____72.An X.509 v3 certificate binds a(n) _____, which uniquely identifies a certificate entity, to a user’s public key.a.message digestc.distinguished nameb.fingerprintd.digital signature
____73.The ____ is responsible for the fragmentation, compression, encryption, and attachment of an SSL header to the cleartext prior to transmission.
____74.____ was developed by Phil Zimmermann and uses the IDEA Cipher for message encoding.
75.____ is an open source protocol to secure communications across any IP-based network such as LANs, WANs, and the Internet.
SET____76.Digital signatures should be created using processes and products that are based on the ____.a.DSSc.SSLb.NISTd.HTTPS
____77.The ____ protocol provides system to system authentication and data integrity verification, but does not provide secrecy for the content of a network communication.
____78.____ is a hybrid cryptosystem originally designed in 1991 by Phil Zimmermann.
____79.____ attacks are a collection of brute-force methods that attempt to deduce statistical relationships between the structure of the unknown key and the ciphertext that is the output of the cryptosystem.
____80.In a(n) ____ attack, the attacker eavesdrops during the victim’s session and uses statistical analysis of the user’s typing patterns and inter-keystroke timings to discern sensitive session information.a.replayc.correlationb.timingd.dictionary
CompletionComplete each statement.81.The science of encryption is known as ____________________.82.____________________ is the process of making and using codes to secure the transmission of information.83.____________________ or cryptosystem is an encryption method or process encompassing the algorithm, key(s) or cryptovariable(s), and procedures used to perform encryption and decryption.84.To ____________________ means to encrypt or convert plaintext into the equivalent ciphertext.