Question: 1.Which of these is NOT true? Compression before encryption a. reduces the size of the encrypted data b. can be exploited in some cases to

1.Which of these is NOT true? Compression before encryption

a. reduces the size of the encrypted data

b. can be exploited in some cases to reveal parts of the plaintext

c. is the recommended way to use compression and encryption together

d. makes it more difficult to perform the encryption due to reduced redundancy

2. If a hash function has the second preimage resistance feature, it is a one-way hash function

Select one:

True

False

3. Pretty Good Privacy can be used to encrypt messages, authenticate messages, or both at the same time.

Select one: True False

4. Which of the following is true?

a. Complexity of software is measured best by lines of code

b. Security issues resulting from complexity of software are still prevalent in modern software development

c. C++ has in-built protection against many security issues stemming from programmer oversight

d. Modern software engineering practices have practically eliminated design-based security issues in software projects.

5. Encapsulating Security Payload (ESP) in IPSec is used to provide authentication for the whole IP packet

Select one:

True

False

6. A preferred feature of a hash algorithm is that it is not computationally possible to find two messages with identical hash values

Select one:

True

False

7. The TLS record protocol a. uses public key cryptography b. provides confidentiality and integrity with encryption and message authentication c. is used before the ChangeCipherSpec message is exchanged between communicating parties d. is used to exchange unencrypted records between parties communication over TLS

8. Compression increases the redundancy in data, making it easier to encrypt

Select one:

True

False

9. If a network layer security mechanism such as IPSec is used, it makes encryption on other layers unnecessary

Select one:

True

False

10. Application layer encryption a. deals with encryption between two processes, not necessarily running on the same computational platform. improves the performance of data transfer between applications c. can only use public key cryptography d. makes encryption on other layers unnecessary

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!