Question 1 3 pts (TCO 1) Verifying that users are who they say they are and that
ID: 3875344 • Letter: Q
Question
Question 1 3 pts
(TCO 1) Verifying that users are who they say they are and that each input arriving at the system came from a trusted source is _____ .
Flag this Question
Question 2 3 pts
(TCO 1) A _____ level breach of security could cause a significant degradation in mission capability to an extent and duration that the organization is able to perform its primary functions but the effectiveness of the functions is significantly reduced.
Flag this Question
Question 3 3 pts
(TCO 1) A(n) _____ service is one that protects a system to ensure its availability and addresses the security concerns raised by denial-of-service attacks.
Flag this Question
Question 4 3 pts
(TCO 3) The _____ algorithm will work against any block encryption cipher and does not depend on any particular property of DES.
Flag this Question
Question 5 3 pts
(TCO 1) A _____ attack involves trying every possible key until an intelligible translation of the ciphertext is obtained.
Flag this Question
Question 6 3 pts
(TCO 3) The _____ and _____ block cipher modes of operation are used for authentication.
Flag this Question
Question 7 3 pts
(TCO 1) The methods of _____ conceal the existence of the message in a graphic image.
Flag this Question
Question 8 3 pts
(TCO 4) A _____ cipher is one in which a block of plaintext is treated as a whole and used to produce a ciphertext block of equal length.
Flag this Question
Question 9 3 pts
(TCO 4) The criteria used in the design of the _____ focused on the design of the S-boxes and on the P function that takes the output of the S-boxes.
Flag this Question
Question 10 3 pts
(TCO 4) Allowing for the maximum number of possible encryption mappings from the plaintext block is referred to by Feistel as the _____.
authenticityExplanation / Answer
1) Authenticity
it is a mechanism used to verify the users who are accessing the system are trusted or not.
2) Moderate
when the attack level of organization is moderate then organization can perform its primary function but the effectiveness of the function is significantly reduced.
3) Availability
it is a service that ensures the access to system that has been comprimised because of Dos attack to authorized users.
4) meet-in-the-middle attack
it is a type of attack in which it targetsblock cipher cryptographic functions and the attacker uses brute force mechansims for both plain and ciphertext of a block cipher.
5) brute-force
Brute force is method used to decode the given data by trying every possible combination of given context and it is most widly used in password cracking mechanisms.
6) CBC, CFB
CBC - cipher block chaining
in this mode, each block of plaintext is XORed with the previous ciphertext block before being encrypted. This way, each ciphertext block depends on all plaintext blocks processed up to that point. To make each message unique, an initialization vector must be used in the first block.
CFB - cipher feedback
it is a close relative of CBC, makes a block cipher into a self-synchronizing stream cipher
7) Steganography
it is a mechanism which is used in cryptography to hide the messsage in a graphic image.
8) block
block cipher is one in which a block of plaintext is treated as a whole and used to produce a ciphertext block of equal length.
9) Data Encryption Standard
Data Encryption Standard is based on the design of the S-boxes and on the P function that takes the output of the S-boxes.
10) ideal block cipher
Allowing for the maximum number of possible encryption mappings from the plaintext block is referred to by Feistel.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.