B. 802.11b wireless security
C. Asymmetric key algorithms (or standards)