Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Drew University IS MISC Quiz 3 Question 1)Asymmetric encryption addresses the key distribution problem inherent with symmetric encryption

Drew University IS MISC Quiz 3 Question 1)Asymmetric encryption addresses the key distribution problem inherent with symmetric encryption

Business

Drew University

IS MISC

Quiz 3

Question 1)Asymmetric encryption addresses the key distribution problem inherent with symmetric encryption.

 

 

Question 2

 

U.S. laws regulate the exportation of cryptographic systems.

 

 

 

 

Question 3

 

Digital certificates                          .

  • .

 

 

Question 4

 

Ciphers utilize single letters or short sequences of letters to perform encryption.

 

 

Question 5

 

quickly downloaded for use to break a password that is a word or a name?

 

 

Question 6

 

Which asymmetric algorithm, based on modular logarithms, is used to establish and exchange asymmetric keys over an insecure medium?

 

 

Question 7

 

Which of the following statements is NOT true regarding asymmetric encryption?

 

 

Question 8

 

Tim would like to send a confidential, encrypted message to Kellie using asymmetric cryptography. What key should Tim use to create the message?

 

 

Question 9

 

Tim sent a confidential, encrypted message to Kellie using asymmetric cryptography. What key should Kellie use to decrypt the message?

 

 

Question 10

 

 

 

Confidentiality maintains the secrecy of data but does not provide a way of detecting data alteration. Integrity of data is provided via hashing functions that allow for the detection of alterations of information but does not provide confidentiality because hashing does not encrypt data

 

Question 11

 

Hashing is involved with digital signatures. A hashing algorithm creates a hash to                                    .

 

 

Question 12

 

Symmetric encryption is also called public key cryptography.

 

Question 13

 

With asymmetric encryption, information is encrypted by the sender with the receiver's public key and the information is decrypted by the receiver with the private key.

 

 

Question 14

 

What type of encryption uses the same key to encrypt and to decrypt information?

 

 

Question 15

 

 

 

Most encryption can be broken if an attacker has the computing power, creativity, a good understanding of cryptographic algorithms, and sufficient time

 

Question 16

 

A drawback to public key infrastructure (PKI) is that the two parties must have prior knowledge of one another in order to establish a relationship.

 

 

 

Question 17

 

An advantage to brute-force password attacks is that they take little time to perform even as key lengths increase.

 

 

 

Question 18

 

A man-in-the-middle (MitM) attack is carried out when an attacker gets between two users with the goal of intercepting and modifying packets.

 

 

Question 19

 

In symmetric encryption, one key is used for encryption and a separate key is used for decryption.

 

 

 

 

Question 20

 

Tim would like to send a confidential, encrypted message to Kellie using symmetric cryptography. What key should Tim use to create the message?

 

 

 

 

 

 

 

Question 21

 

Cryptography provides all of the following except                              .

 

 

Question 22

 

The public key infrastructure (PKI) framework exists to manage, create, store, and distribute keys and digital certificates safely and securely.

 

 

Question 23

 

The main function or capability of certificate authorities (CAs) is to                                  .

 

 

Question 24

 

A one-way hash function is also known as a fingerprint.

 

 

Question 25

 

Alice sends a message to Bob. She uses cryptography to ensure that Bob will be able to prove to another person that the message in his possession actually came from Alice. What goal of cryptography is Alice attempting to achieve?

 

 

Question 26

 

Brian is designing an asymmetric encryption scheme that will be used by 15 people. How many

encryption keys are required to implement this system?

 

Question 27

 

For both symmetric and asymmetric cryptography, data is encrypted by applying the key to an encryption algorithm.

 

 

Question 28

 

A common problem that makes password attacks effective is that many people use complex phrases as their password.

 

 

It is important to remember some of the reasons why the attacks work. One of the common problems is the simple fact that many people use ordinary words as their password

 

Question 29

 

What provides a framework through which two parties can establish a trusted relationship even if the parties have no prior knowledge of one another?

 

 

Question 30

 

Which term refers to the process of positively identifying a party as a user, computer, or service?

 

 

 

Question 31

 

Symmetric encryption algorithms are inherently faster than asymmetric algorithms.

Question 32

 

Which term refers to the ability to ensure that a message originated from a specific party?

 

 

 

Question 33

 

In symmetric encryption, the length of the key and the quality of the algorithm will determine how secure the encryption system is.

 

 

 

Question 34

 

Digital signatures combine public key cryptography and hashing.

 

 

 

Question 35

 

Which term refers to the ability to verify that information has not been altered and has remained in the form originally intended by the creator?

 

 

 

Question 36

 

A one-way hashing function is designed to be                            .

 

 

 

Question 37

 

Secure Shell (SSH), Transport Layer Security (TLS), and Challenge Handshake Authentication Protocol (CHAP) are                                                                    .

 

 

 

 

Question 38

 

Substitution, transposition, stream, and block are common forms of ciphers.

 

 

 

 

 

Option 1

Low Cost Option
Download this past answer in few clicks

6.83 USD

PURCHASE SOLUTION

Already member?


Option 2

Custom new solution created by our subject matter experts

GET A QUOTE

Related Questions