Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Question 1 3 pts (TCO 1) Verifying that users are who they say they are and that

ID: 3875344 • Letter: Q

Question

Question 1 3 pts

(TCO 1) Verifying that users are who they say they are and that each input arriving at the system came from a trusted source is _____ .

Flag this Question

Question 2 3 pts

(TCO 1) A _____ level breach of security could cause a significant degradation in mission capability to an extent and duration that the organization is able to perform its primary functions but the effectiveness of the functions is significantly reduced.

Flag this Question

Question 3 3 pts

(TCO 1) A(n) _____ service is one that protects a system to ensure its availability and addresses the security concerns raised by denial-of-service attacks.

Flag this Question

Question 4 3 pts

(TCO 3) The _____ algorithm will work against any block encryption cipher and does not depend on any particular property of DES.

Flag this Question

Question 5 3 pts

(TCO 1) A _____ attack involves trying every possible key until an intelligible translation of the ciphertext is obtained.

Flag this Question

Question 6 3 pts

(TCO 3) The _____ and _____ block cipher modes of operation are used for authentication.

Flag this Question

Question 7 3 pts

(TCO 1) The methods of _____ conceal the existence of the message in a graphic image.

Flag this Question

Question 8 3 pts

(TCO 4) A _____ cipher is one in which a block of plaintext is treated as a whole and used to produce a ciphertext block of equal length.

Flag this Question

Question 9 3 pts

(TCO 4) The criteria used in the design of the _____ focused on the design of the S-boxes and on the P function that takes the output of the S-boxes.

Flag this Question

Question 10 3 pts

(TCO 4) Allowing for the maximum number of possible encryption mappings from the plaintext block is referred to by Feistel as the _____.

authenticity

Explanation / Answer

1) Authenticity

it is a mechanism used to verify the users who are accessing the system are trusted or not.

2) Moderate

when the attack level of organization is moderate then organization can perform its primary function but the effectiveness of the function is significantly reduced.

3) Availability

it is a service that ensures the access to system that has been comprimised because of Dos attack to authorized users.

4) meet-in-the-middle attack

it is a type of attack in which it targetsblock cipher cryptographic functions and the attacker uses brute force mechansims for both plain and ciphertext of a block cipher.

5) brute-force

Brute force is method used to decode the given data by trying every possible combination of given context and it is most widly used in password cracking mechanisms.

6) CBC, CFB

CBC - cipher block chaining

in this mode, each block of plaintext is XORed with the previous ciphertext block before being encrypted. This way, each ciphertext block depends on all plaintext blocks processed up to that point. To make each message unique, an initialization vector must be used in the first block.

CFB - cipher feedback

it is a close relative of CBC, makes a block cipher into a self-synchronizing stream cipher

7) Steganography

it is a mechanism which is used in cryptography to hide the messsage in a graphic image.

8) block

block cipher is one in which a block of plaintext is treated as a whole and used to produce a ciphertext block of equal length.

9) Data Encryption Standard

Data Encryption Standard is based on the design of the S-boxes and on the P function that takes the output of the S-boxes.

10) ideal block cipher

Allowing for the maximum number of possible encryption mappings from the plaintext block is referred to by Feistel.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote