Which is true about the electronic codebook algorithm

Assignment Help Data Structure & Algorithms
Reference no: EM133244486

Assignment:

1. Which is true about the Electronic Codebook (ECB) algorithm?

A. It uses a weak key

B. Each block of data is encrypted with the same key

C. Each block of data is encrypted with a random key

D. It uses an initialization vector when encrypting each block of data

2. Which is the best method to reduce bandwidth when checking if a certificate is revoked?

A. Use a CSR

B. Self-sign the certificate

C. Implement OCSP with stapling

D. Use a CRL

3. Which of the following actually performs the encryption of data?

A. Crypto modules

B. CA

C. Digital certificate

D. CRL

4. What does a customer need to provide the RA so they can issue a digital certificate?

A. CSR

B. CRL

C. Digital signature

D. Domain validation

5. Which provides the highest level of assurance that verifies the legal entities of the certificate owners?

A. Wildcard digital certificate

B. Extended validation (EV) certificate

C. Subject alternative name

D. Domain validation certificate

6. What is the highest level of trust in PKI?

A. RA

B. Digital certificate

C. Root CA

D. Intermediate CA

7. Which method allows a third party to store a copy of a private key?

A. Key archiving

B. Key escrow

C. Offline CA

D. Distributed-trust model

8. Where is a revoked digital certificate listed?

A. Shadow file

B. NSA

C. CRL

D. PKI

9. What security protocol should be used for providing confidentiality of voice data?

A. WPA2 with CCMP

B. SSH

C. IPSec

D. SRTP

10. Which is true about a distributed-trust model?

A. Only root CAs can validate signatures

B. Both root CAs and intermediate CAs can validate signatures

C. It is not recommended for large-scale models of signature validation

D. There are no root CAs

Reference no: EM133244486

Questions Cloud

Develop a process for validating forensic data : Data that has been acquired must then be analyzed. During the analysis process, the data must also be validated. Develop a process for validating forensic Data.
Rainn case study : When you think of Non profit agencies you think of grant funding, donation base, and volunteers helping to support and drive the mission. With that, the help on
Deviance is a violation of established cultural : Deviance is a violation of established cultural, or social norms, whether folkways, mores, or codified law. Consider these historical events during the U.S. civ
Assimilation of native american children : What purpose did this forced assimilation serve and whom did it benefit? What might today resemble if Native Americans had not been forced to assimilate?
Which is true about the electronic codebook algorithm : Which is true about the Electronic Codebook (ECB) algorithm? Which is the best method to reduce bandwidth when checking if a certificate is revoked?
List the newborn sensation and motor skills : 1. List the newborn's sensation and motor skills. 2. Describe how sensation, perception, and cognition differ, and give the major changes in each during the fi
Possibility of discrimination in the workplace : What should society do to reduce the possibility of discrimination in the workplace? What policies would you propose if you were the CEO?
How does using sociological imagination help sociologists : How does using sociological imagination help sociologists in their research? List one personal value and explain why it is important to you.
Understanding of the black maternal mortality rate disparity : Discuss how social work theories lends an understanding of the Black Maternal Mortality rate disparity. For example, Psychoanalytic theory can assist us in unde

Reviews

Write a Review

Data Structure & Algorithms Questions & Answers

  Implement an open hash table

In this programming assignment you will implement an open hash table and compare the performance of four hash functions using various prime table sizes.

  Use a search tree to find the solution

Explain how will use a search tree to find the solution.

  How to access virtualised applications through unicore

How to access virtualised applications through UNICORE

  Recursive tree algorithms

Write a recursive function to determine if a binary tree is a binary search tree.

  Determine the mean salary as well as the number of salaries

Determine the mean salary as well as the number of salaries.

  Currency conversion development

Currency Conversion Development

  Cloud computing assignment

WSDL service that receives a request for a stock market quote and returns the quote

  Design a gui and implement tic tac toe game in java

Design a GUI and implement Tic Tac Toe game in java

  Recursive implementation of euclids algorithm

Write a recursive implementation of Euclid's algorithm for finding the greatest common divisor (GCD) of two integers

  Data structures for a single algorithm

Data structures for a single algorithm

  Write the selection sort algorithm

Write the selection sort algorithm

  Design of sample and hold amplifiers for 100 msps by using n

The report is divided into four main parts. The introduction about sample, hold amplifier and design, bootstrap switch design followed by simulation results.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd