KEMBAR78
Chapter 2 Answer Key - CompSec4e | PDF
0% found this document useful (0 votes)
165 views2 pages

Chapter 2 Answer Key - CompSec4e

This chapter discusses cryptographic tools and techniques. It includes 15 true/false questions, 15 multiple choice questions, and 15 short answer questions related to topics like symmetric and asymmetric encryption, block and stream ciphers, key exchange algorithms, and cryptanalysis. The answers to the true/false, multiple choice, and short answer questions are provided.

Uploaded by

Nazia Enayet
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
165 views2 pages

Chapter 2 Answer Key - CompSec4e

This chapter discusses cryptographic tools and techniques. It includes 15 true/false questions, 15 multiple choice questions, and 15 short answer questions related to topics like symmetric and asymmetric encryption, block and stream ciphers, key exchange algorithms, and cryptanalysis. The answers to the true/false, multiple choice, and short answer questions are provided.

Uploaded by

Nazia Enayet
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Computer Security: Principles and Practice, 4th Edition, Global Edition Chapter 2

Chapter 2 – Cryptographic Tools


Answer Key

TRUE/FALSE QUESTIONS:

1. T
2. T
3. F
4. T
5. F
6. T
7. F
8. T
9. F
10. T
11. T
12. F
13. F
14. T
15. T

MULTIPLE CHOICE QUESTIONS:


1. D
2. A
3. B
4. B
5. C
6. A
7. C
8. D
9. B
10. A
11. C
12. B
13. D
14. A
15. B
Computer Security: Principles and Practice, 4th Edition, Global Edition Chapter 2

SHORT ANSWER QUESTIONS:


1. symmetric encryption
2. brute-force
3. decryption
4. cryptanalytic
5. block cipher
6. stream cipher
7. Diffie and Hellman
8. uniform distribution
9. back-end appliance
10. Electronic Frontier Foundation (EFF)
11. electronic codebook (ECB)
12. pseudorandom
13. public and private key
14. library-based tape encryption
15. Diffie-Hellman Key Agreement

You might also like