SEC311 Module 6 Lesson 1 knowledge check

.docx

School

DeVry University, New York *

*We aren’t endorsed by this school

Course

311

Subject

Electrical Engineering

Date

Feb 20, 2024

Type

docx

Pages

2

Uploaded by NeewNguyen

Report
SEC311 Module 6: Lesson 1_knowledge check E) © O E January 2024 Home Syllabus Announcements Modules Discussions Grades [ 2] People Media Gallery My Media Files Tutoring Bookstore My Software Search Question 1 515 pts What asymmetric algorithm requires few resources and is based on complex algebra and calculations on curves? Correct. ECC is based on complex algebra and calculations on curves. Itis an efficient algorithm that requires few resources (memory, disk space, bandwidth, etc.). Question 2 515 pts Which of the following encryption standards is part of the NSA's suite B cryptographic algorithms and is validated as strong enough to protect classified data? Correct. AES-256, part of the NSA's Suite B set of cryptographic algorithms, is one of the only commercial algorithms validated as strong enough to protect classified information.
> C 25 devryu.instructure.com/courses/103122/quizzes/363063 Jaruary 2024 i Question 3 5/5pts Home 7 Syllabus A cerficate contains a unique serial number and must follow which Announcements standard that describes the creating of a certificate? Modules Discussions . Graes o EEE People Media Gallery B My Media Files Tutoring Correct. A certificate contains a unique serial number and must follow the X 509 standard that describes creating a certificate. Bookstore My Software Search Question 4 5/5pts Symmetric algorithms use two keys, one public key and one private key, to encrypt and decrypt data. EED - Correct. Cryptosystems using symmetric algorithms have one key that encrypts and decrypts data. Question 5 5/5pts Which type of algorithms takes a variable-length string or message and sanary 2024 Home Sylabus EE . Announcements Correct. Cryptosystems using symmetric aigonthms have one key that b encrypts and decrypts data Discussions Grades o People Question 5 5/5pts Media Gallery My Media Which type of algorithms takes a vanable-length string or message and Files produces a fixed-length message digest? Tutoring Bookstore it My Software m Hashing Algorithms Search Correct. A hashing algorithm s a function that takes a variable-length string or message and produces a fixed-length hash value. The value, also called a message digest, is used to very integrity of the data or message. Quiz Score: 25 out of 25 < Previous Next > ax O oe
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help