MATH 5111 Final Exam Questions and Answers- Northeastern University
7 vistas 0 compra
Grado
MATH 5111
Institución
MATH 5111
MATH 5111 Final Exam Questions and Answers- Northeastern University
Question 1
10 out of 10 points
A strength of asymmetric algorithms when compared to symmetric algorithms is key
management (sharing keys with others while maintaining secrecy).
Selected Answer: True
Answers: True
False
...
Question 1 10 out of 10 points
A strength of asymmetric algorithms when compared to symmetric algorithms is key management (sharing keys with others while maintaining secrecy).
Selected Answer: True
Answers: True
False Question 2 10 out of 10 points
A strength of symmetric algorithms is that they have multiple modes.
Selected Answer: True
Answers: True
False Question 3 10 out of 10 points
A weakness of symmetric algorithms is that they are slow and easy to break.
Selected Answer: False
Answers: True False
Question 4 10 out of 10 points
An encryption machine used by the Germans during WW2. Selected Answer:
Enigma
Answers: Enigma
Turing
Purple
Ultra
Question 5 10 out of 10 points
Asymmetric algorithms are sometimes used for digital signature apllications.
Selected Answer: True
Answers: True
False Question 6 10 out of 10 points
Block ciphers more closely emulate one-time pads.
Selected Answer: False
Answers: True False
Question 7 10 out of 10 points
Caesar cipher and the Vigenere cipher are examples of symmetric algorithms.
Selected Answer: True
Answers: True
False Question 8 10 out of 10 points
Cipher Block Chaining (CBC) uses an initialization vector (IV) to add security.
Selected Answer: True
Answers: True
False Question 9 10 out of 10 points
Electronic Code Book (ECB) works well with block cyphers.
Selected Answer: True
Answers: True
False Question 10 80 out of 80 points
Identify which encryption method each statement relates to.
Question Correct Match Selected Match
Visible or invisible markings embedded within a digital file to indicate copyright or other handling instructions.
G. Digital Watermarking
G. Digital Watermarking
Also known as Vernam ciphers. D. One-time Pads
D. One-time Pads
Disguises a message by rearranging the letters (or bits) in the message.
E. Transpositions Ciphers
E. Transpositions Ciphers
Polyalphabetic cipher that uses a keyword rather than a number as the key.
C. Vigenère Ciphers
C. Vigenère Ciphers
A phrase is converted to a simple value.
F. Codes
F. Codes
A simple substitution cipher that uses multiple alphabets rather than just one.
B. Polyalphabetic Ciphers
B. Polyalphabetic Ciphers
Takes one piece of information and hides it within another.
H. Steganography
H. Steganography
Uses the numerical value of letters
in the plaintext and is coded and decoded by using a copy of the A. A.
Los beneficios de comprar resúmenes en Stuvia estan en línea:
Garantiza la calidad de los comentarios
Compradores de Stuvia evaluaron más de 700.000 resúmenes. Así estas seguro que compras los mejores documentos!
Compra fácil y rápido
Puedes pagar rápidamente y en una vez con iDeal, tarjeta de crédito o con tu crédito de Stuvia. Sin tener que hacerte miembro.
Enfócate en lo más importante
Tus compañeros escriben los resúmenes. Por eso tienes la seguridad que tienes un resumen actual y confiable.
Así llegas a la conclusión rapidamente!
Preguntas frecuentes
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
100% de satisfacción garantizada: ¿Cómo funciona?
Nuestra garantía de satisfacción le asegura que siempre encontrará un documento de estudio a tu medida. Tu rellenas un formulario y nuestro equipo de atención al cliente se encarga del resto.
Who am I buying this summary from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller VEVA2K. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy this summary for 19,35 €. You're not tied to anything after your purchase.