Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem1) A root digital certificate is typically issued by who?

1. Registration authority
2. Certificate authority
3. Any individual
4. X800 standards commitee
5. A secure directory system that uses LDAP

problem2) The number of different keys used in symmetric encryption is_________

problem3) Select the correct answer. The Diffie Hellman algorithm is used for what?

1. Public key encryption.
2. Symmetric encryption
3. Message Authentication
4. Key Exchange
5. Message digest generation

problem4) When creating a digital envelope which of the following steps are done.

A. The message is encrypted using a one time random symmetric key
B. The one time random symmetric key is encrypted by using the receivers private key
C. The one time random key is made a public key
D. The message is encrypted by using a one time random asymmetric key
E. The one time random symmetric key is encrypted with the receivers public key

1. A, E
2. A, C
3. B, E
4. C, D
5. A, D

problem5) Select the best answer that defines Security Risk

1. Threat of attack coupled with security breach
2. Threat of attack and vulnerability to attack
3. Vulnerability to attack coupled with an active attack
4. Threat of active and passive attack

problem6) Using a Playfair cipher what is the plaintext for the following ciphertext. RNNEQLDKPCNRMI The keyword you should use is "MONEY". You are being asked to decrypt this message.

problem7) With a symmetric block cipher the relationship with key size, security and performance is what?

A. The larger the key the more secure the algorithm
B. The larger the key size the slower encryption/decryption performance.
C. The larger the key the easier to perform cryptanalysis
D. The smaller the key the more secure the encryption/decryption
E. The larger the key the faster the encryption/decryption performance.

1. A, C
2. A, B
3. A, B, C
4. C, D
5. B, C

problem8) A Security Mechanism is an implementation of a specific program, process or device that is designed to detect, prevent, or recover from a security attack.

• True
• False

problem9) Match the cryptology mechanism with what type it is.

    DES                                                                        Answer
    AES                                                              A. Symmetric stream encryption
    Diffie Hellman                                                 B. Mode of operation                
    Cipher block chaining                                      C. Hashing algorithm                                                                        
    Cipher feedback                                              D. Key exchange
    RC4                                                               E. Symmetric block encryption
    Electronic codebook
    SHA1
    3DES
    MD5

problem10) A Security Service protects against specific threats according to the categorization of security threats in the X.503 architecture.

• True
• False

problem11) Assuming only asymmetric encryption is being used for communication between two parties. How many different keys are in play for sending one message from person A to person B? Assume person B reads the message.

1. 2
2. 1
3. Cannot determine
4. At least three

problem12)

Select the best answer. If the sender uses the recipients public key to encrypt a message what functionality is provided:

1) Message integrity
2) Message confidentiality
3) Message authentication
4) Message authentication and message confidentiality
5) none of the choices

problem13) Using a rail fence cipher with a depth of 3 encrypt the following message:

The party is at Fenway in October

problem14) The sender of the message in Digital signature encrypts the message digest using what?

1. The secret key.
2. Receivers public key.
3. Senders private key.
4. Symmetric key.
5. MAC value.

problem15) A digital certificate is what?

1. A notarized document certifying your identity.
2. A mail message sent with a Digital Signature from any third party that certifies the identity of a person or an entity.
3. Secret keys (among other information) used for symmetric encryption.
4. Public key (among other information) used for asymmetric encryption.
5. A mail message from a registration authority (RA).

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92942

Have any Question? 


Related Questions in Computer Engineering

Visit the nist web site and view the document announcing

Visit the NIST Web site and view the document "Announcing the Advanced Encryption Standard (AES)" which can be found at http://csrc.nist.gov/publications/fips/ fips197/fips-197.pdf. Review the FIPS-197 standard. Examine ...

1 in the slider test program add a set of tick marks to

1. In the slider test program, add a set of tick marks to each slider that show the exact slider position. 2. Enhance the font viewer program to allow the user to select different fonts. Research the API documentation to ...

1 what is the optimal block size for a miss latency of

1. What is the optimal block size for a miss latency of 20×B cycles? 2. What is the optimal block size for a miss latency of 24+B cycles? 3. For constant miss latency, what is the optimal block size? 4. In this exercise, ...

Design a security service that provides data integrity data

Design a security service that provides data integrity, data confidentiality and nonrepudiation using public-key cryptography in a two-party communication system over an insecure channel. Give a rationale that data integ ...

1 in tcp does a fin segment close a connection in only one

1. In TCP, does a FIN segment close a connection in only one direction or in both directions? 2. In TCP, what type of flag can totally close the communication in both directions? 3. Most of the flags can be used together ...

Questionstudents are required to select a topic related to

Question: Students are required to select a topic related to global, social, ethical, or legal issues with digital media. You will perform in-depth research and provide an explanation of how an issue associated with your ...

1 what is a communication protocol2 why do we need

1. What is a communication protocol? 2. Why do we need communication protocols? 3. List the major protocols discussed in this chapter. 4. In addition to ISO and TCP/IP, what are the other models?

1 using the cidr notation show the ipv6 address compatible

1. Using the CIDR notation, show the IPv6 address compatible to the IPv4 address 129.6.12.34. 2. Using the CIDR notation, show the IPv6 address mapped to the IPv4 address 129.6.12.34. 3. Using the CIDR notation, show the ...

1 how can the practice of information security be described

1. How can the practice of information security be described as both an art and a science? How does security as a social science influence its practice? 2. Who is ultimately responsible for the security of information in ...

Using 5-bit sequence numbers what is the maximum size of

Using 5-bit sequence numbers, what is the maximum size of the send and receive windows for each of the following protocols? a. Stop-and-Wait b. Go-Back-N c. Selective-Repeat

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen