Question: ITM 446-Information Security -Chapter 3, 4 &5 Test - 2019 Spi MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the

ITM 446-Information Security -Chapter 3, 4 &5 Test - 2019 Spi MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) 1) In which type of encryption is the same key used to encrypt and decrypt data? B) public C) symmetric D) asymmetric A) private 2) 2) The simplest type of stream cipher, one in which one letter or character is exchanged for another, is known as what? A) shift B) substitution C) lock D) loop 3) 3) Which type of cryptographic algorithm takes an input string of any length, and returns a string of any requested variable length A) substitution B) block C) loop D) sponge 4) What type of cryptography uses two keys instead of just one, generating both a private and a public key? 4) A) symmetric B) asymmetric C) shared D) open 5) Which of the following is NOT one of the functions of a digital signature? 5) A) protect the public key B) verification of the sender C) prevention of the sender from disowning the message D) prove the integrity of the message 6) Data that is in an unencrypted form is referred to as which of the following? 6) A) crypttext B) plain text C) simpletext D) cleartext 7) In cryptography, which of the five basic protections ensures that the information is correct and no 7) unauthorized person or malicious software has altered that data? A) confidentiality B) availability C) integrity D) encryption 8) What type of cryptographic algorithm creates a unique digital fingerprint of a set of data? 8) A) hash B) key C) digest D) block 9) What term describes data actions being perfrmed by endpoint devices, such as printing a report from a 9) desktop computer? A) data-in-dransit B) data-in-play C) data-at-rest D) data-in-use 10) What alternative term can be used to describe asymmetric cryptographic algorithms? 10) A) user key cryptography C) private key cryptography B) public key eryptography D) cipher-text cryptography 11) When Bob needs to send Alice a message with a digital signature, whose private key is used to encrypt the 11) hash? A) Bob's private key C) Bob and Alice's keys. B) Alice's private key D) Bob's private key and Alice's public key 12) If Bob receives an encrypted reply message from Alice, whose private key is used to decrypt the received 12) message? A) Alice's private key C) Bob's private key B) Bob and Alice's keys. D) Bob's private key and Alice's public key A-1
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
