AP Computer Science Principles Final Exam (Fall ) Answered
Which of the following most accurately describes Moore's Law: A. Moore's Law describes a relationship of boolean logic statements involving AND and OR B. Moore's Law is the principle that one should assume that any traffic on the Internet is insecure C. Moore's Law is the observation that computing power tends to double every two years D. Moore's Law explains why cracking modern cryptography is a "computationally hard" problem - ANSWER-C Fill in the blank of the following statement: "______ encryption is a method of encryption involving one key for both encryption and decryption." A. Symmetric B. Asymmetric C. Public key D. SSL - ANSWER-A A coffee shop is considering accepting orders and payments through their phone app and have decided to use public key encryption to encrypt their customers' credit card information. Is this a secure form of payment? A. No, public key encryption allows the credit card information to be read by the public. B. No, the internet protocols are open standards and thus everything sent over the internet is sent "in the clear". C. Yes, public key encryption is built upon computationally hard problems that even powerful computers cannot easily solve. D. Yes, public key encryption is secure because it transmits credit card information in binary. - ANSWER-C Pick the two expressions involving the Modulo operation that compute to the exact same value (choose 2) A. 9 MOD 8 B. 1 MOD 16 C. 52 MOD 32 This study source was downloaded by from CourseH on :01:46 GMT -06:00 D. 9 MOD 64 - ANSWER-A & B Which of the following statements best describes the properties of public key
Geschreven voor
- Instelling
- University Of Phoenix
- Vak
- CIS CYBER SECU
Documentinformatie
- Geüpload op
- 15 februari 2023
- Aantal pagina's
- 8
- Geschreven in
- 2022/2023
- Type
- Tentamen (uitwerkingen)
- Bevat
- Vragen en antwoorden
Onderwerpen
-
cis cyber secu
Ook beschikbaar in voordeelbundel