general business data bank

Question # 00003390 Posted By: spqr Updated on: 11/11/2013 12:23 AM Due on: 11/30/2013
Subject Business Topic General Business Tutorials:
Question
Dot Image

1.

_______________ is done by comparing the input plaintext to the output ciphertext to try

to determine the key used to encrypt the information.

Correct Answer(s): Differential cryptanalysis

2.

The art of secret writing that enables an individual to hide the contents of a message from

all but the intended recipient is called

A) Key management

B) Steganography

C) Cryptanalysis

D) Cryptography

3.

PKI can be used as a measure to trust individuals we do not know.

A) True

B) False

4.

Keyspace refers to

A) All possible key values

B) The number of keys needed to encrypt or decrypt a message

C) The location where keys are stored

D) The portion of the algorithm that the key connects with to encrypt or decrypt a

message

5.

The benefit of SHA-1 over MD5 is that it is resistant to a collision attack.

A) True

B) False

6.

All of the following are asymmetric encryption algorithms EXCEPT:

A) ECC

B) RSA

C) 3DES

D) ElGamal

7.

The process for protecting intellectual property from unauthorized used is called

A) Digital signatures

B) Digital rights management

C) Key escrow

D) Anti-pirating management

8.

What is a certificate authority?

A) An entity that generates electronic credentials

B) An entity that requires proof of identity from the individual requesting a

certificate

C) A centralized directory in which the registered certificate is stored

D) An entity that generates a digitally signed identification certificate

9.

Hiding a text file in a jpg file is an example of steganography.

A) True

B) False

10.

The encryption method based on the idea of using a shared key for encryption and

decryption of data is

A) Symmetric encryption

B) Elliptical curve encryption

C) Hashing function

D) Asymmetric encryption

11.

The term used to describe a centralized directory that can be accessed by a subset of

individuals is _______________

Correct Answer(s): certificate repository

12.

The cipher that replaces each letter of the alphabet with a different letter (not in

sequence) is a

A) Substitution cipher

B) Vigenère cipher

C) Shift cipher

D) Transposition cipher

13.

All of the following are cryptographic applications EXCEPT:

A) FreeOTFE

B) PGP

C) StegDetect

D) GnuPG

14.

How is an outsourced CA different from a public CA?

A) It provides dedicated services, and possibly equipment, to an individual

company.

B) The CA is implemented, maintained, and controlled by the company that

implemented it.

C) The CA is already established and being used by many individuals and

companies.

D) The CA provides more flexibility for companies.

15.

The difference between centralized and decentralized infrastructures is

A) In a decentralized infrastructure, the certificate may have an extended lifetime.

B) The network administrator sets up the distribution points in centralized

infrastructures.

C) The location where the cryptographic key is generated and stored is different.

D) The key pairs and certificates do not have a set lifetime in centralized

infrastructures.

Dot Image
Tutorials for this Question
  1. Tutorial # 00003200 Posted By: spqr Posted on: 11/11/2013 12:37 AM
    Puchased By: 2
    Tutorial Preview
    The solution of general business data bank...
    Attachments
    253.docx (12.97 KB)
  2. Tutorial # 00003203 Posted By: spqr Posted on: 11/11/2013 12:42 AM
    Puchased By: 2
    Tutorial Preview
    The solution of general business data bank...
    Attachments
    255.docx (12.97 KB)

Great! We have found the solution of this question!

Whatsapp Lisa