Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / University of the Cumberlands MSIT ISOL631 Question 1)The following are example of technologies that depend on PKI

University of the Cumberlands MSIT ISOL631 Question 1)The following are example of technologies that depend on PKI

Business

University of the Cumberlands

MSIT ISOL631

Question 1)The following are example of technologies that depend on PKI. Except

 

A combination lock on the main gate to a classified facility

 

Financial applications, such as those for logging in to your bank account online to manage your account details or to pay a bill

 

E-commerce applications, such as those used by Amazon.com

 

Webmail systems, which use protected communications to safeguard your credentials, including username and password, as well as your e-mail messages

 

Question 2

A                           is a particular flavor or type of symmetric algorithm that changes plaintext to ciphertext by operating on fixed-length blocks of plaintext.

 

Key cipher

 

Block cipher

 

Cipher text

 

None of the above

 

 

Question 3

If a certificate is no longer needed or trusted, it can be revoked before it expires. Describe which of the following?

 

None of the above Generation of certificates Validation of certificates Revocation of certificates

 

Question 4

 

PKI provides                                           over an insecure medium Storage

Penetration test and virus testing medium

 

safe and secure communication

 

None of the above

 

 

Question 5

Which of the following is NOT one of Kerckhoffs original six principles for proper and careful design of algorithms?

 

The system should be, if not theoretically unbreakable, unbreakable in practice.

 

The design of a system should not require secrecy, and compromise of the system should not inconvenience the correspondents.

 

The key should be memorable without notes and should be easily changeable.

 

They are all a part of Kerchoffs' original six principles

 

 

 

Question 6

The entity responsible for accepting information about a party wishing to obtain a certificate is

 

Digital certificate A and B

None of the above Registration authority

 

 

 

 

 

Question 7

Common algorithms in the symmetric category. Except: RC5 and RC6

MARS

 

Twofish and Serpent

 

 

 

Elliptical Curve Cryptography (ECC)

 

Question 8

In a public key cryptosystems, which of the following system is true? Both A and B

None of the above is true

 

An individual can design and us any key to reverse whatever is done with one key

 

whatever is done with one key can only be reversed with the corresponding key, and nothing else.

 

 

Question 9

 

Algorithms are set of                                            used to encode and decode messages in a cryptosystem.

 

rules, sequences, and processes

 

Processes, procedures, and people

 

Ciphertext, plaintext, and cryptology

 

All the above

 

 

 

 

 

 

 

Question 10

Key management refers to:

 

The process of safeguarding and distributing keys in a cryptographic system

 

Keeping traditional cryptography out of the way secret key systems

Non of the above

 

Question 11

 

One-Time Pad uses a key that is generated, used once, and then Stored for future

use

 

Discarded

 

Use to create another key

 

None of the above

 

 

 

 

 

 

 

 

Question 12

Stream ciphers typically are ideal for situations where:

 

Cryptanalyst are new to the field

 

Encryption is not important

 

the amount of data is unknown

 

None of the above

 

Question 13

Which of the following components are (is) needed to make PKI system works:

 

Hashing

 

Symmetric encryption

 

All the above

 

Asymmetric encryption

 

 

 

Question 14

PKI system allows for the validation of Availability of Credentials

A and B

 

None of the above

 

Credentials also known as digital certificate

 

 

 

 

 

 

 

Question 15

The following statement are true about Hashing, EXCEPT:

 

None of the above is true, Hashing is not a part of the cryptosystem

 

Hash functions create a fixed-length value that is generated by computing the hash from the plaintext that is put into the process

 

allows for the unique and powerful ability to verify information and to detect but not prevent changes.

 

is strictly a one-way function that is designed to do what the other forms of cryptography cannot, which is to verify the integrity of information

 

Question 16

Symmetric algorithms do poorly with:

 

Key management

 

Non- repudiation

 

A and B

 

Non of the above

 

 

Question 17

A mechanical encryption device that was widely used from the 1920s forward is known as:

 

Landmark items

 

Decipher machine

 

Cypher machine

 

Enigma machine

 

 

Question 18

Public-key cryptosystems are great examples of what is known as:

 

A shared private key

 

A zero knowledge proof

 

Virus producer Worms

Question 19

A trusted third-party is:

 

Anyone who writes trusted computer codes

 

Someone or a computer that you trust

 

Any computer system that runs

 

common program All the above

 

 

 

 

 

Option 1

Low Cost Option
Download this past answer in few clicks

3.83 USD

PURCHASE SOLUTION

Already member?


Option 2

Custom new solution created by our subject matter experts

GET A QUOTE

rated 5 stars

Purchased 7 times

Completion Status 100%

Sitejabber (5.0)

BBC (5.0)

Trustpilot (4.8)

Google (5.0)

Related Questions