Function of cryptographic hashing

Assignment Help Basic Computer Science
Reference no: EM13829359

Problem:

1. Which of the following is NOT a function of cryptographic hashing:

a. To provide the input to a signature algorithm
b. To provide "shadow files" for critical security data such as passwords
c. To compress data for efficient transmission
d. To cryptographically bind parameters in a security protocol

2. A masquerade attack on a network involves:

a. Discovering the pattern of traffic between two or more users
b. Changing the contents of a message and sending it to an unsuspecting user
c. Releasing the content of a message to users not holding the corresponding key
d. Sending messages from fraudulent source

Additional Information:

These multiple choice questions is from Computer Science. The 1st question is about function of cryptographic hashing. The 2nd question is about what involves in a masquerade attack on a network.

Reference no: EM13829359

Questions Cloud

Public key cryptography : The format of an X.509 certificate is described in
Purpose of trade union in unitarism theory : Perspective of unitarism. the organization is regarded as an integrated and harmonious group of people with one loyalty culture. In addition, this perspective similar to paternalism has a high requirement for the loyalty of all employees.
Authenticator-data compression-encryption : 1. An authenticator is:
Calculate the rate for the new bond issue : Debt: The firm can sell a 20-year, semi-annual,$1,000 par value, 9 percent bond for $980. A flotation cost of 2 percent of the face value would be required in addition to the discount of $20. Preferred Stock: The firm has determined it can issue pref..
Function of cryptographic hashing : Which of the following is NOT a function of cryptographic hashing:
Security protocol-complexity of differential cryptanalysis : In a security protocol, which of the following tends to make the best nonce?
Determining the decryption exponent for rsa key : Let the public key associated with an RSA key be (3,15) where e = 3 is the encryption exponent, and n = 15 is the modulus. The corresponding decryption exponent d is then
What pricing strategies should be employed : Examine what demographics and coinciding pricing structure should JCPenney be focused on in order to increase sales after a decline from a recent change in strategies
History and implementation of object oriented databases : Write a 3-4 page paper that describes any one of the topics in detail. Include a discussion on the following subject areas and include any graphs.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Design to be handed off to an implementation team

Once an activity has been completed, employees will use the system to submit the documentation. The system should support notifications to management personnel whenever their direct reports have submitted documentation.

  Explain various features associated with different erp

Create a timeline that shows ERP evolution Label important milestones in evolution of ERP systems Explain various features associated with different ERP Explain how the development of earlier ERP systems led to more sophisticated systems

  Created a database and a db schema

Created a database and a DB Schema It provides details of table, relationships and keys incorporating the profile detail.

  Calculate charges to determine the charge for each customer

A parking garage charges a $2.00 minimum fee to park for up to three hours. The garage charges an additional .50 per hour for each hour or part thereof in excess of three hours.

  How many data links will there be along

How many data links will there be along the way when Host R transmits a packet to Host S - How many routes?

  Use string manipulations to figure out the units

Prompt the user two STRING inputs of time instances in the format of: YYYY/MM/DD HH:NN:SS. Use string manipulations to figure out the units (year, minute, etc.). The output is the total elapsed time in seconds between the two time inputs.

  What limitations should you keep in mind

When choosing recommended practices ( in accordance with information security) what limitations should you keep in mind?

  The outline pane shares its portion of the screen with the

The outline pane shares its portion of the screen with the _____ pane

  Major information security threats

Write a 3-to 4-page paper on at least three major information security threats that a specific organization you choose faces today. This portion of the assignment should provide a foundation for the sections to be added in Weeks 3 and 4

  Write a program that reads from the java console

Write a program that reads from the Java console the (x,y) coordinates for two points in the plane. Assume that all numbers are integers. Using the Point class from Java,(may need to look it up on the web),instantiate two Point objects with your i..

  Edit this java code add the 3 amounts

Can anyone pls edit this Java code? I need to be able to add the 3 amounts listed on the main method public class Money { private Currency currency; private int wholenum; private int decnum; public Money(Currency currency, int wholenum, int decnum..

  Circuit diagram-truth table for half subtractor-full adder

Illustrate the circuit diagram of the following circuit and create truth table for half subtractor and full adder. Full subtractor and Half adder.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd