NewsAdvanced Cryptography Assignment Help

April 27, 2022by Dennis kimotho0

Hits: 0

Advanced Cryptography Assignment
4. are symmetric keys to encrypt and decrypt information exchanged during the session and to verify its integrity.
a. Encrypted signatures
b. Session keys
c. Digital certificates
d. Digital digests
5. Which of these is considered the strongest cryptographic transport protocol?
a. TLS v1.2
b. TLS v1.0
c. SSL v2.0
d. SSL v2.0
6. The strongest technology that would assure Alice that Bob is the sender of a message is a(n) .
a. digital signature
b. encrypted signature
c. digest
d. digital certificate Advanced Cryptography Assignment Help
7. A digital certificate associates .
a. a user’s public key with his private key
b. the user’s identity with his public key
c. a user’s private key with the public key
d. a private key with a digital signature
8. Digital certificates can be used for each of these EXCEPT .
a. to verify the authenticity of the Registration Authorizer
b. to encrypt channels to provide secure communication between clients and servers
c. to verify the identity of clients and servers on the Web
d. to encrypt messages for secure email communications
9. An entity that issues digital certificates is a .
a. certificate signatory (CS)
b. digital signer (DS)
c. certificate authority (CA)
d. signature authority (SA)
10. A centralized directory of digital certificates is called a(n) .
a. Digital Signature Permitted Authorization (DSPA) Advanced Cryptography Assignment Help
b. Digital Signature Approval List (DSAP)
c. Certificate Repository (CR)
d. Authorized Digital Signature (ADS)
11. performs a real-time lookup of a digital certificate’s status.
a. Certificate Revocation List (CRL)
b. Real-Time CA Verification (RTCAV)
c. Online Certificate Status Protocol (OCSP)
d. CA Registry Database (CARD)
Advanced Cryptography Assignment Help
12. What is a value that can be used to ensure that hashed plaintext will not consistently result in the same digest? Advanced Cryptography Assignment Help
a. Algorithm
b. Initialization vector (IV)
c. Nonce
d. Salt
13. Which digital certificate displays the name of the entity behind the website?
a. Online Certificate Status Certificate
b. Extended Validation (EV) Certificate
c. Session Certificate
d. X.509 Certificate
14. Which trust model has multiple CAs, one of which acts as a facilitator?
a. Bridge
b. Hierarchical
c. Distributed
d. Web
15. Which statement is NOT true regarding hierarchical trust models?
a. It is designed for use on a large scale.
b. The root signs all digital certificate authorities with a single key.
c. It assigns a single hierarchy with one master CA.
d. The master CA is called the root. Advanced Cryptography Assignment Help

16. Public key infrastructure (PKI) .
a. generates public/private keys automatically
b. creates private key cryptography
c. is the management of digital certificates
d. requires the use of an RA instead of a CA
17. A(n) is a published set of rules that govern the operation of a PKI.
a. signature resource guide (SRG)
b. enforcement certificate (EF)
c. certificate practice statement (CPS)
d. certificate policy (CP)
18. Which of these is NOT part of the certificate life cycle?
a. Wxpiration
b. Revocation
c. Authorization
d. Creation
19. refers to a situation in which keys are managed by a third party, such as a trusted CA.
a. Key authorization
b. Key escrow
c. Remote key administration
d. Trusted key authority
20. is a protocol for securely accessing a remote computer.
a. Transport Layer Security (TLS)
b. Secure Shell (SSH)
c. Secure Sockets Layer (SSL)
d. Secure Hypertext Transport Protocol (SHTTP

For Advanced Cryptography Assignment Help please click here

Leave a Reply

Your email address will not be published. Required fields are marked *