Question: Question 1 3 pts (TCO 1) Verifying that users are who they say they are and that each input arriving at the system came from

Question 1 3 pts

(TCO 1) Verifying that users are who they say they are and that each input arriving at the system came from a trusted source is _____ .

authenticity
credibility
accountability
integrity

Flag this Question

Question 2 3 pts

(TCO 1) A _____ level breach of security could cause a significant degradation in mission capability to an extent and duration that the organization is able to perform its primary functions but the effectiveness of the functions is significantly reduced.

catastrophic
moderate
low
high

Flag this Question

Question 3 3 pts

(TCO 1) A(n) _____ service is one that protects a system to ensure its availability and addresses the security concerns raised by denial-of-service attacks.

replay
availability
masquerade
integrity

Flag this Question

Question 4 3 pts

(TCO 3) The _____ algorithm will work against any block encryption cipher and does not depend on any particular property of DES.

cipher block chaining
meet-in-the-middle attack
counter mode attack
ciphertext stealing

Flag this Question

Question 5 3 pts

(TCO 1) A _____ attack involves trying every possible key until an intelligible translation of the ciphertext is obtained.

brute-force
Caesar attack
ciphertext only
chosen plaintext

Flag this Question

Question 6 3 pts

(TCO 3) The _____ and _____ block cipher modes of operation are used for authentication.

OFB, CTR
ECB, CBC
CFB, OFB
CBC, CFB

Flag this Question

Question 7 3 pts

(TCO 1) The methods of _____ conceal the existence of the message in a graphic image.

steganography
decryptology
cryptology
cryptography

Flag this Question

Question 8 3 pts

(TCO 4) A _____ cipher is one in which a block of plaintext is treated as a whole and used to produce a ciphertext block of equal length.

bit
product
stream
block

Flag this Question

Question 9 3 pts

(TCO 4) The criteria used in the design of the _____ focused on the design of the S-boxes and on the P function that takes the output of the S-boxes.

Avalanche Attack
Data Encryption Standard
Product Cipher
Substitution Key

Flag this Question

Question 10 3 pts

(TCO 4) Allowing for the maximum number of possible encryption mappings from the plaintext block is referred to by Feistel as the _____.

ideal substitution cipher
round function
ideal block cipher
diffusion cipher

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!