Information Technology > QUESTIONS & ANSWERS > IT Security: Defense against the digital dark arts Week 2 Questions and Answers Already Passed (All)
IT Security: Defense against the digital dark arts Week 2 Questions and Answers Already Passed Plaintext is the original message, while _____ is the encrypted message. ✔✔Cyphertext The specifi... c function of converting plaintext into ciphertext is called a(n) ______. ✔✔x***** permutation Encryption algorithm Studying how often letters and pairs of letters occur in a language is referred to as _______. ✔✔frequency analysis True or false: The same plaintext encrypted using the same algorithm and same encryption key would result in different ciphertext outputs. ✔✔false The practice of hiding messages instead of encoding them is referred to as ______. ✔✔Steganography ROT13 and a Caesar cipher are examples of _______. ✔✔substitution cipher DES, RC4, and AES are examples of ______ encryption algorithms. ✔✔symmetric What are the two components of an asymmetric encryption system, necessary for encryption and decryption operations? Check all that apply. ✔✔Public Key and Private key To create a public key signature, you would use the ______ key. ✔✔******Private Using an asymmetric cryptosystem provides which of the following benefits? Check all that apply. ✔✔confidentiality, authenticity and If two different files result in the same hash, this is referred to as a ________. ✔✔hash collision When authenticating a user's password, the password supplied by the user is authenticated by comparing the ____ of the password with the one stored on the system. ✔✔***** ciphertext hash If a rainbow table is used instead of brute-forcing hashes, what is the resource trade-off? ✔✔Rainbow tables use less computational resources and more storage space In a PKI system, what entity is responsible for issuing, storing, and signing certificates? ✔✔Certificate Authority What are the components that make up a cryptosystem? Check all that apply ✔✔Encryption Algorithms and Decryption Algorithms What is steganography? ✔✔The practice of hiding messages What makes an encryption algorithm symmetric? ✔✔The same keys are used for encryption and decryption What's the difference between a stream cipher and a block cipher? ✔✔Stream ciphers encrypt data as a continuous stream, while block cipher operates on chunks of data. True or false: The smaller the encryption key is, the more secure the encrypted data is. ✔✔false How is hashing different from encryption? ✔✔Hashing Operations are one-directional What's a hash collision? ✔✔When two different files generate the same hash digest How is a Message Integrity Check (MIC) different from a Message Authentication Code (MAC)? ✔✔A MIC only hashes the message, while a MAC incorporates a secret key. How can you defend against brute-force password attacks? Check all that apply. ✔✔Incorporate salts into password hashing. Run password through the hashing function multiple times. Enforce the use of strong password. What information does a digital certificate contain? Check all that apply. ✔✔Public key data. Identifying information of the certificate owner. Digital Signature. Which type of encryption does SSL/TLS use? ✔✔Both asymmetric and symmetric What are some of the functions that a Trusted Platform Module can perform? Check all that apply. ✔✔Data Binding and sealing. Secure user authentication [Show More]
Last updated: 1 year ago
Preview 1 out of 3 pages
Instant download
Instant download
Connected school, study & course
About the document
Uploaded On
Oct 03, 2022
Number of pages
3
Written in
This document has been written for:
Uploaded
Oct 03, 2022
Downloads
0
Views
88
In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Browsegrades · High quality services·