Why Choose Us?
0% AI Guarantee
Human-written only.
24/7 Support
Anytime, anywhere.
Plagiarism Free
100% Original.
Expert Tutors
Masters & PhDs.
100% Confidential
Your privacy matters.
On-Time Delivery
Never miss a deadline.
Florida Gulf Coast University GEB 3250 Chapter 28 Quiz 1))In cryptography, the encryption/decrypti on algorithms are___________; the keys are
Florida Gulf Coast University
GEB 3250
Chapter 28 Quiz
1))In cryptography, the encryption/decrypti on algorithms are___________; the keys are
.
- secret; public
- public; secret
- secret; secret
- none of the above
- )In cryptogra phy, the same key is used by the sender (for encryption) and the receiver (for
decryption).
- symmetric-key
- asymmetric-key
- public-key
- none of the above
- )In cryptography, the same key is used in both directions.
- symmetric-key
- asymmetric-key
- public-key
- none of the above
- )The DES cipher uses the same concept as the cipher, but the encryption/ decryption
algorithm is much more complex.
- RSA
- AES
- Caesar
- none of the above
- ) cryptography is often used for long messages.
- Symmetric-key
- Asymmetric-key
- Public-key
- none of the above
- ) algorithms are more efficient for short messages.
- Symmetric-key
- Asymmetric-key
- Public-key
- none of the above
- ) means that the sender and the receiver expect confidentiality.
- Non-repudiation
- Integrity
- Authentication
- none of the above
- ) means that the data must arrive at the receiver exactly as they were sent.
- Non-repudiation
- Message integrity
- Authentication
- none of the above
- ) means that the receiver needs to be sure of the sender identity and that an imposter has
not sent the message.
- Non-repudiation
- Message integrity
- Message authentication
- none of the above
- ) can provide authentication, integrity, and nonrepudiation for a message.
- Encryption/decrypti on
- Digital signature
- Compression
- none of the above
- )Digital signature does not provide .
- non-repudiation
- privacy
- authentication
- provides all of the above
- )In , the entity identity is verified once for the entire duration of system access.
- entity authentication
- message integrity
- message authentication
- none of the above
- )The symmetric (shared) key in the Diffie-Hellman protocol is .
- K = Gxy mod N
- K = Gx mod N
- K = Gy mod N
- none of the above
- )In cryptography, everyone has access to everyone ?s public key.
- symmetric-key
- asymmetric-key
- both a and b
- none of the above
- ) servers are involved in the Kerberos protocol.
- Two
- Three
- Four
- none of the above
- )n Kerberos, the is the KDC.
- AS
- TGS
- real server
- none of the above
- )In Kerberos, the issues the ticket for the real server.
- AS
- TGS
- real server
- none of the above
- ) In Kerberos, the provides services for the entity.
- AS
- TGS
- real server
- none of the above
- ) Kerberos allows the global distribution of ASs and TGSs, with each system called a
![]() |
- server
- realm
- client
- none of the above
- )IP Security (IPSec) is a collection of protocols designed by the IETF (Internet Engineering Task
Force) to provide security for a packet at the level.
- data link
- network
- transport
- none of the above
- ) IPSec requires a logical connection between two hosts using a signaling protocol called
![]() |
.
- AS
- SA
- AS
- none of the above
- ) IPSec operates at two different modes: mode and mode.
- transport; network
- transport; tunnel
- tunnel; surface
- none of the above
- ) In the mode, the IPSec header is added between the IP header and the rest of the packet.
- transport
- tunnel
- both a and b
- none of the above
- )In the mode, the IPSec header is placed in front of the original IP header.
- transport
- tunnel
- both a and b
- none of the above
- ) IPSec defines two protocols: and .
- AH: SSP
- ESP; SSP
- AH: EH
- none of the above
- ) The protocol is designed to authenticate the source host and to ensure the integrity of the
payload carried by the IP packet.
- AH
- ESP
- both a and b
- none of the above
- ) The protocol provides message authentication and integrity, but not privacy.
- AH
- ESP
- both a and b
- none of the above
- ) The protocol provides message authentication, integrity, and privacy.
- AH
- ESP
- both a and b
- none of the above
- ) The was designed to provide security at the transport layer.
- AH
- ESP
- TLS
- none of the above
- ) was invented by Phil Zimmermann to provide all four aspects of security in the sending of
email.
- AH
- ESP
- TLS
- none of the above
- ) A packet-filter firewall filters at the or layer.
- network; application
- transport; application
- network; transport
- none of the above
- ) A proxy firewall filters at the layer.
- transport
- network
- application
- none of the above
- ) Before a message is encrypted, it is called .
- plaintext
- ciphertext
- cryptotext
- none of the above
- )After a message is encrypted, it is called .
- plaintext
- ciphertext
- cryptotext
- none of the above
- ) If 20 people need to communicate using symmetric-key cryptography,
symmetric keys are needed.
- 19
- 20
C) 190
D) 200
- ) In the asymmetric-key method of cryptography, which key is publicly known?
- encryption key only
- decryption key only
- both
- none of the above
- ) In the asymmetric-key method of cryptography, the receiver has possession of the
.
- private key
- public key
- both keys
- none of the above
- ) The RSA algorithm uses cryptography method.
- an asymmetric-key
- a private-key
- a symmetric-key
- none of the above
- )If user A wants to send an encrypted message to user B, the plaintext is encrypted with the public
key of
- user A
- user B
- the network
- none of the above
- ) In the digital signature technique when the whole message is signed using an asymmetric key, the
sender of the message uses to sign the message.
- his or her own symmetric key
- his or her own private key
- his or her own public key
- none of the above
- ) In the digital signature technique when the whole message is signed using an asymmetric key, the
receiver of the message uses to verify the signature.
- her or his own symmetric key
- her or his own private key
- the sender ?s public key
- none of the above
- ) A is a trusted third party that solves the problem of symmetric-key distribution.
- CA
- KDC
- TLS
- firewall
- )A certifies the binding between a public key and its owner.
- CA
- KDC
- TLS
- none of the above
- ) In a attack, a message captured by an intruder is illegally sent a second time.
- return
- man-in-the-middle
- replay
- none of the above
- ) A is a large number used only once that helps distinguish a fresh authentication request
from a repeated one.
- ticket
- nonce
- realm
- none of the above
- ) In the protocol, the symmetric key is K = Gxy mod N, where G and N are public numbers.
- Diffie-Hellman
- Needham-Schroeder
- Otway-Rees
- none of the above
- ) In a attack, an intruder comes between two communicating parties, intercepting and
replying to their messages.
- ciphertext
- man-in-the-middle
- replay
- none of the above
- ) is an authentication protocol that needs an authentication server and a ticket- granting
server.
- Diffie-Hellman
- Needham-Schroeder
- Kerberos
- none of the above
Expert Solution
PFA
Archived Solution
You have full access to this solution. To save a copy with all formatting and attachments, use the button below.
For ready-to-submit work, please order a fresh solution below.







