100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Cryptography And Network Security – Questions With Complete Solutions $9.99   Add to cart

Exam (elaborations)

Cryptography And Network Security – Questions With Complete Solutions

 2 views  0 purchase
  • Course
  • Institution

Cryptography And Network Security – Questions With Complete Solutions

Preview 2 out of 5  pages

  • January 22, 2024
  • 5
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
avatar-seller
Cryptography And Network Security – Questions With
Complete Solutions

2 basic functions used in encryption algorithms? ✔️Ans - substitution
transposition

access control ✔️Ans - prevention of unauthorized use of resources.

accountability ✔️Ans - security goal that generates the requirements
for actions of an entity to be traced uniquely to that entity (to trace securiy
attack to a responsible party)

active attacks ✔️Ans - modification of data stream or creation of false
stream and is divided into Masquerad, Reply, Modification of messages,
Denial of service

Attacks Types (not active and passive) ✔️Ans - cryptanalysis
brute-force attack

authentication ✔️Ans - the assurance that the communicating entity is
the one that it claims to be

authentication protocols ✔️Ans - uses cryptographic algorithms to
authenticate the idnetity of entities (sender and receiver)

authenticity ✔️Ans - the ability of being verified and trusted source.

autokey vigenere cipher ✔️Ans - write the key then the same plaintext
along the plaintext then do the equation (p+k)mod26 and - for decryption

availability ✔️Ans - assures that systems work promptly and services
are not denied.

CIA triad ✔️Ans - confidentiality, integrity and availabilty

Computer security ✔️Ans - is the protection provided (afforded) to
automated info. systems to achive (attain) the aplicable objectives of
preserving the integrity, availabily and confidentiality of system resources.

, confidentiality ✔️Ans - protection of data from an unathuraized
disclosure.

connection confidentiality ✔️Ans - protection of user data on a
connection

connection integrity with recovery ✔️Ans - provide integriy to user
data on a connection, and detects and modification.., with recovery
attempted.

connection integrity without recovery ✔️Ans - provide integrity to user
data on a connection, and detects modification, without providing recovery.

connectionless confidentialiy ✔️Ans - protection of user data in a
single data block

connectionless integrity ✔️Ans - integrity of a single data block, and
detects for data modification.

cryptanalysis ✔️Ans - is based on the cryptanalyst known info. about
the pt/ct/ algorithms used or key.

cryptography systems depends on 3 things: ✔️Ans - 1. type of
operation used for encryption.
2. no. of keys used.
3. plaintext processing method

Data Encryption Standard ✔️Ans - encryption algorithm that exihbits
the feistel structure. uses 64bit block and 56bit key.

data-origin authentication ✔️Ans - in connection transfer
(connectionless) provides the confidence that the source of data arrived is
as claimed

Denial of service ✔️Ans - preventing the normal use of communicaton
facilities. by doing: suppressing all messages that is sent to server, or
diabling the network of server, or by overloading it with messages.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Studycafe. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $9.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

77333 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$9.99
  • (0)
  Add to cart