Cryptography and Network Security Principles Top Predicted Questions and Correct Answers
Asymmetric encryption - 1. Is the most common method used to conceal small blocks of data, such as encryption keys and hash function values, which are used in digital signatures encryption - 2. A common technique for masking contents of messages or other information traffic so that opponents cannot extract the information from the message is. Replay - 3. Involves the passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect. Layering - 4. Refers to the use of multiple, overlapping protection approaches addressing the people, technology, and operational aspects of information systems. Confidentiality - 5. A loss of __________ is the unauthorized disclosure of information Authenticity - 6. Verifying that users are who they say they are and that each input arriving at the system came from a trusted source is Moderate - 7. A _________ level breach of security could cause a significant degradation in mission capability to an extent and duration that the organization is able to perform its primary functions, but the effectiveness of the functions is significantly reduced. Security Attack - 8. A __________ is any action that compromises the security of information owned by an organization masquerade - 9. A __________ takes place when one entity pretends to be a different entity. Availability - A(n) __________ service is one that protects a system to ensure its availability and addresses the security concerns raised by denial- of- service attacks. Substitution - 1. Techniques map plaintext elements (characters, bits) into ciphertext elements. One Time Pad - 2. Joseph Mauborgne proposed an improvement to the Vernam cipher that uses a random key that is as long as the message so that the key does not need to be repeated. The key is used to encrypt and decrypt a single message and then is discarded. Each new message requires a new key of the same length as the new message. This scheme is known as a(n)
Written for
- Institution
- Cryptography and Network Security
- Course
- Cryptography and Network Security
Document information
- Uploaded on
- February 20, 2024
- Number of pages
- 8
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
cryptography and network security principles
Content preview
Also available in package deal