Information Technology > QUESTIONS & ANSWERS > IT Security: Defense against the digital dark arts Week 2 Questions and Answers Already Passed (All)

IT Security: Defense against the digital dark arts Week 2 Questions and Answers Already Passed

Document Content and Description Below

IT Security: Defense against the digital dark arts Week 2 Questions and Answers Already Passed Plaintext is the original message, while _____ is the encrypted message. ✔✔Cyphertext The specifi... c function of converting plaintext into ciphertext is called a(n) ______. ✔✔x***** permutation Encryption algorithm Studying how often letters and pairs of letters occur in a language is referred to as _______. ✔✔frequency analysis True or false: The same plaintext encrypted using the same algorithm and same encryption key would result in different ciphertext outputs. ✔✔false The practice of hiding messages instead of encoding them is referred to as ______. ✔✔Steganography ROT13 and a Caesar cipher are examples of _______. ✔✔substitution cipher DES, RC4, and AES are examples of ______ encryption algorithms. ✔✔symmetric What are the two components of an asymmetric encryption system, necessary for encryption and decryption operations? Check all that apply. ✔✔Public Key and Private key To create a public key signature, you would use the ______ key. ✔✔******Private Using an asymmetric cryptosystem provides which of the following benefits? Check all that apply. ✔✔confidentiality, authenticity and If two different files result in the same hash, this is referred to as a ________. ✔✔hash collision When authenticating a user's password, the password supplied by the user is authenticated by comparing the ____ of the password with the one stored on the system. ✔✔***** ciphertext hash If a rainbow table is used instead of brute-forcing hashes, what is the resource trade-off? ✔✔Rainbow tables use less computational resources and more storage space In a PKI system, what entity is responsible for issuing, storing, and signing certificates? ✔✔Certificate Authority What are the components that make up a cryptosystem? Check all that apply ✔✔Encryption Algorithms and Decryption Algorithms What is steganography? ✔✔The practice of hiding messages What makes an encryption algorithm symmetric? ✔✔The same keys are used for encryption and decryption What's the difference between a stream cipher and a block cipher? ✔✔Stream ciphers encrypt data as a continuous stream, while block cipher operates on chunks of data. True or false: The smaller the encryption key is, the more secure the encrypted data is. ✔✔false How is hashing different from encryption? ✔✔Hashing Operations are one-directional What's a hash collision? ✔✔When two different files generate the same hash digest How is a Message Integrity Check (MIC) different from a Message Authentication Code (MAC)? ✔✔A MIC only hashes the message, while a MAC incorporates a secret key. How can you defend against brute-force password attacks? Check all that apply. ✔✔Incorporate salts into password hashing. Run password through the hashing function multiple times. Enforce the use of strong password. What information does a digital certificate contain? Check all that apply. ✔✔Public key data. Identifying information of the certificate owner. Digital Signature. Which type of encryption does SSL/TLS use? ✔✔Both asymmetric and symmetric What are some of the functions that a Trusted Platform Module can perform? Check all that apply. ✔✔Data Binding and sealing. Secure user authentication [Show More]

Last updated: 1 year ago

Preview 1 out of 3 pages

Add to cart

Instant download

Reviews( 0 )

$7.00

Add to cart

Instant download

Can't find what you want? Try our AI powered Search

OR

REQUEST DOCUMENT
88
0

Document information


Connected school, study & course


About the document


Uploaded On

Oct 03, 2022

Number of pages

3

Written in

Seller


seller-icon
Nutmegs

Member since 2 years

574 Documents Sold


Additional information

This document has been written for:

Uploaded

Oct 03, 2022

Downloads

 0

Views

 88

Document Keyword Tags

What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·