Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Electrical & Electronics Expert

problem1) An ex of an active attack is an attack where someone is eavesdropping on a communication line to capture information being transmitted.

 • True
 • False

problem2) How can a symmetric encryption algorithm be figured out or "cracked"?

A. Cryptanalysis
B. Denial of service
C. Man in the middle
D. Brute force
E. Eavesdropping

1) A, D
2) A, B
3) A, E
4) B, C
5) D, E
6) A, C

problem3) The number of passwords that can be generated from the set of characters {a,b,c,d} with replacement is? (replacement means you can use each character multiple times)

1) 64
2) 24
3) 256
4) 512
5) 1024

problem4) The standard that defines and guides Public Key Infrastructure is:

1) X.800
2) X.509
3) RFC 3280
4) Document - New Directions in Cryptography
5) ASN.1 for PKIX

problem5) Assume there are 256 possible keys in the universe of keys for a particular cipher. How many keys on average would need to be tried to break the cipher?

problem6) A message is sent using a Message Authentication Code (MAC). An attacker intercepts the message, changes the message and sends it to the original recipient. The recipient of the message will not detect the change.

• True
• False

problem7) A block encryption algorithm encrypts fixed size blocks.

• True
• False

problem8) The number of passwords that can be generated from the set of characters {a,b,c,d} without replacement is? (without replacement means you can use each character once and only once)

1) 24
2) 64
3) 128
4) 256
5) 512

problem9) A digital certificate is issued with a digital signature from a certificate authority. The digital certificate binds together a public key with an identity.

• True
• False

problem10) The difference between the DES and 3DES algorithms is?

1) DES is symmetric encryption. 3DES is asymmetric encryption.
2) DES uses 16 subkeys for encryption and decryption, 3DES uses 3.
3) DES uses 1 key for encryption and decryption; 3DES uses 3 keys.
4) 3DES uses a Feistel network, DES does not.
5) None of the answers are correct.

problem11)

Using a rail fence cipher with depth of 2 decrypt the following ciphertext: TEATIAMDIH HPRYSTINGT_______

problem12) XOR the two values together.

Select the correct result.

0110 1011 1111
1101 1100 1100

1) 0100 1000 1100
2) 1011 0111 0011
3) None of the selections
4) 1111 1111 1111
5) 0100 1000 1100

problem13) An attribute of randomness that can be used to determine the strength of a password is known as?

1) Entropy
2) Diffusion
3) Confusion
4) Maturation
5) Reversability

problem14) The standard that guides Security Architecture for OSI:

1) X.800
2) X.504
3) FIPS Pub 200
4) X.895 Security Standard
5) RFC 2828

Electrical & Electronics, Engineering

  • Category:- Electrical & Electronics
  • Reference No.:- M92939

Have any Question? 


Related Questions in Electrical & Electronics

In a chord network using dht with m 4 draw the identifier

In a Chord network using DHT with m = 4, draw the identifier space and place 4 peers with node ID addresses N3, N8, N11, and N13 and three keys with addresses k5, k9, and k14. Determine which node is responsible for each ...

1 two point charges each of mass m and charge q are

1. Two point charges each of mass m and charge q are suspended by strings of length l from a common point. Find the value of q for which the angle made by the strings at the common point is 90°. 2. Point charges Q and ar ...

Assignmentnbsp 1electric fields dielectrics generation and

Assignment  1 Electric Fields, Dielectrics, Generation and Measurements of HVDC & HVAC 1) For a coaxial cylindrical single-phase cable with an inner cable radius "r', outer grounded sheath radius "R' and an applied cable ...

Discretize the continuous-time system with transfer

Discretize the continuous-time system with transfer function H(s) = (s + 10 )/s with use of the bilinear (Tustin) approximation method. Verify your result by converting the computed discrete-time system to continuous-tim ...

1 implement the 2-to-4 decoder using 7404 not an 7808 and

1. Implement the 2-to-4 decoder using 7404 (NOT) an 7808 (AND) chips on your breadboard. 2. Implement the 2-to-4 decoder circuit with a 74139 chip on your breadboard. 3. Implement a 1-to-2 decoder in Logisim. Implement t ...

Let xt be a signal whose fourier transform xomega is

Let x(t) be a signal whose Fourier transform X(ω) is nonzero only over 3 ≤ |ω| ≤ 9. Further, only frequencies 5 ≤ |ω| ≤ 7 contain useful information (the other frequencies can be considered to contain noise or different ...

The size d of droplets produced by a liquid spray nozzle is

The size d of droplets produced by a liquid spray nozzle is thought to depend upon the nozzle diameter D, jet velocity V, and the properties of the liquid ρ, μ, and σ. Rewrite the relation in dimensionless form. Take D, ...

1 what is the significance of a nonzero net right-lateral

1. What is the significance of a nonzero net right-lateral differential of and normal to the z-direction at a point in space? 2. If a pair of E and B at a point satisfies Faraday's law in differential form, does it neces ...

1 if alice and bob need to communicate using asymmetric-key

1. If Alice and Bob need to communicate using asymmetric-key cryptography, how many keys do they need? Who needs to create these keys? 2. Why do you think asymmetric-key cryptography is used only with small messages. 3. ...

1 express equation in terms of the flow rate and the pipe

1. Express equation in terms of the flow rate and the pipe diameter. If the pipe diameter is doubled at constant pressure drop, what percentage change will occur in the flow rate? 2. A 40-km-long pipeline delivers petrol ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro