100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

Security - Roger - Chapter 7 Exam Questions With All Correct Detailed Answers 2025 New Update

Puntuación
-
Vendido
-
Páginas
3
Grado
A+
Subido en
26-05-2025
Escrito en
2024/2025

Security - Roger - Chapter 7 Exam Questions With All Correct Detailed Answers 2025 New Update What is a cipher that does not replace letters but simply rearranges them? - Answer - Transposition Cipher What cipher substitutes one letter for an other? - Answer - Substitution Cipher What is the term for the practice and study of determining the meaning of encrypted information? - Answer - Cryptanalysis What method is used by attackers that tries every possible key knowing that eventually one of them will work? - Answer - Brute-Force What method is used by attackers when they have access to the ciphertext and of several messages and knows nothing about the plaintext? - Answer - Ciphertext What method is used by attackers when they have access to the ciphertext and of several messages and knows something about the plaintext? - Answer - Known-Plaintext What method is used by attackers who chooses which data the encryption device encrypts and observes the cipher out put? - Answer - Chosen-Plaintext What method is used by attackers who chooses different ciphertext to be decrypted and has access to the decrypted data? - Answer - Chosen-Ciphertext What method is used by attacker who knows a portion of the plaintext and the corresponding ciphertext? - Answer - Meet-in-the-Middle What is the term for the development and use of codes? - Answer - Cryptography A customer purchases an item from an e-commerce site. The e-commerce site must maintain proof that the data exchange took place between the site and the customer. Which feature of digital signatures is required? - Answer - non-repudiation of the transaction Which requirement of secure communications is ensured by the implementation of MD5 or SHA hash generating algorithms? - Answer - integrity The following message was encrypted using a Caesar cipher with a key of 2: fghgpf vjg ecuvng What is the plaintext message? - Answer - defend the castle What is the service framework that is needed to support large-scale public key-based technologies? - Answer - PKI What is a difference between symmetric and asymmetric encryption algorithms? - Answer - Symmetric encryption algorithms use pre-shared keys. Asymmetric encryption algorithms use different keys to encrypt and decrypt data What is the reason for HMAC to use an additional secret key as input to the hash function? - Answer - to provide authentication Which type of attack does the use of HMACs protect against? - Answer - MITM A network administrator is forced to use DES on aging equipment. What is one thing the administrator should do in this situation? - Answer - Implement CBC mode. The SHA-224, SHA-256, SHA-384, and SHA-512 hash functions are known collectively as ____________ algorithms. - Answer - SHA-2 If an asymmetric algorithm uses a public key to encrypt data, what is used to decrypt it? - Answer - private key What is the purpose of the DH algorithm? - Answer - to generate a shared secret between two hosts that have not communicated before Which encryption algorithm is an asymmetric algorithm? - Answer - DH Which statement describes asymmetric encryption algorithms? - Answer - They are relatively slow because they are based on difficult computational algorithms. Why is asymmetric algorithm key management simpler than symmetric algorithm key management? - Answer - One of the keys can be made public. What is the most common use of the Diffie-Helman algorithm in communications security? - Answer - to secure the exchange of keys used to encrypt data

Mostrar más Leer menos
Institución
Security - Roger - Chapter 7
Grado
Security - Roger - Chapter 7








Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Security - Roger - Chapter 7
Grado
Security - Roger - Chapter 7

Información del documento

Subido en
26 de mayo de 2025
Número de páginas
3
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

Security - Roger - Chapter 7 Exam
Questions With All Correct Detailed
Answers 2025 New Update
What is a cipher that does not replace letters but simply rearranges them? - Answer - ✔
Transposition Cipher

What cipher substitutes one letter for an other? - Answer - ✔ Substitution Cipher

What is the term for the practice and study of determining the meaning of encrypted
information? - Answer - ✔ Cryptanalysis

What method is used by attackers that tries every possible key knowing that eventually
one of them will work? - Answer - ✔ Brute-Force

What method is used by attackers when they have access to the ciphertext and of
several messages and knows nothing about the plaintext? - Answer - ✔ Ciphertext

What method is used by attackers when they have access to the ciphertext and of
several messages and knows something about the plaintext? - Answer - ✔ Known-
Plaintext

What method is used by attackers who chooses which data the encryption device
encrypts and observes the cipher out put? - Answer - ✔ Chosen-Plaintext

What method is used by attackers who chooses different ciphertext to be decrypted and
has access to the decrypted data? - Answer - ✔ Chosen-Ciphertext

What method is used by attacker who knows a portion of the plaintext and the
corresponding ciphertext? - Answer - ✔ Meet-in-the-Middle

What is the term for the development and use of codes? - Answer - ✔ Cryptography

A customer purchases an item from an e-commerce site. The e-commerce site must
maintain proof that the data exchange took place between the site and the customer.
Which feature of digital signatures is required? - Answer - ✔ non-repudiation of the
transaction

Which requirement of secure communications is ensured by the implementation of MD5
or SHA hash generating algorithms? - Answer - ✔ integrity

The following message was encrypted using a Caesar cipher with a key of 2:
$9.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
BrightByte john hopkins university
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
46
Miembro desde
1 año
Número de seguidores
10
Documentos
3060
Última venta
1 semana hace
BrightByte

BrightByte | Your #1 Source for Top-Tier Study Resources Struggling to keep up with your studies? Need high-quality notes to boost your grades? You’re in the right place! I’m BrightByte, a passionate and experienced study resource creator, dedicated to providing students with clear, concise, and exam-focused materials that make learning efficient and stress-free. Whether you’re prepping for an exam, revising key concepts, or just looking for well-structured study guides, my materials have got you covered! What You’ll Find Here: Premium Summaries – Well-organized, straight-to-the-point, and packed with essential information Exam-Focused Notes – Covering everything you need to know for top marks Lecture Notes & Study Guides – Comprehensive yet easy to digest Reliable & Well-Researched Content – Based on textbooks, lectures, and expert insights Subjects Covered: [List your key subjects, e.g., Business, Psychology, Law, Medicine, Engineering, etc.] Why waste hours filtering through irrelevant information? My notes help you study smarter, not harder. Explore my study materials now and take your academic success to the next level!

Lee mas Leer menos
3.0

3 reseñas

5
1
4
0
3
1
2
0
1
1

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes