Question: 1 4 . Which encryption algorithm is regarded as a stronger encryption algorithm? [ 1 ] 1 . Double DES 2 . Triple Des 3

14.Which encryption algorithm is regarded as a stronger encryption algorithm? [1]
1. Double DES
2. Triple Des
3. Advanced Encryption Standard (AES)
4. Asymmetric encryption
15. Consider an attack in which a programmer at a bank writes code that takes 1/10 of a cent off ten million client accounts and puts the money into his own account. What type of attack is this? [1]
1. Replay Attack
2. Lazy Attack
3. Salami Attack
4. None of the above
16. Nonrepudiation can be established using the following: [1]
1. password
2. username and password
3. username, password and hash
4. digital certificate
12....access to objects is defined based on privileges associated with groups, such as students, lecturers and exam department staff: [1]
1. Role-based access control
2. Procedures-oriented access control
3. Segmented
4. Capability
17. Consider the scenario in which Amy wishes to provide evidence via a digital signature that a
message she sends to Bob is in fact from her. Which key does Amy use to sign her message,
providing assurance that the message is from her? [1]
1. Amys Public Key
2. Amys Private Key
3. Bobs Private Key
4. Bobs Public Key

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!