Upload your study docs or become a
Course Hero member to access this document
Unformatted text preview: b. digest 12. Which of these is NOT a characteristic of a secure has algorithm? a. Collisions should be rare 13. Which protection is provided by hashing? c. integrity 14. Which of these is the strongest symmetric cryptographic algorithm? a. Advanced Encryption Standard 15. If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message? b. Alice's public key 16. A digital signature can provide each of the following benefits EXCEPT _____________. b. verify the receiver 17. Which asymmetric cryptographic algorithm is the most secure? c. RSA 18. Which asymmetric encryption algorithm uses prime numbers? c. RSA 19. The Trusted Platform Module (TPM) ____________. d. provides cryptographic services in hardware instead of software. 20. Which of these has an onboard key generator and key storage facility, as well as accelerated symmetric and asymmetric encryption, and can back up sensitive material in encrypted form? d. Hardware Security Module (HSM)...
View
Full Document