Encryption of data is important to ensure its privacy. It is most commonly achieved by using
a ____.
A. public-key encryption
B. private-key encryption
C. password-key encryption
D. character set encryption

1 Answer

Answer :

A. public-key encryption

Related questions

Description : What do you call a short bit sequence sent typically 128 bits in digital signatures? A. Hash B. Public key C. Private key D. Password

Last Answer : A. Hash

Description : Public key encryption method is a system a. which uses a set of public keys one for each participant in e-Commerce b. in which each person who wants to communicate has two keys; a private key known to him ... him. c. which uses the RSA coding system. d. which is a standard for use in e-Commerce.  

Last Answer : b. in which each person who wants to communicate has two keys; a private key known to him only and a public key which is publicized to enable others to send message to him.

Description : Security methods such as private encryption, VLANs and firewalls comes under __________ subject area. a) Accounting Management b) Compliance c) Data Privacy d) All of the mentioned

Last Answer : Data Privacy

Description : Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt data. The key used to encrypt data is called the _____ key, while the key used to ... the _____ key. a. encryption, decryption b. private, public c. encryption, public d. public, private

Last Answer : d. public, private

Description : In public key encryption system if A encrypts a message using his private key and sends it to B a. if B knows it is from A he can decrypt it using A's public key b. Even if B knows who sent the ... be decrypted at all as no one knows A's private key d. A should send his public key with the message

Last Answer : a. if B knows it is from A he can decrypt it using A’s public key 

Description : In public key encryption if A wants to send an encrypted message a. A encrypts message using his private key b. A encrypts message using B’s private key c. A encrypts message using B’s public key d. A encrypts message using his public key  

Last Answer : c. A encrypts message using B’s public key 

Description : If there are N people in the world and are using secret key encryption/decryption for privacy purpose, then number of secret keys required will be: (A) N (B) (N-1) (C) N(N-1)/2 (D) N(N+1)/2

Last Answer : (C) N(N-1)/2 

Description : What is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient? a. Encryption b. Public key encryption c. Intrusion‐detection software d. Security‐auditing software

Last Answer : b. Public key encryption

Description : By symmetric key encryption we mean a. one private key is used for both encryption and decryption b. private and public key used are symmetric c. only public keys are used for encryption d. only symmetric key is used for encryption

Last Answer : D

Description : Find the false statement: (A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. (B) The Symmetric cipher DES (Data Encryption Standard) was widely used ... and 124 bits. (D) Public key algorithms use two different keys for Encryption and Decryption.

Last Answer : (C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.

Description : Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way): a) Encryption b) Decryption c) Both of above d) None of These

Last Answer : a) Encryption

Description : Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way): a) Encryption b) Decryption c) Both of above d) None of These

Last Answer : a) Encryption

Description : While sending a signed message, a sender a. sends message key using public key encryption using DES and hashed message using public key encryption b. sends message using public key encryption ... and hashed message using DES d. sends both message and hashed message using public key encryption

Last Answer : a. sends message key using public key encryption using DES and hashed message using public key encryption  

Description : A company is considering a cloud environment to improve the operating efficiency for their dataand applications. The company is part of an industry where strict security and data privacy issues are of the highest ... a good choice? A. hybrid cloud B. public cloud C. private cloud D. governed cloud

Last Answer : private cloud

Description : Public key system is useful because a. it uses two keys. b. there is no key distribution problem as public key can be kept in a commonly accessible database. c. private key can be kept secret. d. it is a symmetric key system. 

Last Answer : b. there is no key distribution problem as public key can be kept in a commonly accessible database.  

Description : What is not a role of encryption? a)It is used to protect data from unauthorized access during transmission. b)It is used to ensure user authentication c)It is used to ensure data integrity d)It is used to ensure data corruption does not happens

Last Answer : d)It is used to ensure data corruption does not happens

Description : In SET protocol a customer encrypts credit card number using a. his private key b. bank’s public key c. bank’s private key d. merchant’s public key 

Last Answer : b. bank’s public key  

Description : ________ can beachievedbyusing multiplexing; ______ canbe achieved by using spreading. A) Efficiency; privacy and antijamming B) Privacyand antijamming;efficiency C) Privacyand efficiency; antijamming D) Efficiency and antijamming; privacy

Last Answer : Efficiency; privacy and antijammin

Description : Research is not considered ethical if it (A) tries to prove a particular point. (B) does not ensure privacy and anonymity of the respondent. (C) does not investigate the data scientifically. (D) is not of a very high standard.

Last Answer : (B) does not ensure privacy and anonymity of the respondent.

Description : DES and public key algorithm are combined (i) to speed up encrypted message transmission (ii)to ensure higher security by using different key for each transmission (iii) as a combination is always better than individual system (iv ... e-Commerce a. i and ii b. ii and iii c. iii and iv d. i and iv  

Last Answer : a. i and ii

Description : What are the advantages & disadvantages of public key encryption?

Last Answer : Advantages: a) Remove the restriction of a shared secret key between two entities. Here each entity can create a pair of keys, keep the private one, and publicly distribute the other one. b) The no ... using the long keys takes a lot of time. So it is not recommended for large amounts of text.

Description : What checks out your computer or network for potential weaknesses? a. Encryption b. Public key encryption c. Security‐auditing software d. None of the above

Last Answer : c. Security‐auditing software

Description : What looks for people on the network who shouldn't be there or who are acting suspiciously? a. Encryption b. Public key encryption c. Intrusion‐detection software d. Security‐auditing software

Last Answer : c. Intrusion‐detection software

Description : Triple DES a. is a symmetric key encryption method b. guarantees excellent security c. is implementable as a hardware VLSI chip d. is public key encryption method with three keys. 

Last Answer : b. guarantees excellent security  

Description : DES (i) is a symmetric key encryption method (ii)guarantees absolute security (iii) is implementable as hardware VLSI chip (iv) is a public key encryption method a. i and ii b. ii and iii c. i and iii d. iii and iv

Last Answer : c. i and iii 

Description : The primary goal of the......................protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity. A) SSL B) ESP C) TSL D) PSL

Last Answer : A) SSL

Description : he primary goal of the ………………….. protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity. A) SSL B) ESP C) TSL D) PSL

Last Answer : A) SSL

Description : In cheque payment protocol, the purchase order form is signed by purchaser using a. his public key b. his private key c. his private key using his signature hardware d. various public keys

Last Answer : c. his private key using his signature hardware  

Description : Hashed message is signed by a sender using a. his public key b. his private key c. receiver’s public key d. receiver’s private key

Last Answer : b. his private key  

Description : How do I ensure my privacy?

Last Answer : Your safety is of Paramount importance to you. Do not always do things routinely. Change all the time. Do not use Facebook to log into other sites. Your phone number should not be given out carelessly. Be friends with people whom you trust. Do not give out secrets anyhowly.

Description : Considered as the unsolved problem in satellite system A. Coverage B. Cost C. Access D. Privacy

Last Answer : D. Privacy

Description : Do you feel that giving your password to another person, including a significant other, is disrespectful to the privacy of people who message you?

Last Answer : It depends. I give my husband plenty of my passwords but he knows he isn't to read private messages unless I ask him to read something that isn't too private. Just maybe private to everyone else on ... junk mail or for logins for sites like fluther and so on. Family and friends use our joint email.

Description : The wireless evolution is achieved through the GSM family of wireless technology platforms which include but except one of the following. Which one is NOT a member of the GSM family? A. GSM B. EDGE C. GPRS D. CDMA

Last Answer : D. CDMA

Description : Iridium satellites can provide data communications of up ____ bps data rate. A. 1200 B. 4800 C. 2400 D. 3840

Last Answer : C. 2400

Description : ECE Board Exam March 1996 What is the transmission rate of a system for transmitting the output of a microcomputer to a line printer operating at a speed of 30 lines/minute? Assume that the line printer has 8 bits ... and prints out 80 characters/line. A. 800 bps B. 400 bps C. 320 bps D. 640 bps

Last Answer : C. 320 bps

Description : Width of frequency band just enough to ensure the transmission of information at a required rate and quality required, and under a specified condition and class of emission. A. Occupied bandwidth B. Transmission bandwidth C. Necessary bandwidth D. Frequency bandwidth

Last Answer : C. Necessary bandwidth

Description : How can receiver desensitizing be reduced? A. Increase the receiver bandwidth B. Ensure good RF shielding between the transmitter and receiver C. Increase the transmitter audio gain D. Decrease the receiver squelch, gain.

Last Answer : D. Decrease the receiver squelch, gain.

Description : The width of the frequency band which is just sufficient to ensure the transmission of information at the rate and with the quality required under a specified condition and class of emission. A. Occupied bandwidth B. Reference frequency C. Necessary bandwidth D. Frequency tolerance bandwidth

Last Answer : C. Necessary bandwidth

Description : Skip distance can be maximized by using the ____ radiation angle possible and the ____ frequency that will be refracted at that angle. A. lowest, lowest B. lowest, highest C. highest, lowest D. highest, highest

Last Answer : B. lowest, highest

Description : USB Key Encryption: How?

Last Answer : I don’t recall how. But I am pretty sure you can run TrueCrypt from the USB drive. Google for it. You should find something.

Description : Symmetric key cryptography was the only kind of encryption publicly known until: a) July 195 b) June, 1976 c) June 1988 d) None of These

Last Answer : b) June, 1976

Description : Symmetric key cryptography was the only kind of encryption publicly known until: a) July 195 b) June, 1976 c) June 1988 d) None of These

Last Answer : b) June, 1976

Description : A portion of the Polymorphic virus, generally called a …………………….. , creates, a random encryption, key to encrypt the remainder of the virus. A) mutual engine B) mutation engine C) multiple engine D) polymorphic engine

Last Answer : C) multiple engine

Description : What scrambles the contents of a file so you can't read it without having the right decryption key? a. Encryption b. Intrusion‐detection software c. Security‐auditing software d. All of the above

Last Answer : a. Encryption

Description : Certification of Digital signature by an independent authority is needed because a. it is safe b. it gives confidence to a business c. the authority checks and assures customers that the public ... business which claims its ownership d. private key claimed by a sender may not be actually his 

Last Answer : c. the authority checks and assures customers that the public key indeed belongs to the business which claims its ownership 

Description : Why isn’t there an alternative to FB that respects privacy of members’ private messages?

Last Answer : Google Plus tried it but never made it. I agree, I’d love to bail on FB but it’s the default way to connect with so much.

Description : Is your privacy really that private?

Last Answer : answer:I no longer spend time worrying about things I can't do anything about. I try to leave the smallest footprint wherever I go, but it is increasingly futile for the reasons you listed ... in the developing world. It's expensive and only the wealthiest countries can carry this off effectively.

Description : Public key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography. a. Private key b. Symmetric c. Asymmetric d. None

Last Answer : c. Asymmetric

Description : Private Key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography. a. Public key b. Symmetric c. Asymmetric d. None

Last Answer : b. Symmetric