click below
click below
Normal Size Small Size show me how
IS Chpt 11
| Question | Answer |
|---|---|
| What is data called that is to be encrypted by inputting into an encryption algorithm? a) Plaintext b) Cleartext c) Opentext d) Ciphertext | a) Plaintext |
| Proving that a user sent an email message is known as __. a) repudiation b) integrity c) non-repudiation d) availability | a) repudiation |
| Symmetric cryptographic algorithms are also called __. a) private key cryptography b) cipherkey cryptography c) public/private key cryptography d) public key cryptography | a) private key cryptography |
| A(n) __ is not decrypted but is only used for comparison purposes. a) stream b) harh c) algorithm d) key | b) hash |
| Which of the following is a protection provided by hashing? a) Authenticity b) Confidentiality c) Integrity d) Availability | c) Integrity |
| If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, the key he uses to encrypt the message is __. a) Alice's private key b) Alice's public key c) Bob's public key d) Bob's private key | b) Alice's public key |