Question

1. Something you know (SYK) Something you have (SYH) Something you are (SYA) Something you do...

1. Something you know (SYK) Something you have (SYH) Something you are (SYA) Something you do (SYD) are attributes that allow you to do what to a user? ___________

2. Consider the primitive case of asymmetric encryption; no digital signature and no digital envelope. A person sends a message to a recipient using asymmetric encryption. What is the total number of keys used to send and receive the single message? _________________

3.

If the sender of a message encrypts the message using the recipients public key what attribute is ensured?

1.

Confidentiality

2.

Authentication

3.

Integrity

4.

Authentication and confidentiality

5.

None of these answers

4.

Defense in depth would implement security elements in which components. Select the best answer.


A. Operating system


B. Applications programs


C. Routers


D. Switches


E. Firewalls


F. Policies


G. None of the answers

1.

A, B, C, D, E, F

2.

A, B

3.

C, D, E

4.

G

5.

A, B, F

5. You may use either rail fence variation. Using a rail fence cipher with a depth of 3 encrypt the following plaintext. THE ANSWER IS SIMPLE _________

0 0
Add a comment Improve this question Transcribed image text
Answer #1

1) Allows us to deo User Authentication

2) Two(One for encryption and One for decryption)

3) Option 2 (Authentication)

4) Option 1 (A,B,C,D,E,F)

5) TAESMH NWRI IPEES SL

Add a comment
Know the answer?
Add Answer to:
1. Something you know (SYK) Something you have (SYH) Something you are (SYA) Something you do...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Chapter 06 Applied Cryptography 1. How is integrity provided? A. Using two-way hash functions and digital...

    Chapter 06 Applied Cryptography 1. How is integrity provided? A. Using two-way hash functions and digital signatures B. Using one-way hash functions and digital signatures C. By applying a digital certificate D. By using asymmetric encryption 2. Which term refers to the matching of a user to an account through previously shared credentials? A. Nonrepudiation B. Digital signing C. Authentication D. Obfuscation 3. Which term refers to an arranged group of algorithms? A. Crypto modules B. Cryptographic service providers (CSPs)...

  • Information Security I got 8/10 so please figure out which 2 answer is wrong. Question 1...

    Information Security I got 8/10 so please figure out which 2 answer is wrong. Question 1 (1 point) Dropbox is a typical example of SaaS in cloud computing. Question 1 options: True False T Question 2 (1 point) SSL cannot be combined with VPN. Question 2 options: True False F Question 3 (1 point) A remote access server can provide authentication services. Question 3 options: True False T Question 4 (1 point) In general, private key encryption is safer than...

  • 1. Write a C++ program called Password that handles encrypting a password. 2. The program must...

    1. Write a C++ program called Password that handles encrypting a password. 2. The program must perform encryption as follows: a. main method i. Ask the user for a password. ii. Sends the password to a boolean function called isValidPassword to check validity. 1. Returns true if password is at least 8 characters long 2. Returns false if it is not at least 8 characters long iii. If isValidPassword functions returns false 1. Print the following error message “The password...

  • C++ Code

    "For two thousand years, codemakers have fought to preserve secrets while codebreakers have tried their best to reveal them." - taken from Code Book, The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography by Simon Singh.The idea for this machine problem came from this book.You will encrypt and decrypt some messages using a simplified version of a code in the book. The convention in cryptography is to write the plain text in lower case letters and the encrypted text in upper case...

  • ****************************************************************************************************************8 I want it same as the output and with details please and comments "For two...

    ****************************************************************************************************************8 I want it same as the output and with details please and comments "For two thousand years, codemakers have fought to preserve secrets while codebreakers have tried their best to reveal them." - taken from Code Book, The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography by Simon Singh. The idea for this machine problem came from this book.You will encrypt and decrypt some messages using a simplified version of a code in the book. The...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT