general business data bank

| August 14, 2017

1.
_______________ is done by comparing the
input plaintext to the output ciphertext to try
to determine the key used to encrypt the
information.
Correct Answer(s): Differential
cryptanalysis
2.
The art of secret writing that enables an
individual to hide the contents of a message from
all but the intended recipient is called
A) Key management
B) Steganography
C) Cryptanalysis
D) Cryptography
3.
PKI can be used as a measure to trust
individuals we do not know.
A) True
B) False
4.
Keyspace refers to
A) All possible key values
B) The number of keys needed to encrypt or
decrypt a message
C) The location where keys are stored
D) The portion of the algorithm that the
key connects with to encrypt or decrypt a
message
5.
The benefit of SHA-1 over MD5 is that it is
resistant to a collision attack.
A) True
B) False
6.
All of the following are asymmetric
encryption algorithms EXCEPT:
A) ECC
B) RSA
C) 3DES
D) ElGamal
7.
The process for protecting intellectual
property from unauthorized used is called
A) Digital signatures
B) Digital rights management
C) Key escrow
D) Anti-pirating management
8.
What is a certificate authority?
A) An entity that generates electronic
credentials
B) An entity that requires proof of
identity from the individual requesting a
certificate
C) A centralized directory in which the registered
certificate is stored
D) An entity that generates a digitally
signed identification certificate
9.
Hiding a text file in a jpg file is an
example of steganography.
A) True
B) False
10.
The encryption method based on the idea of
using a shared key for encryption and
decryption of data is
A) Symmetric encryption
B) Elliptical curve encryption
C) Hashing function
D) Asymmetric encryption
11.
The term used to describe a centralized
directory that can be accessed by a subset of
individuals is _______________
Correct Answer(s): certificate repository
12.
The cipher that replaces each letter of the
alphabet with a different letter (not in
sequence) is a
A) Substitution cipher
B) Vigenère cipher
C) Shift cipher
D) Transposition cipher
13.
All of the following are cryptographic
applications EXCEPT:
A) FreeOTFE
B) PGP
C) StegDetect
D) GnuPG
14.
How is an outsourced CA different from a
public CA?
A) It provides dedicated services, and
possibly equipment, to an individual
company.
B) The CA is implemented, maintained, and
controlled by the company that
implemented it.
C) The CA is already established and being
used by many individuals and
companies.
D) The CA provides more flexibility for
companies.
15.
The difference between centralized and
decentralized infrastructures is
A) In a decentralized infrastructure, the
certificate may have an extended lifetime.
B) The network administrator sets up the
distribution points in centralized
infrastructures.
C) The location where the cryptographic key
is generated and stored is different.
D) The key pairs and certificates do not
have a set lifetime in centralized
infrastructures.

Order your essay today and save 30% with the discount code: ESSAYHELPOrder Now