What permits interoperability between certificate


Assignment

1. The primary difference between today's cryptographic methods and those of 60 years ago is our ________________.
a) use of substitution ciphers
b) use of symmetric keys
c) reliance on computers and complex mathematics
d) reliance on transposition ciphers

2. Symmetrical ciphers work on __________ of information.
a) blocks or continuous streams
b) bits or bytes
c) packets
d) sectors or rounds

3. A drawback of a symmetrical key system is that the___________.
a) number of keys can grow very large
b) keys can be discovered easily
c) keys are non-changing
d) keys are public

4. Block ciphers are weaker than stream ciphers. True/False.

5. Because the key space of the algorithm is so small, ________ is no longer considered computationally secure.
a) DES
b) RSA
c) TEA
d) Diffie-Hellman

6. Asymmetrical encryption is commonly used for all of the following EXCEPT ____.
a) e-mail encryption
b) digital signatures
c) on-line purchases
d) code signing

7. What is the most important benefit of asymmetrical encryption?
a) It speeds up the encryption process.
b) It makes e-mail easier to encode.
c) Only the sender knows to whom the information is going.
d) Messages can be transmitted openly and only the receiver can decrypt the information

8. What permits interoperability between certificate authorities?
a) content filtering
b) policy mapping
c) trust distribution
d) exchange authentication

9. Justify your answer. [50-100 words, references optional]
It is necessary to keep cryptographic algorithms private. True or False

10 Describe VPN, include but not limited to technology, protocols etc. (150-200 words)

Solution Preview :

Prepared by a verified Expert
Computer Network Security: What permits interoperability between certificate
Reference No:- TGS02241447

Now Priced at $30 (50% Discount)

Recommended (95%)

Rated (4.7/5)