Home
Subjects
Explanations
Create
Study sets, textbooks, questions
Log in
Sign up
Upgrade to remove ads
Only $35.99/year
Science
Computer Science
Computer Security and Reliability
quiz 5
STUDY
Flashcards
Learn
Write
Spell
Test
PLAY
Match
Gravity
Terms in this set (5)
When Bob needs to send Alice a message with a digital signature, what is/are used to encrypt the hash?
Bob's private key
Bob's private and public keys
Alice's private key
Bob's private key and Alice's public key
Bob's private key
Which of the following is considered to be a common asymmetric cryptographic algorithm?
Advanced Encryption Standard (AES)
You Answered Data Encryption Standard (DES)
SHA-256
Elliptic Curve Cryptography (ECC)
Elliptic Curve Cryptography (ECC)
What type of cipher takes one character and replaces it with one character, working one character at a time?
ubstitute cipher
character cipher
stream cipher
block cipher
stream cipher
In cryptography, which of the five basic protections ensures that the information is correct and no unauthorized person or malicious software has altered that data?
confidentiality
privacy
integrity
availability
integrity
In which type of encryption is the same key used to encrypt and decrypt data?
symmetric cryptography
private cryptography
asymmetric cryptography
public cryptography
symmetric cryptography
Sets found in the same folder
C3
47 terms
C4
46 terms
C5
68 terms
C6
54 terms
Other sets by this creator
C7 PQS
20 terms
C6 PQS
20 terms
C5 PQS
20 terms
C4 PQ S
20 terms