100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CNT4406 Network Security And Cryptography Midterm/Final Exam – Questions & Answers CA$14.43   Add to cart

Exam (elaborations)

CNT4406 Network Security And Cryptography Midterm/Final Exam – Questions & Answers

 6 views  0 purchase

CNT4406 Network Security And Cryptography Midterm/Final Exam – Questions & Answers

Preview 2 out of 7  pages

  • January 22, 2024
  • 7
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
All documents for this subject (26)
avatar-seller
Studycafe
CNT4406 Network Security And Cryptography
Midterm/Final Exam – Questions & Answers

In the context of a PKI, a(n) ___________ authority operates under the trusted
collaboration of the certificate authority and can be delegated day-to-day
certification functions, such as verifying information about new registrants,
generating end-user keys, revoking certificates, and validating that users
possess a valid certificate. ✔️Ans - registration

The CA periodically distributes a(n) ___________ to all users that identifies all
revoked certificates. ✔️Ans - CRL

A(n) ___________ or cryptosystem is an encryption method or process
encompassing the algorithm, key(s) or cryptovariable(s), and procedures
used to perform encryption and decryption. ✔️Ans - cipher

A ______________ is the information used in conjunction with an algorithm to
create the ciphertext from the plaintext or derive the plaintext from the
ciphertext. ✔️Ans - key

_____________ is the process of converting an original message into a form
that is unreadable to unauthorized individuals. ✔️Ans - Encryption

The process of obtaining the plaintext message from a ciphertext message
without knowing the keys used to perform the encryption is called
______________. ✔️Ans - cryptanalysis

A method of encryption that requires the same secret key to encipher and
decipher the message is known as ___________ encryption. ✔️Ans -
symmetric

_____________ is the entire range of values that can possibly be used to
construct an individual key. ✔️Ans - Keyspace

The ________________ cipher simply rearranges the values within a block to
create the ciphertext. ✔️Ans - transposition/permutation

, What is Diffe-Hellman most commonly used for? ✔️Ans - Symmetric
encryption key exchange

What element in the CIA triad ensures that the data sent is the same data
received? ✔️Ans - Integrity

An X.509 v3 certificate binds a __________, which uniquely identifies a
certificate entity, to a user's public key. ✔️Ans - distinguished name

How many keys exist in a public/private key pair? ✔️Ans - 2

The Secure _____________ Standard issued by the National Institute of
Standards and Technology specifies secure algorithms, such as SHA-1, for
computing a condensed representation of a message or data file. ✔️Ans -
Hash

The ___________ algorithm, developed in 1977, was the first public-key
encryption algorithm published for commercial use. ✔️Ans - RSA

At the World Championships in Athletics in Helsinki in August 2005, a virus
called Cabir infected dozens of ____________, the first time this occurred in a
public setting. ✔️Ans - Bluetooth mobile phones

Netscape developed the ____________________ Layer protocol to use public key
encryption to secure a channel over the public Internet, thus enabling
secure communications. ✔️Ans - Secure Socket

Digital ____________________ are encrypted messages that can be
mathematically proven to be authentic. ✔️Ans - signatures

The successor to 3DES is the ____________________ Encryption Standard.
✔️Ans - Advanced

_________________ is a protocol that can be used to secure communications
across any IP-based network such as LANs, WANs, and the Internet.
✔️Ans - IPSec

_____________ was developed by Phil Zimmerman and uses the IDEA cipher
for message encoding. ✔️Ans - PGP

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Studycafe. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for CA$14.43. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75323 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
CA$14.43
  • (0)
  Add to cart