Question: Question 33 John is looking into making sure his information is sent securely. He wants to use authentication as the means to check the validity

Question 33

John is looking into making sure his information is sent securely. He wants to use authentication as the means to check the validity of the message origination and destination and the integrity of the information being transmitted. Of the following statements which would describe the situation most accuretly.

John is incorrect because authentication does not assure integrity of information

John is incorrect because authentication is not needed for any of the things he is trying to do.

John is correct in his assumption

John is incorrect because authentication does not validate the origination of information

Question 34

End-to End encryption is, mostly ------------- based.

Software

Hardware and Software

none

Hardware

Question 35

Tokens, smart cards, and ATM cards are examples of:

Something you have

Logical Controls

User identification

Access control

Question 36

Birtday attacks are used against:

Digital Signatures

Brute-force attacks

Asymetric algorithms

Message integrity codes

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!