See chapter 5 raid is an acronym for redundant array

Info icon This preview shows pages 11–13. Sign up to view the full content.

View Full Document Right Arrow Icon
See Chapter 5. RAID is an acronym for Redundant Array of Independent Disks. 91 The process of breaking the key and/or plaintext from an enciphered message is known as A. Decryption B. Steganography C. Cryptanalysis D. Extraction Answer: C See Chapter 7. Cryptanalysis is the process of getting the key and/or the original message the hard way. 92 The method of encryption in which both sender and recipient possess a common encryption key is known as See Chapter 7. Secret key cryptography is used when all parties possess a common key. 93 Why would a user’s public encryption key be widely distributed? See Chapter 7. In public key cryptography, the value of the public key doesn’t in any way betray the value of the secret key. 94 Reading down the columns of a message that has been written across is known as
Image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
See Chapter 7. In this cipher, the cryptographer writes across but reads down. 95 An asymmetric cryptosystem is also known as a A. Message digest B. Hash function C. Public key cryptosystem D. Secret key cryptosystem Answer: C See Chapter 7. Asymmetric cryptosystems are also known as public key cryptosystems. 96 The process of hiding a message inside a larger dataset is known as See Chapter 7. Steganography is the science of inserting messages into larger datasets so that the existence of the message is not easily detected. 97 Steganography isn't easily noticed because See Chapter 7. Steganography is difficult to detect visually in an image. 98 What historic event was the backdrop for breakthroughs in strategic cryptography? See Chapter 7. World War II saw significant advancements in the science of cryptography. World War II became a war of cryptanalysis, wherein each participant was sometimes able to break the code of the others, resulting in strategic advantage.
Image of page 12
99 Non-repudiation refers to A. The technology that shoots down the “I didn’t send that message” excuse B. Re-verification of all Certification Authority (CA) certificate servers C. The annual competency review of system and network authentication mechanisms D. The annual competency review of system and network authorization mechanisms Answer: A See Chapter 7. Non-repudiation helps to prove that a specific individual did create or sign a document, or transmit data to or receive data from another individual. 100 The amount of effort required to break a given ciphertext is known as the See Chapter 7. Work function is the term used to describe the amount of time and/or money required to break a ciphertext.
Image of page 13
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern