Cryptography provides various security benefits. Which cryptographic benefit is used in e-commerce to provide proof that a customer cannot deny being the source of a transaction? - Non-repudiation, A developer wants to send a message to a system administrator over the internet, so the developer uses the system administrator’s publicly known key to send the message. The system administrator is able to decrypt the message using a unique private key. Which encryption method are the developer and system administrator using to communicate the message - Asymmetric encryption, A developer wants to send a system administrator an encrypted message but is concerned that an intruder might copy the encrypted message and play back the ciphertext to decode the original message. How can the developer make sure that the ciphertext does not give the original plaintext if played back? - Add salt with an initialization vector, Which method of encryption uses a polyalphabetic substitution cipher to encrypt a plaintext message? - Vigenère cipher, Which two pioneers are called the fathers of asymmetric cryptography used in PKI? - Whitfield Diffie and Martin Hellman, Which cryptographic cipher is stream-based? - RC4, An attacker is trying to break an encrypted message. The attacker is able to access the crypto device and wants to run plaintexts through the device to see how its encryption process works. What method is the attacker using to break the messag - Chosen attack, Which encryption algorithm operates on 64-bit blocks of plaintext using a 128-bit key and has over 17 rounds with a complicated mangler function? - International Data Encryption Algorithm (IDEA), Which method of brute-force attack uses a list of common words and phrases in an attempt to break passwords? - Dictionary attack, Which cryptographic concept is used to validate where a message came from? - Proof of origin, Which initiative allows publicly-available cryptographic algorithms to be exported and imported freely among member countries without any types of restrictions to prevent destabilizing accumulations of arms and dual-use goods and technologies? - Wassenaar Arrangement, A system administrator received an encrypted message from one of the company's software vendors. Which cryptographic technique can the system administrator use to authenticate the message sender and also ensure that the message has not been tampered with? - Hash-based message authentication code (HMAC), A developer wants to install a newly released patch received from a software manufacturer. Which cryptographic algorithm can the developer use to trust that the software truly came from the vendor and that the patch has not been altered or manipulated? - Digital signature algorithms, Which internationally recognized standard is used in public-key infrastructure (PKI) to define the format of public-key certificates? - X.509 standard,

Leaderboard

Flash cards is an open-ended template. It does not generate scores for a leaderboard.

Visual style

Options

Switch template

Continue editing: ?