What is the process of converting a ciphertext to a plaintext using a digital key?

Upgrade to remove ads

Only ₩37,125/year

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

In Class Quizzes - Lectures 22-26

Terms in this set (30)

Security on a network not only means being able to prevent a hacker from breaking into your computer but also includes being able to recover from temporary service problems or from natural disasters.

TRUE

Confidentiality refers to the protection of the organizational data from unauthorized disclosure of customer and proprietary data.

TRUE

Maintaining data integrity is not a primary goal of security.

FALSE

A crypting service

runs some custom encryption routines to obfuscate malware

A Distributed DoS (DDoS) attack

is often performed using a network of compromised computers

It is not possible to map the traffic flow of Bitcoin transactions

FALSE

Decryption is the process of converting plaintext into ciphertext.

FALSE

Asymmetric encryption uses the same key to encrypt and decrypt a message.

FALSE

When using a digital signature for the process of authentication, the sender encrypts the message with their private key and the recipient decrypts the message with the sender's public key.

TRUE

Secure Sockets Layer SSL is the latest cryptographic protocol designed to
provide communications security over a computer network.

FALSE

Websites can use TLS to secure all communications between their
servers and web browser.

TRUE

Public key cryptography uses a private key to encrypt a piece of data, and then the recipient uses the public key to decrypt the data.

FALSE

A risk assessment assigns levels of risk to various threats to network security by comparing the nature of the threats to the controls designed to reduce them.

TRUE

A(n) __________ is any potential adverse occurrence that can do harm, interrupt the system using the network to cause monetary loss to the organization.

threat

A ____________ is a situation in which a hacker attempts to disrupt the network by sending messages to the network that prevent normal users' messages from being processed.

denial of service

Anomaly detection compares network characteristics against
"normal" activities to judge intrusions.

TRUE

IPS is a monitoring system, while IDS is a control system.

FALSE

IPS systems compare the current network activity
to a known threat database to detect several kinds
of behaviors like security policy violations, malware,
and port scanners.

FALSE

The trend toward server-side computing and the exploding popularity of Internet services has created a new class of computing systems that we have named warehouse-scale computers , or WSC.

TRUE

Warehouse-scale computers currently power the services offered by companies such as Google, Amazon, Facebook, and Microsoft's online services division. They differ significantly from traditional datacenters: they belong to a single organization, use a relatively homogeneous hardware and system software platform, and share a common systems management layer.

TRUE

The datacenters powering many of today's successful Internet services are simply a miscellaneous collection of machines co-located in a facility and wired up together.

FALSE

Achieving fault-free operation on a large collection of hardware and system software is made easier by the large number of servers involved.

FALSE

A Core Switch is

a high-capacity switch positioned in the physical core, or backbone, of a network.

In a fat tree, branches nearer the top of the hierarchy are thinner than branches further down the hierarchy.

FALSE

Interaction is carried out on a Blockchain using rules built into the program of the Blockchain called _________.

Protocols

Someone wanting to conduct a transaction using Cryptocurrency must send a message with the transaction signed with their private key.

TRUE

In addition to being a Turing-complete cryptocurrency, Bitcoin is a ledger technology that companies are using to build new programs.

FALSE

Using Blockchain technology, every node has a copy of the Blockchain.

TRUE

The implementation of specific protocols essentially made Blockchain what it is,

a distributed, peer-to-peer and secured information database.

Not every Bitcoin transaction is recorded on its blockchain.

FALSE

Sets found in the same folder

MIS307 EXAM 1 ICQs

39 terms

sheilaimani

MIS307 EXAM 2 ICQs

24 terms

sheilaimani

Other sets by this creator

EXAM 1 REVIEW

77 terms

sheilaimani

Exam Review 1

51 terms

sheilaimani

MGMT402 Exam 1 (Midterm)

8 terms

sheilaimani

Pearson Exam 1

98 terms

sheilaimani

Recommended textbook solutions

What is the process of converting a ciphertext to a plaintext using a digital key?

Service Management: Operations, Strategy, and Information Technology

7th EditionJames Fitzsimmons, Mona Fitzsimmons

103 solutions

What is the process of converting a ciphertext to a plaintext using a digital key?

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

What is the process of converting a ciphertext to a plaintext using a digital key?

Fundamentals of Database Systems

7th EditionRamez Elmasri, Shamkant B. Navathe

687 solutions

What is the process of converting a ciphertext to a plaintext using a digital key?

Computer Organization and Design MIPS Edition: The Hardware/Software Interface

5th EditionDavid A. Patterson, John L. Hennessy

220 solutions

Other Quizlet sets

Government test : 12/17/20

62 terms

juliafowler2021

IT1600 Practice Final, IT 1600 Midterm 2, IT1600 P…

393 terms

Bradarin

Anthro Final -- Homo Erectus and Acheulean culture

34 terms

Teresa-361

Related questions

QUESTION

(T or F) By default, new subnets in a custom VPC can communicate with each other across Availability Zones.

3 answers

QUESTION

You want to log every object downloaded from an S3 bucket in a specific region. You want to retain these logs indefinitely and search them easily. What's the most cost-effective way to do this? (Select TWO.)

5 answers

QUESTION

What are the benefits of a solid MIS infrastructure

13 answers

QUESTION

An optimization that replaces sequences of zeroes in an IPv6 addresses is called

2 answers

What is the process of converting a plaintext to an ciphertext using a digital key?

Cryptography.
The sender converts the plaintext message to ciphertext. This part of the process is called encryption (sometimes encipherment )..
The ciphertext is transmitted to the receiver..
The receiver converts the ciphertext message back to its plaintext form..

Is the process of converting plaintext to ciphertext?

Cryptography is the process of converting between readable text, called plaintext , and an unreadable form, called ciphertext .