Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Kerckhoffs' Principle is: Question 2 options: 1) A cryptography algorithm must be assumed to be well-known. 2) The right-hand rule for electricity and magnetism. 3)

image text in transcribed

Kerckhoffs' Principle is:

Question 2 options:

1) A cryptography algorithm must be assumed to be well-known.
2) The right-hand rule for electricity and magnetism.
3) It is crucial to keep the algorithm secret from adversaries.
4) Encrypting should not increase the size of the message.

Save

Question 3 (5 points)

image text in transcribed

A stream cipher would be most appropriately used for:

Question 3 options:

1) Data that are divided into blocks of 64 bits.
2) A telephone conversation.
3) Relatively small messages.
4) Messages that must be confidential only for a few weeks.

Save

Question 4 (5 points)

image text in transcribed

Which encryption algorithm is most appropriate for checking whether a message has been altered?

Question 4 options:

1) public key cryptography.
2) cryptographic hash algorithms.
3) symmetric key cryptography.
4) hybrid cryptography.

Save

Question 5 (5 points)

image text in transcribed

Certificate pinning means

Question 5 options:

1) once a browser as seen a valid certificate for an entity, it will not accept another certificate without warning the user.
2) a user must manually install the certificate, and no other will be accepted.
3) the user must enter a personal identifying number to allow a certificate to be accepted.
4) the user must enter a personal identifying number each time the certificate is used.

Save

Question 6 (5 points)

image text in transcribed

Use of encryption is most appropriate

Question 6 options:

1) when the protections provided by the operating system cannot work.
2) any time there is confidential data.
3) for online database systems.
4) for data in storage.

Save

Question 7 (5 points)

image text in transcribed

The two critical properties of a cryptographic key are

Question 7 options:

1) it should be long and repeating.
2) It should be long and random.
3) it should be short and random
4) it should be long and follow a prescribed pattern.

Save

Question 8 (5 points)

image text in transcribed

One can break a Csar cipher with a key of one (one letter down in the alphabet) by inspection. What is the most appropriate approach for longer keys?

Question 8 options:

1) Letter frequency analysis.
2) translation from Latin to English.
3) Brute force.
4) An inverse character map.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions