Which combination of cryptographic algorithms is used to create digital
signatures based on the U.S. Digital Signature Standards?
A SHA-2 and AES
B SHA-1 and AES
C AES and RSA
D SHA-2 and RSA
D
proving where a message came from
proof of origin
the concept of removing the ability of a person to deny sending a message
non-repudiation
the infrastructure that enables the usage of certificates to identify entities
public-key infrastructure (PKI)
Cryptography provides various security benefits. Which cryptographic benefit is
used in e-commerce to provide proof that a customer cannot deny being the
source of a transaction?
A Proof of origin
B Confidentiality
,C Integrity
D Non-repudiation
D
A developer wants to send a message to a system administrator over the internet,
so the developer uses the system administrator's publicly known key to send the
message. The system administrator is able to decrypt the message using a unique
private key. Which encryption method are the developer and system
administrator using to communicate the message?
A Stream encryption
B Asymmetric encryption
C Block encryption
D Symmetric encryption
B
A developer wants to send a system administrator an encrypted message but is
concerned that an intruder might copy the encrypted message and play back the
ciphertext to decode the original message. How can the developer make sure that
the ciphertext does not give the original plaintext if played back?
A Use shift row transformation
B Use electronic code book
C Use RC5 cipher
D Add salt with an initialization vector
D
,Which method of encryption uses a polyalphabetic substitution cipher to encrypt
a plaintext message?
A Vigenère cipher
B BIFID cipher
C Pigpen cipher
D Caesar cipher
A
Which two pioneers are called the fathers of asymmetric cryptography used in
PKI?
A Sir Francis Bacon and Alan Turin
B Will Friedman and Ron Rivest
C Whitfield Diffie and Martin Hellman
D Thomas Jefferson and Blaise de Vigenère
C
Which cryptographic cipher is stream-based?
A RC2
B RC5
C RC6
D RC4
, D
What type of encryption uses different keys to encrypt and decrypt the message?
A Symmetric
B Private key
C Secure
D Asymmetric
D
The most widely used asymmetric encryption algorithm is what?
A RSA
B Vigenere
C DES
D Caesar Cipher
A
Original, unencrypted information is referred to as ____.
A text
B plaintext
C cleantext
D ciphertext
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Teacher101. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $14.49. You're not tied to anything after your purchase.