CNT 4406 Midterm Study Guide Exam
Questions with Answers 2024.
__________ is the process of converting an original message into a form that is
unreadable to unauthorized individuals. - Answer: Encryption
In the context of a PKI, a(n) ____________________ authority operates under the
trusted collaboration of the certificate authority and can be delegated day-to-day
certification functions, such as verifying registration information about new
registrants, generating end-user keys, revoking certificates, and validating that
users possess a valid certificate. - Answer: registration
__________ functions are mathematical algorithms that generate a message
summary or digest to confirm the identity of a specific message and to confirm
that there have not been any changes to the content. - Answer: Hash
, CNT 4406 Midterm Study Guide
The successor to 3DES is the ____________________ Encryption Standard. -
Answer: Advanced
To use a(n) ____________________ cipher, you substitute one value for another. -
Answer: substitution
_________ is a hybrid cryptosystem that combines some of the best available
cryptographic algorithms and has become the open-source de facto standard for
encryption and authentication of e-mail and file storage applications. - Answer:
PGP
The more common name for asymmetric encryption is ____________________-
key encryption. - Answer: public
__________ is the current federal information processing standard that specifies a
cryptographic algorithm used within the U.S. government to protect information
in federal agencies that are not a part of the national defense infrastructure. -
Answer: AES
Digital signatures should be created using processes and products that are based
on the __________. - Answer: DSS
A __________ is the information used in conjunction with an algorithm to create
the ciphertext from the plaintext or derive the plaintext from the ciphertext. -
Answer: key