Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Can one be compelled by law enforcement to reveal a cryptographic key or the password to unlock such a key. Question 9 options: 1) Yes;

Can one be compelled by law enforcement to reveal a cryptographic key or the password to unlock such a key.

Question 9 options:

1) Yes; you could be jailed for contempt of court if you refuse.
2) No; you have a Fifth Amendment right not to incriminate yourself.
3) Maybe; Federal courts in different circuits have ruled differently under different circumstances.
4) Maybe, but only if there is other evidence against you.

Save

Question 10 (5 points)

image text in transcribed

A digital certificate makes a public key tamper-resistant because

Question 10 options:

1) the certificate authority is a trusted third party.
2) the entire certificate is encrypted.
3) the digital signature will not validate if the certificate is changed.
4) the certificate is signed by the owner of the public key.

Save

Question 11 (5 points)

image text in transcribed

Which of the following best describes the key exchange problem?

Question 11 options:

1) Evil Eve wants to exchange her key for Bill's in a key repository.
2) Alice wants to give a symmetric key to Barbara in a secure manner.
3) A wireless communication system is designed to use a new key every few seconds.
4) Charlie and David want to use each other's keys.

Save

Question 12 (5 points)

image text in transcribed

You are working on a project that deals with confidential data which requires encryption. A colleague tells you he has developed a new, unbreakable encryption algorithm. How should you respond?

Question 12 options:

1) Great! We will have a secret algorithm as well as a secret key.
2) We should use a published and time-tested algorithm.
3) Will you license your new algorithm to the company? We need to be sure of the rights.
4) Can your algorithm be implemented in Java, the language of the project?

Save

Question 13 (5 points)

image text in transcribed

Which encryption algorithm is most appropriate for data in storage?

Question 13 options:

1) public key cryptography.
2) cryptographic hash algorithms.
3) symmetric key cryptography.
4) hybrid cryptography.

Save

Question 14 (5 points)

image text in transcribed

The advanced encryption standard (AES) is

Question 14 options:

1) required for use by banks and the Federal government.
2) an absolutely secure algorithm.
3) far too weak to be used.
4) the latest encryption standard from NIST.

Save

Question 15 (5 points)

image text in transcribed

Which encryption algorithm is most appropriate for on line electronic commerce?

Question 15 options:

1) public key cryptography.
2) cryptographic hash algorithms.
3) symmetric key cryptography.
4) hybrid cryptography.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Rules In Database Systems Third International Workshop Rids 97 Sk Vde Sweden June 26 28 1997 Proceedings Lncs 1312

Authors: Andreas Geppert ,Mikael Berndtsson

1997th Edition

3540635165, 978-3540635161

More Books

Students also viewed these Databases questions

Question

Azure Analytics is a suite made up of which three tools?

Answered: 1 week ago

Question

e. What difficulties did they encounter?

Answered: 1 week ago