Course Hero Logo

Chapter 5 Review Questions.rtf - Chapter 5 Review Question...

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 1 out of 1 page.

Chapter 5 Review Question1.The Hashed Message Authentication Code (HMAC) __________.
2.What is the latest version of the Secure Hash Algorithm?
3.All of the following can be broken mathematically EXCEPT______.
4.Elliptic Curve Diffie-Hellman (ECDH) is an example of ______________.
5.Which of the following key exchanges uses the same keys each time?
6.Public key systems that generate random public keys that are different for each session are called____.
7.What is data called that is to be encrypted by inputting it into a cryptographic algorithm?
8.Which of these is NOT a basic security protection for information that cryptography can provide?
9.The areas of a file in which steganography can hide data include all of the followingEXCEPT_________.
10.Proving that a user sent an email message is known as ______________.
11.A(n) ______________ is not decrypted but is only used for comparison purposes.
End of preview. Want to read the entire page?

Upload your study docs or become a

Course Hero member to access this document

Term
Spring
Professor
JI

Unformatted text preview: b. digest 12. Which of these is NOT a characteristic of a secure has algorithm? a. Collisions should be rare 13. Which protection is provided by hashing? c. integrity 14. Which of these is the strongest symmetric cryptographic algorithm? a. Advanced Encryption Standard 15. If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message? b. Alice's public key 16. A digital signature can provide each of the following benefits EXCEPT _____________. b. verify the receiver 17. Which asymmetric cryptographic algorithm is the most secure? c. RSA 18. Which asymmetric encryption algorithm uses prime numbers? c. RSA 19. The Trusted Platform Module (TPM) ____________. d. provides cryptographic services in hardware instead of software. 20. Which of these has an onboard key generator and key storage facility, as well as accelerated symmetric and asymmetric encryption, and can back up sensitive material in encrypted form? d. Hardware Security Module (HSM)...
View Full Document

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture