100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CIS 333 Week 2 Quiz|Questions and Answers|2025 Update|100% Correct. $15.49
Add to cart

Exam (elaborations)

CIS 333 Week 2 Quiz|Questions and Answers|2025 Update|100% Correct.

 0 purchase

CIS 333 Week 2 Quiz|Questions and Answers|2025 Update|100% Correct.

Preview 3 out of 18  pages

  • March 25, 2025
  • 18
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
All documents for this subject (13)
avatar-seller
Wiseman
Week 2 Quiz
Which of the following terms means a cryptography mechanism that hides secret communications within various forms of data?

- @ Steganography

) Cryptanalysis

) Ciphertext

) Algorithm




Which of the following algorithms are used in asymmetric encryption? (Select two.)

> RSA

. | Twofish

- | Diffie-Hellman

AES

. | Blowfish

b o


Mary wants to send a message to Sam in such a way that only Sam can read it.

Which key should be used to encrypt the message?

@ Mary's private key

() Mary's public key

() Sam's private key

— () Sam's public key

FPumlawmwadiawm



Above all else, what must be protected to maintain the security and benefit of an asymmetric cryptographic solution, especially if it is widely used for
digital certificates?

- () Private keys

@ Cryptographic algorithm

) Public keys

) Hash values

, Which of the following algorithms are used in symmetric encryption? (Select two.)

[] Ecc

Diffie-Hellman

->[] DES
RSA
->[] Blowfish


Which of the following encryption mechanisms offers the least security because of weak keys?

(O TwoFish

-> @ DES

() IDEA

() AES



There are several block cipher modes of operation that can be utilized depending on the application or use.

Which of the following block cipher modes of operation uses a nonce combined with a counter that is encrypted?

@ Cipher Block Chaining (CBC)

) Cipher Feedback Mode (CFB)

) Electronic Code Book (ECB)

- () Counter Mode (CTR)

bo

Which of the following types of encryption is specifically designed to allow data to be worked on without decrypting it first?

() Stream cipher

- @ Homomorphic encryption

Block cipher

Lightweight cryptography

, Step 1



~ User1 requests a transaction with User2.



Step 2



Fhe-blockisdistributed-t Yo P peerfetworkc The transaction is represented online
as a block.




Fhetransaction-isrepresented-ontine-asablock: The block is distributed to everyone on a peer-to-peer network.



Step 4



Fhebleckisaddedto-thechain: The network users verify the transaction is valid.



Step 5




Fhe-transaction-isrepresented-ontine-asableck: The block is distributed to everyone on a peer-to-peer network.



Step 4



Fhe-btockisadded-tothechain The network users verify the transaction is valid.



Step 5



Fhenetworkusers-verify-the-transaction-is-vatie: The block is added to the chain.



Step 6



~ The contents of the transaction move to User2.




Which of the following cryptographic attacks uses SSL exploitation as a common implementation of this attack?

Birthday attack

- () Downgrade attack

@ Dictionary attack

Collision attack

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Wiseman. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $15.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

69484 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 15 years now

Start selling
$15.49
  • (0)
Add to cart
Added