The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Apr 2017 |
| Last Sign in: | 103 Weeks Ago, 2 Days Ago |
| Questions Answered: | 4870 |
| Tutorials Posted: | 4863 |
MBA IT, Mater in Science and Technology
Devry
Jul-1996 - Jul-2000
Professor
Devry University
Mar-2010 - Oct-2016
Hello, I need help with my Intro Info Sys Security course.
Â
Â
QUESTION 1
1. is the process of converting an original message into a form that is unreadable to unauthorized
individuals.
QUESTION 2 1. 1. is the process of making and using codes to secure the transmission of information. QUESTION 3
True or False: Hashing functions require the use of keys.
True
False 1. QUESTION 4
_____ is the entire range of values that can possibly be used to construct an individual key.
A. Plaintex
B. Cipher key
C. Ciphertext
D. Keyspace 1. 1. QUESTION 5
Finger, palm, and hand readers; iris and retina scanners; and voice and signature readers are examples
of
locks. QUESTION 6
The message is a fingerprint of the author’s message that is to be compared with the receiver’s locally calculated hash of the same message. 1. QUESTION 7
The _____ algorithm was the first public-key encryption algorithm developed (in 1977) and published for
commercial use.
A. Blowfish
B. DES
C. Diffie-Hellman
D. RSA QUESTION 8
1. is the information used in conjunction with an algorithm to create the ciphertext from the
plaintext or derive the plaintext from the ciphertext. 1. 1. QUESTION 9
The science of encryption is known as . QUESTION 10
True or False: Two hundred and eighty five computers could crack a 56-bit key in one year, whereas 10
times as many could do it in a little over a month.
True
False
-----------