100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

Cryptography And Network Security Principles – Q&A

Rating
-
Sold
-
Pages
8
Grade
A+
Uploaded on
22-01-2024
Written in
2023/2024

Cryptography And Network Security Principles – Q&A

Institution
Module









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Module

Document information

Uploaded on
January 22, 2024
Number of pages
8
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Cryptography And Network Security Principles – Q&A

Asymmetric encryption ✔️Ans - Q1. Is the most common method
used to conceal small blocks of data, such as encryption keys and hash
function values, which are used in digital signatures

encryption ✔️Ans - Q2. A common technique for masking contents of
messages or other information traffic so that opponents cannot extract the
information from the message is.

Replay ✔️Ans - Q3. Involves the passive capture of a data unit and its
subsequent retransmission to produce an unauthorized effect.

Layering ✔️Ans - Q4. Refers to the use of multiple, overlapping
protection approaches addressing the people, technology, and operational
aspects of information systems.

Confidentiality ✔️Ans - Q5. A loss of __________ is the unauthorized
disclosure of information

Authenticity ✔️Ans - Q6. Verifying that users are who they say they
are and that each input arriving at the system came from a trusted source
is

Moderate ✔️Ans - Q7. A _________ level breach of security could cause
a significant degradation in mission capability to an extent and duration
that the organization is able to perform its primary functions, but the
effectiveness of the functions is significantly reduced.

Security Attack ✔️Ans - Q8. A __________ is any action that
compromises the security of information owned by an organization

masquerade ✔️Ans - Q9. A __________ takes place when one entity
pretends to be a different entity.

Availability ✔️Ans - QA(n) __________ service is one that protects a
system to ensure its availability and addresses the security concerns raised
by denial- of- service attacks.

, Substitution ✔️Ans - Q1. Techniques map plaintext elements
(characters, bits) into ciphertext elements.

One Time Pad ✔️Ans - Q2. Joseph Mauborgne proposed an
improvement to the Vernam cipher that uses a random key that is as long
as the message so that the key does not need to be repeated. The key is
used to encrypt and decrypt a single message and then is discarded. Each
new message requires a new key of the same length as the new message.
This scheme is known as a(n)

plaintext, ciphertext ✔️Ans - Q3. An original intelligible message fed
into the algorithm as input is known as _________ , while the coded message
produced as output is called the

Deciphering ✔️Ans - Q4. Restoring the plaintext from the ciphertext
is

Brute force ✔️Ans - Q5. A __________ attack involves trying every
possible key until an intelligible translation of the ciphertext is obtained

Cryptanalyses ✔️Ans - Q6. Techniques used for deciphering a
message without any knowledge of the enciphering details is.

Decryption Algorithm ✔️Ans - Q7. The ___________ takes the ciphertext
and the secret key and produces the original plaintext. It is essentially the
encryption algorithm run in reverse

conventional encryption ✔️Ans - Q8. If both sender and receiver use
the same key, the system is referred to as

Cryptanalytic ✔️Ans - Q9. attacks exploit the characteristics of the
algorithm to attempt to deduce a specific plaintext or to deduce the key
being used

Playfair Cipher ✔️Ans - Q10. The __________ was used as the standard
field system by the British Army in World War I and was used by the U.S.
Army and other Allied forces during World War II.
£8.61
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
SharpGrades Bournemouth University (London)
Follow You need to be logged in order to follow users or courses
Sold
622
Member since
3 year
Number of followers
467
Documents
6408
Last sold
1 week ago
Smart notes. Better grades.

SharpGrades provides clear, well-structured, and exam-focused study materials designed to help students understand concepts quickly and improve academic performance. All notes are carefully organized, concise, and aligned with course requirements to save time and support effective studying.

4.2

118 reviews

5
68
4
21
3
16
2
7
1
6

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions