Please answer fast The scheme has reigned supreme as the mo
Please answer fast.
The __________ scheme has reigned supreme as the most widely accepted and implemented approach to public-key encryption.
 Select one:
 a. SHA-1
 b. HMAC
 c. MD5
 d. RSA
 e. None of the Above
A __________ attack involves trying all possible private keys.
 Select one:
 a. mathematical
 b. timing
 c. brute-force
 d. chosen ciphertext
 e. None of the Above.
The DSS makes use of the ___________ and presents a new digital signature technique, the Digital Signature Algorithms (DSA).
 
 
 Select one:
 a. HMAC
 b. XOR
 c. RSA
 d. SHA-1
 e. None of the Above.
___________ was the first published public-key algorithm.
 
 
 Select one:
 a. NIST
 b. Diffie-Hellman
 c. RC4
 d. RSA
In relational database parlance, the basic building block is a _________, which is a flat table.
 Select one:
 a. Attribute
 b. Tuple
 c. Primary key
 d. Relation
 e. None of the Above.
The basic building block of a _________ is a table of data, consisting of rows and columns, similar to a spreadsheet.
 Select one:
 a. Relational database
 b. Query set
 c. DBMS
 d. Perturbation
 e. None of the Above.
A No _________ is a structured collection of data stored for use by one or more applications.
 Select one:
 a. Inference
 b. Database
 c. Tuple
 d. Attribute
 e. None of the Above.
There are two general approaches to attacking a symmetric encryption scheme: cryptanalytic attacks and brute-force attacks.
 Select one:
 True
 False
The decryption algorithm takes the ciphertext and the secret key and produces the original plaintext.
 Select one:
 True
 False
A cryptanalytic attack exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used.
 Select one:
 True
 False
A block cipher processes the plaintext input in fixed size blocks and produces a block of ciphertext of equal size for each plaintext block.
 Select one:
 True
 False
A stream cipher processes the input elements continuously, producing output one element at a time.
 Select one:
 True
 False
Solution
1) The __________ scheme has reigned supreme as the most widely accepted and implemented approach to public-key encryption.
Answer :
d. RSA
2) A __________ attack involves trying all possible private keys.
Answer :
c. brute-force
3) ___________ was the first published public-key algorithm.
Answer :
d. RSA
4) In relational database parlance, the basic building block is a _________, which is a flat table.
Answer :
d. Relation
5) The basic building block of a _________ is a table of data, consisting of rows and columns,
Answer :
a. Relational database
6) A No _________ is a structured collection of data stored for use by one or more applications.
Answer :
b. Database



