Please answer fast The scheme has reigned supreme as the mo
Please answer fast.
The __________ scheme has reigned supreme as the most widely accepted and implemented approach to public-key encryption.
Select one:
a. SHA-1
b. HMAC
c. MD5
d. RSA
e. None of the Above
A __________ attack involves trying all possible private keys.
Select one:
a. mathematical
b. timing
c. brute-force
d. chosen ciphertext
e. None of the Above.
The DSS makes use of the ___________ and presents a new digital signature technique, the Digital Signature Algorithms (DSA).
Select one:
a. HMAC
b. XOR
c. RSA
d. SHA-1
e. None of the Above.
___________ was the first published public-key algorithm.
Select one:
a. NIST
b. Diffie-Hellman
c. RC4
d. RSA
In relational database parlance, the basic building block is a _________, which is a flat table.
Select one:
a. Attribute
b. Tuple
c. Primary key
d. Relation
e. None of the Above.
The basic building block of a _________ is a table of data, consisting of rows and columns, similar to a spreadsheet.
Select one:
a. Relational database
b. Query set
c. DBMS
d. Perturbation
e. None of the Above.
A No _________ is a structured collection of data stored for use by one or more applications.
Select one:
a. Inference
b. Database
c. Tuple
d. Attribute
e. None of the Above.
There are two general approaches to attacking a symmetric encryption scheme: cryptanalytic attacks and brute-force attacks.
Select one:
True
False
The decryption algorithm takes the ciphertext and the secret key and produces the original plaintext.
Select one:
True
False
A cryptanalytic attack exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used.
Select one:
True
False
A block cipher processes the plaintext input in fixed size blocks and produces a block of ciphertext of equal size for each plaintext block.
Select one:
True
False
A stream cipher processes the input elements continuously, producing output one element at a time.
Select one:
True
False
Solution
1) The __________ scheme has reigned supreme as the most widely accepted and implemented approach to public-key encryption.
Answer :
d. RSA
2) A __________ attack involves trying all possible private keys.
Answer :
c. brute-force
3) ___________ was the first published public-key algorithm.
Answer :
d. RSA
4) In relational database parlance, the basic building block is a _________, which is a flat table.
Answer :
d. Relation
5) The basic building block of a _________ is a table of data, consisting of rows and columns,
Answer :
a. Relational database
6) A No _________ is a structured collection of data stored for use by one or more applications.
Answer :
b. Database


