+1-415-315-9853

info@mywordsolution.com

## Engineering

 Civil Engineering Chemical Engineering Electrical & Electronics Mechanical Engineering Computer Engineering Engineering Mathematics MATLAB Other Engineering Digital Electronics Biochemical & Biotechnology

problem1) An ex of an active attack is an attack where someone is eavesdropping on a communication line to capture information being transmitted.

• True
• False

problem2) How can a symmetric encryption algorithm be figured out or "cracked"?

A. Cryptanalysis
B. Denial of service
C. Man in the middle
D. Brute force
E. Eavesdropping

1) A, D
2) A, B
3) A, E
4) B, C
5) D, E
6) A, C

problem3) The number of passwords that can be generated from the set of characters {a,b,c,d} with replacement is? (replacement means you can use each character multiple times)

1) 64
2) 24
3) 256
4) 512
5) 1024

problem4) The standard that defines and guides Public Key Infrastructure is:

1) X.800
2) X.509
3) RFC 3280
4) Document - New Directions in Cryptography
5) ASN.1 for PKIX

problem5) Assume there are 256 possible keys in the universe of keys for a particular cipher. How many keys on average would need to be tried to break the cipher?

problem6) A message is sent using a Message Authentication Code (MAC). An attacker intercepts the message, changes the message and sends it to the original recipient. The recipient of the message will not detect the change.

• True
• False

problem7) A block encryption algorithm encrypts fixed size blocks.

• True
• False

problem8) The number of passwords that can be generated from the set of characters {a,b,c,d} without replacement is? (without replacement means you can use each character once and only once)

1) 24
2) 64
3) 128
4) 256
5) 512

problem9) A digital certificate is issued with a digital signature from a certificate authority. The digital certificate binds together a public key with an identity.

• True
• False

problem10) The difference between the DES and 3DES algorithms is?

1) DES is symmetric encryption. 3DES is asymmetric encryption.
2) DES uses 16 subkeys for encryption and decryption, 3DES uses 3.
3) DES uses 1 key for encryption and decryption; 3DES uses 3 keys.
4) 3DES uses a Feistel network, DES does not.
5) None of the answers are correct.

problem11)

Using a rail fence cipher with depth of 2 decrypt the following ciphertext: TEATIAMDIH HPRYSTINGT_______

problem12) XOR the two values together.

Select the correct result.

0110 1011 1111
1101 1100 1100

1) 0100 1000 1100
2) 1011 0111 0011
3) None of the selections
4) 1111 1111 1111
5) 0100 1000 1100

problem13) An attribute of randomness that can be used to determine the strength of a password is known as?

1) Entropy
2) Diffusion
3) Confusion
4) Maturation
5) Reversability

problem14) The standard that guides Security Architecture for OSI:

1) X.800
2) X.504
3) FIPS Pub 200
4) X.895 Security Standard
5) RFC 2828

Electrical & Electronics, Engineering

• Category:- Electrical & Electronics
• Reference No.:- M92939

Have any Question?

## Related Questions in Electrical & Electronics

### Using the navier-stokes equations in appendix e solve

Using the Navier-Stokes equations in Appendix E, solve Problem. Problem The device in the schematic diagram below is a viscosity pump. It consists of a rotating drum inside of a stationary case. The case and the drum are ...

### Approximate by a number of terms of your choice through the

Approximate (by a number of terms of your choice) through the three forms of Fourier series expansion the periodic signal that in one period is given by Each time a. Plot the approximate signal in time of four periods. b ...

### 1 what is the criterion for a material to be a good

1. What is the criterion for a material to be a good conductor? 2. Give two examples of materials that behave as good conductors for frequencies of up to several gigahertz. 3. What is skin effect? Discuss skin depth, giv ...

### 1 fluid flows between two parallel plates a distance h

1. Fluid flows between two parallel plates, a distance h apart. The upper plate moves at velocity, v 0 ; the lower plate is stationary. For what value of pressure gradient will the shear stress at the lower wall be zero? ...

### 1 state the divergence theorem and discuss its application2

1. State the divergence theorem and discuss its application. 2. What is the divergence of the curl of a vector? 3. Summarize Maxwell's equations in differential form. 4. Are all Maxwell's equations in differential form i ...

### Using the definition compute the bilateral laplace

Using the definition, compute the bilateral Laplace transform, including the region of convergence (ROC), of the following complexvalued functions:

### 1 what is the basis behind the construction of the smith

1. What is the basis behind the construction of the Smith Chart? How does the Smith Chart simplify the solution of transmission-line problems? 2. Briefly discuss the mapping of the normalized line impedances from the com ...

### 1 how do you find the work done in moving a test charge by

1. How do you find the work done in moving a test charge by an infinitesimal distance in an electric field? 2. What is the amount of work involved in moving a test charge normal to the electric field? 3. What is the phys ...

### Data at a rate of 1 million pulses per second are to be

Data at a rate of 1 million pulses per second are to be transmitted over a certain communications channel. The unit step response g(t) for this channel is shown in Fig. P2.7-1. a. Can this channel transmit data at the re ...

### 1 discuss the application of the gradient concept for the

1. Discuss the application of the gradient concept for the determination of unit vector normal to a surface. 2. How would you find the rate of increase of a scalar function along a specified direction by using the gradie ...

• 13,132 Experts

## Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

### WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

### Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

### Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

### Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

### Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro