ITSY 1342 FINAL EXAM QUESTIONS WITH CORRECT ANSWERS
Which of the following hides the existence of information? CORRECT ANSWER Steganography Cryptography can prevent an individual from fraudulently reneging on an action. What is this known as? CORRECT ANSWER Repudiation Brielle is researching substitution ciphers. She came across a cipher in which the entire alphabet was rotated 13 steps. What type of cipher is this? CORRECT ANSWER ROT13 What are public key systems that generate different random public keys for each session? CORRECT ANSWER perfect forward secrecy What is data called that is to be encrypted by inputting it into a cryptographic algorithm CORRECT ANSWER Plaintext Cicero is researching hash algorithms. Which algorithm would produce the longest and most secure digest? CORRECT ANSWER SHA3-512 Which of these is NOT a characteristic of a secure hash algorithm? CORRECT ANSWER Collisions should be rare. Which of these is the strongest symmetric cryptographic algorithm? CORRECT ANSWER C. Advanced Encryption Standard If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message? CORRECT ANSWER Alice's public key What is a collision? CORRECT ANSWER two files have the same hash Nonrepudiation CORRECT ANSWER The process of proving that a user performed an action.
Written for
- Institution
- ITSY
- Module
- ITSY
Document information
- Uploaded on
- January 19, 2023
- Number of pages
- 6
- Written in
- 2022/2023
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
which of the following hides the existence of information correct answer steganography cryptography can prevent an individual from fraudulently reneging on an action what is this known as correct