Question 1. Question :
(TCO 4) Attackers need a certain amount of information before launching their attack. One common place to find information that could be useful to the attacker is to go through the trash of the target. The process of going through a target’s trash is known in the community as _____.
trash rummaging
garbage surfing
piggy diving
dumpster diving
Question 2. Question :
(TCO 4) The art of secret writing that enables an individual to hide the contents of a message from all but the intended recipient is called _____.
key management
Instructor Explanation: Page 82
Question 3. Question :
(TCO 4) The cipher that replaces each letter of the alphabet with a different letter (not in sequence) is a _____.
shift cipher
substitution cipher
transposition cipher
Vigenère cipher
Instructor Explanation: Pages 84-85
Question 4. Question :
(TCO 4) Keyspace refers to _____.
the location where keys are stored
the number of keys needed to encrypt or decrypt a message
all the possible key values
the portion of the algorithm that the key connects with to encrypt or decrypt a message
Question 5. Question :
(TCO 4) A special mathematical function that performs one-way encryption is called _____.
asymmetric encryption
transposition cipher
a hashing function
multiple encryption
Question 6. Question :
(TCO 4) The encryption method that is base on the idea of two keys–one that is public and one that is private–is _____.
a hashing function
symmetric encryption
asymmetric encryption
elliptical-curve encryption
Question 7. Question :
(TCO 4) What is a registration authority?
An entity that requires proof of identity from the individual requesting a certificate.
An entity that generates a digitally signed identification certificate
A centralized directory where the registered certificate is stored
An entity that generates electronic credentials
Question 8. Question :
(TCO 5) The difference between centralized and decentralized infrastructures is _____.
that the key pairs and certificates do not have a set lifetime in centralized infrastructures
that the location where the cryptographic key is generated and stored is different
that the network administrator sets up the distribution points in centralized infrastructures
that, in a decentralized infrastructure, the certificate may have an extended lifetime
Question 9. Question :
(TCO 5) What is a digital certificate?
It’s a means of establishing the validity of an offer from a person, entity, website, or e-mail
It’s a centralized directory wherein registered keys are created and stored.
It’s a means of establishing your credentials electronically when doing business or other transactions on the Web.
It’s an entity that generates electronic credentials and distributes them after proving their identity sufficiently.
Question 10. Question :
(TCO 5) A trust domain is defined as _____.
the agreed upon, trusted third party
a scenario where one user needs to validate the other’s certificate
a construct of systems, personnel, applications, protocols, technologies, and policies that work together to provide a certain level of protection
a scenario in which the certificate’s issuer and the subject fields hold the same information
The post Sec 280 Quiz appeared first on essayfount.

What Students Are Saying About Us

.......... Customer ID: 12*** | Rating: ⭐⭐⭐⭐⭐
"Honestly, I was afraid to send my paper to you, but you proved you are a trustworthy service. My essay was done in less than a day, and I received a brilliant piece. I didn’t even believe it was my essay at first 🙂 Great job, thank you!"

.......... Customer ID: 11***| Rating: ⭐⭐⭐⭐⭐
"This company is the best there is. They saved me so many times, I cannot even keep count. Now I recommend it to all my friends, and none of them have complained about it. The writers here are excellent."

"Order a custom Paper on Similar Assignment at! No Plagiarism! Enjoy 20% Discount!"