Question

secuirty 1. When digitally signing a document, which key do you use? A: Symmetric key B:...

secuirty

1. When digitally signing a document, which key do you use?
A: Symmetric key

B: Public key

C: Private Key

D: Your house key

2. Which of the following protocols uses encryption?
A: FTP

B: Telnet

C: SSH

D: SMTP
3. What happens when rm is used to delete a file?
A: Creates a new hardlink to the file

B: Only removes the file pointer
C: Removes file pointer and only writes over data

D: Removes file pointer and writes over file pointer and data
4. Why is it important to protect virtual memory?
A: It contains all of the computer’s storage unencrypted
B: It contains the encrypted contents of RAM
C: It contains all of the computer’s storage encrypted
D: It contains the unencrypted of RAM
5. Which of the following is NOT a type of malware?
A: Polymorphic Virus

B: Metamorphic Virus

C: Endomorphic Virus

D: Worm

6. Digital Signatures provide:
A: Assurance

B: Authenticity

C: Anonymity

D: Nothing

7. All backdoors in software are malicious.

A: True

B: False
8. Stack canaries 100% of the time prevent buffer overflow attacks.
A: True

B: False
9. Foo wants to send a confidential message to Bar. When using asymmetric cryptography, which key should Foo use?
A: Foo’s public key

B: Foo’s private key
C: Bar’s public key

D: Bar’s private key
10. Which of the following is a good choice for biometrics?
A: Number of teeth

B: Fingerprint
C: Hair color

D: Mustache hair length

0 0
Add a comment Improve this question Transcribed image text
Answer #1

1. When digitally signing a document, which key do you use?.

ans)B: Public key

2. Which of the following protocols uses encryption?

Ans) A: FTP

3. What happens when rm is used to delete a file?

Ans) B: Only removes the file pointer

4. Why is it important to protect virtual memory?

Ans) D: It contains the unencrypted of RAM

5. Which of the following is NOT a type of malware?

Ans) C: Endomorphic Virus

According to HOMEWORKLIB RULES we should answer only four questions, but i have answered five, you can post the remaining question as a separate question, please co-operate with us, thank you.

Hope this Helps, if you have any doubs please comment i will get back to you and please thumbs up, thank you.

Add a comment
Know the answer?
Add Answer to:
secuirty 1. When digitally signing a document, which key do you use? A: Symmetric key B:...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 1.Which of the following statements about asymmetric-key encryption is correct? a When using asym...

    1.Which of the following statements about asymmetric-key encryption is correct? a When using asymmetric-key encryption method, a total of two keys are necessary in electronic communication between two parties. b Employees in the same company share the same public key. c Most companies would like to manage the private keys for their employees. d Most companies would like to use a Certificate Authority to manage the public keys of their employees. e Two of the above are correct. 2 Which...

  • 1. Write TWO different but equivalent statements to do the same thing: use a for statement...

    1. Write TWO different but equivalent statements to do the same thing: use a for statement to print the elements of array numbers by using pointer ptr. 2. Write an expression that uses ptr to copy element 1 (zero-based) of the array to element 3. Do not use numbers in the array in Here is the start of a class declaration: class foo { public: void x(foo f); void y(const foo f); void z(foo f) const; ... 3. Which of...

  • Quiz 5 Chapter 21 Multiple Choice Identify the choice that best completes the statement or newer...

    Quiz 5 Chapter 21 Multiple Choice Identify the choice that best completes the statement or newer the question 1. In this chapter, media is defined as a type of communication. b. a type of ink. c. data storage devices. d. A and C 2. What statement is not correct? a. A personal computer is a single user electronic data processing device. b. A personal computer and peripheral devices are hardware. c. Output devices allow data to be entered into the...

  • You are wanting to communicate secret messages with your friend, and you choose to do this with matrices. The encoding matrix that you choose to use is 2 -2 -1 6 You use the following key to convert...

    You are wanting to communicate secret messages with your friend, and you choose to do this with matrices. The encoding matrix that you choose to use is 2 -2 -1 6 You use the following key to convert your message into a string of numbers, where "O" is used as a placeholder where required. A B C D EF G H IJ K L M 10 2 11 24 19 5 25 20 3 7 16 6 14 N O...

  • Question 1 ​ A URL is a ____-part addressing scheme a. ​two b. ​four c. ​three...

    Question 1 ​ A URL is a ____-part addressing scheme a. ​two b. ​four c. ​three d. ​one Question 2 ​ A text file that contains HTML tags is called a(n) ____. a. ​server b. ​HTML document c. ​browser d. ​IP address Question 3 ​ A(n) ____ comes into existence as soon as a work is placed into a tangible form. a. ​open-source project b. ​copyright c. ​reproduction notice d. ​lien Question 4 ​ A(n) ____ is a small file...

  • 3) Out of the following, name which kind of attack you carried out in part 1...

    3) Out of the following, name which kind of attack you carried out in part 1 and part2: a. ciphertext only, b. known plaintext, c. chosen plaintext, d. chosen ciphertext. Explain your answer Problem 3 10 points] A 4-bit long message was encrypted using one-time pad to yield a cipher-text “1010” Assuming the message space consists of all 4-bit long messages, what is the probability that the corresponding plaintext was “1001”? Explain your answer. Problem 4 Assume we perform a...

  • 1. You are given a C file which contains a partially completed program. Follow the instructions...

    1. You are given a C file which contains a partially completed program. Follow the instructions contained in comments and complete the required functions. You will be rewriting four functions from HW03 (initializeStrings, printStrings, encryptStrings, decryptStrings) using only pointer operations instead of using array operations. In addition to this, you will be writing two new functions (printReversedString, isValidPassword). You should not be using any array operations in any of functions for this assignment. You may use only the strlen() function...

  • 8. All of the following are advantages to using laser printers except a. сos b. speed....

    8. All of the following are advantages to using laser printers except a. сos b. speed. c. quality of printing. d. efficiency. 9. An application program is software that is designed to perform a variety of tasks, such as word processing., database functions, and patient b. provide the computer with a set of basic instructions for executing other programs. ыling oul 13 interpret the program instructions. d. All of the above dhe 10. A series of computers that are linked,...

  • 1. State and explain the definition of big-O. 2. Explain why we use big-O to compare...

    1. State and explain the definition of big-O. 2. Explain why we use big-O to compare algorithms. 3. Explain why binary search runs in O(log n) time. 4. Under what conditions is it possible to sort a list in less than O(nlog n) time? 5. List and explain the worst-case and average-case running times for each Vector method below: (a) insert(iterator here, Object item) (b) insertAtHead (c) insertAtTail (aka push back) (d) get(iterator here) (e) get(index i) (f) remove(iterator here)...

  • Need three seperate files. ShoppingCartManager.java ShoppingCart.java ItemsToPurchase.java These are from part 1 what do you mean...

    Need three seperate files. ShoppingCartManager.java ShoppingCart.java ItemsToPurchase.java These are from part 1 what do you mean by deep study 7.25 LAB*: Program: Online shopping cart (Part 2) Note: Creating multiple Scanner objects for the same input stream yields unexpected behavior. Thus, good practice is to use a single Scanner object for reading input from System.in. That Scanner object can be passed as an argument to any methods that read input This program extends the earlier Online shopping cart program (Consider...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT