Which of the following statements is most accurate regarding a digital signature?
Which protocol makes USE of an electronic wallet on a customer's PC and sends encrypted credit card information to merchant's Web server, which digitally signs it and sends it on to its processing bank?
In what type of attack does an attacker try, from several encrypted messages, to figure out the key used in the encryption process?
Which of the following encryption algorithms does not deal with discrete logarithms?
Complete the blanks. When using PKI, I digitally sign a message using my ______ key. The recipient verifies my signature using my ______ key.
Which of the following can be best defined as computing techniques for inseparably embedding unobtrusive marks or labels as bits in digital data and for detecting or extracting the marks later?
What can be defined as a data structure that enumerates digital certificates that were issued to CAs but have been invalidated by their issuer prior to when they were scheduled to expire?
Which is NOT a suitable method for distributing certificate revocation information?
A X.509 public key certificate with the key usage attribute "non repudiation" can be used for which of the following?
What uses a key of the same length as the message where each bit or character from the plaintext is encrypted by a modular addition?
In a known plaintext attack, the cryptanalyst has knowledge of which of the following?
Which of the following ciphers is a subset on which the Vigenere polyalphabetic cipher was based on?
Which of the following can best be defined as a key distribution protocol that uses hybrid encryption to convey session keys. This protocol establishes a long-term key once, and then requires no prior communication in order to establish or exchange keys on a session-by-session basis?
PDF + Testing Engine |
---|
$66 |
Testing Engine |
---|
$50 |
PDF (Q&A) |
---|
$42 |
ISC Free Exams |
---|
|