What is ciphertext?
- Information in human- or machine-readable form
- Information that has been encrypted
- A mathematical process for encrypting information
- A mathematical process for decrypting information
Question 2
How many possible values can an encryption key that is 5 bits long have?
- 5
- 8
- 10
- 16
- 32
- 64
Question 3
Which of the following is a common feature of asymmetric cryptography?
- Very short key lengths are used
- Public keys can be given to anyone who wants to know, e.g. posted on a website
- The key pair can be stored on a key chain server
- Encryption and decryption are faster than symmetric cryptography
Question 4
Which one is the correct statement?
- The SHA-2 hashing algorithm is flawed because two different data items can generate the same hash.
- Collisions can occur in the MD-5 hashing algorithm under certain conditions.
- Hashing can show whether data has changed in transmission and can confirm who the original author was.
- Digital signatures are encrypted using the public key and decrypted using the private key.
- Digital signatures are a good way of transmitting secrets.
Question 5
How can you tell if your connection to a web page is secure? There are two possible answers.
- A closed padlock symbol at the top of your browser window.
- The web page will tell you that it is secure
- The word SSL will appear at the top of your browser window
- The address in your browser window will change from http:// to https://
Where can we find the answers?
ReplyDelete