Answered You can buy a ready-made answer or pick a professional tutor to order an original one.

QUESTION

SEC280 Week 3 Quiz latest 2016 (Score 100%)

QuestionQuestion 1. Question :(TCO 4) Attackers need a certain amount of information before launching their attack. One common place to find information that could be useful to the attacker is to go through the trash of the target. The process of going through a target's trash is known in the community as _____.trash rummaginggarbage surfingpiggy divingdumpster divingQuestion 2. Question :(TCO 4) The art of secret writing that enables an individual to hide the contents of a message from all but the intended recipient is called _____.steganographycryptanalysiscryptographykey managementInstructor Explanation: Page 82Question 3. Question :(TCO 4) The cipher that replaces each letter of the alphabet with a different letter (not in sequence) is a _____.shift ciphersubstitution ciphertransposition cipherVigenère cipherInstructor Explanation: Pages 84-85Question 4. Question :(TCO 4) Keyspace refers to _____.the location where keys are storedthe number of keys needed to encrypt or decrypt a messageall the possible key valuesthe portion of the algorithm that the key connects with to encrypt or decrypt a messageQuestion 5. Question :(TCO 4) A special mathematical function that performs one-way encryption is called _____.asymmetric encryptiontransposition ciphera hashing functionmultiple encryptionQuestion 6. Question :(TCO 4) The encryption method that is base on the idea of two keys--one that is public and one that is private--is _____.a hashing functionsymmetric encryptionasymmetric encryptionelliptical-curve encryptionQuestion 7. Question :(TCO 4) What is a registration authority?An entity that requires proof of identity from the individual requesting a certificate.An entity that generates a digitally signed identification certificateA centralized directory where the registered certificate is storedAn entity that generates electronic credentialsQuestion 8. Question :(TCO 5) The difference between centralized and decentralized infrastructures is _____.that the key pairs and certificates do not have a set lifetime in centralized infrastructuresthat the location where the cryptographic key is generated and stored is differentthat the network administrator sets up the distribution points in centralized infrastructuresthat, in a decentralized infrastructure, the certificate may have an extended lifetimeQuestion 9. Question :(TCO 5) What is a digital certificate?It's a means of establishing the validity of an offer from a person, entity, website, or e-mailIt's a centralized directory wherein registered keys are created and stored.It's a means of establishing your credentials electronically when doing business or other transactions on the Web.It's an entity that generates electronic credentials and distributes them after proving their identity sufficiently.Question 10. Question :(TCO 5) A trust domain is defined as _____.the agreed upon, trusted third partya scenario where one user needs to validate the other's certificatea construct of systems, personnel, applications, protocols, technologies, and policies that work together to provide a certain level of protectiona scenario in which the certificate's issuer and the subject fields hold the same information

Show more
  • @
  • 177 orders completed
ANSWER

Tutor has posted answer for $10.00. See answer's preview

$10.00

**************** * Question ***** ** Attackers need * certain ****** of *********** before ********* their attack *** ****** ***** ** **** *********** **** ***** be useful ** *** ******** ** to ** through the ***** ** *** ****** The process ** ***** ******* * target's ***** ** ***** ** *** ********* ** ********** **************** ************ ************** divingQuestion * Question :(TCO ** The *** ** ****** ******* **** ******* an ********** ** hide the ******** ** * ******* from *** *** *** ******** recipient ** called ********************************************** ******************** ************ Page ********** * ******** ***** ** The ****** that ******** each letter ** *** ******** **** a ********* ****** **** ** ********* ** a ********** ****************** ******************* *************** **************** ************ ***** ************* * Question :(TCO ** ******** refers ** _____the ******** ***** keys *** ********* ****** ** **** needed ** ******* ** decrypt a messageall *** ******** *** ********* portion ** *** algorithm that *** *** ******** **** ** encrypt or ******* * messageQuestion 5 Question ***** ** * special ************ ******** **** ******** ******* encryption is called *************** *********************** ******* hashing **************** encryptionQuestion 6 Question ***** ** *** ********** ****** **** ** **** ** *** **** of *** ********* **** ** ****** *** *** that ** *********** _____a ******* functionsymmetric ******************** ************************** ****************** * ******** ***** ** **** ** a registration ************ ****** **** requires ***** ** identity from the ********** ********** * certificateAn ****** **** generates * ********* signed ************** ************ *********** directory ***** *** ********** certificate is ******** ****** that generates ********** ******************* * ******** ***** ** The ********** between centralized *** decentralized *************** ** _____that the *** ***** *** ************ ** *** **** * *** ******** ** *********** ******************* the location ***** *** ************* key ** ********* *** ****** ** differentthat the ******* ************* sets ** *** distribution ****** ** *********** ******************* in * decentralized ************** the certificate *** have ** ******** **************** * Question ***** ** What ** * ******* **************** * ***** ** establishing the validity of ** ***** **** * person entity website ** ********** * *********** ********* ******* ********** **** are created and ********** * ***** ** establishing your credentials ************** **** doing business ** ***** ************ ** *** ******* an ****** that generates ********** *********** and *********** **** ***** ******* ***** identity ******************** 10 Question ***** ** * ***** ****** ** ******* ** ******** ****** **** trusted third partya ******** ***** *** **** needs ** ******** *** ******* ************ ********* ** ******* ********* ************ ********* technologies *** ******** **** **** ******** to ******* * certain ***** ** *********** scenario ** which *** certificate's ****** *** *** ******* fields hold the same *************

Click here to download attached files: SEC280 Week 3 Quiz latest 2016 september.docx
or Buy custom answer
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question