Ask Electrical & Electronics Expert

problem1) An ex of an active attack is an attack where someone is eavesdropping on a communication line to capture information being transmitted.

 • True
 • False

problem2) How can a symmetric encryption algorithm be figured out or "cracked"?

A. Cryptanalysis
B. Denial of service
C. Man in the middle
D. Brute force
E. Eavesdropping

1) A, D
2) A, B
3) A, E
4) B, C
5) D, E
6) A, C

problem3) The number of passwords that can be generated from the set of characters {a,b,c,d} with replacement is? (replacement means you can use each character multiple times)

1) 64
2) 24
3) 256
4) 512
5) 1024

problem4) The standard that defines and guides Public Key Infrastructure is:

1) X.800
2) X.509
3) RFC 3280
4) Document - New Directions in Cryptography
5) ASN.1 for PKIX

problem5) Assume there are 256 possible keys in the universe of keys for a particular cipher. How many keys on average would need to be tried to break the cipher?

problem6) A message is sent using a Message Authentication Code (MAC). An attacker intercepts the message, changes the message and sends it to the original recipient. The recipient of the message will not detect the change.

• True
• False

problem7) A block encryption algorithm encrypts fixed size blocks.

• True
• False

problem8) The number of passwords that can be generated from the set of characters {a,b,c,d} without replacement is? (without replacement means you can use each character once and only once)

1) 24
2) 64
3) 128
4) 256
5) 512

problem9) A digital certificate is issued with a digital signature from a certificate authority. The digital certificate binds together a public key with an identity.

• True
• False

problem10) The difference between the DES and 3DES algorithms is?

1) DES is symmetric encryption. 3DES is asymmetric encryption.
2) DES uses 16 subkeys for encryption and decryption, 3DES uses 3.
3) DES uses 1 key for encryption and decryption; 3DES uses 3 keys.
4) 3DES uses a Feistel network, DES does not.
5) None of the answers are correct.

problem11)

Using a rail fence cipher with depth of 2 decrypt the following ciphertext: TEATIAMDIH HPRYSTINGT_______

problem12) XOR the two values together.

Select the correct result.

0110 1011 1111
1101 1100 1100

1) 0100 1000 1100
2) 1011 0111 0011
3) None of the selections
4) 1111 1111 1111
5) 0100 1000 1100

problem13) An attribute of randomness that can be used to determine the strength of a password is known as?

1) Entropy
2) Diffusion
3) Confusion
4) Maturation
5) Reversability

problem14) The standard that guides Security Architecture for OSI:

1) X.800
2) X.504
3) FIPS Pub 200
4) X.895 Security Standard
5) RFC 2828

Electrical & Electronics, Engineering

  • Category:- Electrical & Electronics
  • Reference No.:- M92939

Have any Question?


Related Questions in Electrical & Electronics

Question 1for the ce amplifier in figure 1 given the

Question 1 For the CE amplifier in Figure (1), given the following component parameters: Parameter Value β DC , β AC 150 V BE 0 . 7 V V CC 12 V R C 820 ? R E 1 100 ? R E 2 220 ? R 1 20 k? R 2 5 . 2 k? R L 100 k? C 1 , C ...

Question -i a star-connected three-phase synchronous

Question - (i) A star-connected, three-phase synchronous induction motor takes a current of 10 amps from a 415 volt supply at unity power factor when supplying a steady load. If the synchronous reactance is 5 ohms/phase ...

1 a name the three major groups of contamination and

1. (a) Name the three major groups of contamination and briefly describe their physical characteristics. (b) Where do the above contamination types come from? Give one example of each. 2. Name two processes metrics which ...

Question 1 in the voltage regulator circuit in figure p221

Question 1: In the voltage regulator circuit in Figure P2.21, V 1 = 20 V, V Z = 10 V, R i = 222Ω and P z (max) = 400 mW. (a) Determine I L, I z , and I L , if R L = 380Ω. (b) Determine the value of R L , that will establ ...

Summative assessmentin 2017 sej101 assessment will consist

Summative Assessment In 2017 SEJ101 assessment will consist of nine tasks that will develop a portfolio of your assessed work. Throughout the trimester you will have the opportunity for feedback on all nine tasks before ...

1 a name the three major groups of contamination and

1. (a) Name the three major groups of contamination and briefly describe their physical characteristics. (b) Where do the above contamination types come from? Give one example of each. 2. Name two processes metrics which ...

1 a name the three major groups of contamination and

1. (a) Name the three major groups of contamination and briefly describe their physical characteristics. (b) Where do the above contamination types come from? Give one example of each. 2. Name two processes metrics which ...

Case studythis assignment consists of a written report of

CASE STUDY This assignment consists of a written report of approximately 1000 words and any diagrams in which you are asked to critically compare different process methods used to achieve the same result and show an awar ...

Problem 1 a two-phase servomotor has rated voltage applied

Problem 1: A two-phase servomotor has rated voltage applied to its excitation winding. The torque speed characteristic of the motor with Vc = 220 V, 60 Hz applied to its control phase winding is shown in Fig.1. The momen ...

Electrical engineering questions -q1 two ideal voltage

Electrical Engineering Questions - Q1. Two ideal voltage sources designated as machines 1 and 2 are connected, as shown in the figure below. Given E 1 = 65∠0 o V, E 2 = 65∠30 o V, Z = 3Ω. Determine if Machine 1 is genera ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As