Question: Question #5 (1 point) A type cryptographic attack where it is based on the probability of two different messages using the same hash function to
| Question #5 (1 point) | |
|---|---|
| A type cryptographic attack where it is based on the probability of two different messages using the same hash function to produce the same message digest is? | |
| Differential cryptanalysis attack | |
| Statistical Analysis attack | |
| Known ciphertext attack | |
| Birthday attack | |
| Question #6 (1 point) | |
|---|---|
| Certificate Authorities perform the following action: | |
| Provide protection against malicious code | |
| Ensuring that certificates are revoked when necessary by publishing certificate revocation lists | |
| Enforce strong password protection | |
| Provide authentication services and filters results returned to the user | |
| Question #7 (1 point) | |
|---|---|
| Encryption can help protect the integrity of data. | |
| True | |
| False | |
| Question #8 (1 point) | |
|---|---|
| Which of the following feature does a digital signature provide? | |
| It provides a framework for law and procedures. | |
| It ensures an individuals privacy. | |
| It provides the ability to encrypt an individuals confidential data. | |
| It identifies the source and verifies the integrity of data. | |
| Question #9 (1 point) | |
|---|---|
| What encryption operation is used when AES uses S-boxes during the process of encryption? | |
| Key generation | |
| Key exchange | |
| Substitution | |
| Chaining | |
| Question #10 (3 points) | |
|---|---|
| Which of the following uses "substitution" techniques? | |
| 3DES | |
| Caesar cipher | |
| Poly-Alphabatic | |
| Data Encryption Standard (DES) | |
| Rivest, Shamir, Adleman (RSA) | |
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
