Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Question 16 https is... Not yet answered Select one: Marked out of 1 a. ... a secure web-protocol in Internet ensuring both the confidentiality and

image text in transcribedimage text in transcribedimage text in transcribed

Question 16 https is... Not yet answered Select one: Marked out of 1 a. ... a secure web-protocol in Internet ensuring both the confidentiality and integrity of transferred data b. ... a secure web-protocol in Internet ensuring only the confidentiality of transferred data c. ...a special case of an ordinary web-protocol when the webpage is equipped with a qualified e-signature d. ... a secure web-protocol in Internet ensuring only the integrity of transferred data e. an ordinary, non-secure web-protocol in Internet Question 17 Keylenght of RSA algorithm... Not yet answered Select one: Marked out of 1 a. ... may vary and may have an arbitrary length - as the longer key, as higher security we receive b. is 128 bits c. is 2048 bits d. is 256 bits e. is 1024 bits Question 18 Accountability is... Not yet answered Select one: Marked out 1 a. ... an effective breaking method of a symmetric cryptoalgorithm which uses a spreading and changing of special pattern blocks through different rounds of algorithm b. ... a special method for the effective discovering the source of DDOS (distributed denial of service attack) in Internet (TCP/IP-based networks) c. an expansion of the integrity concept for a dynamic databases case, when it is necessary to receive all history of the certain object, i.e. the history with all previous creators and changers of the mentioned object with the changing times d. ... a part of social engineering which is usually used by hackers in these cases when the implemented set of (info)technical vulnerabilities do not permit for hackers to perform a successful technical attack e. ... the same thing as verifiability of a (legal) digital signature for the case of using OSCP- approvals

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Technology And Management Computers And Information Processing Systems For Business

Authors: Robert C. Goldstein

1st Edition

0471887374, 978-0471887379

More Books

Students also viewed these Databases questions