Question

In: Computer Science

Which of the following is not true of symmetric encryption? A It often involves multiple iterations...

Which of the following is not true of symmetric encryption?

A

It often involves multiple iterations encryption

B

It can be decrypted using a key

C

Breach of the encryption key can enable a brute force attack to be successful

D

Encryption Key must be protected to ensure password security.

Which of the following best describes the use of security roles?

A

A group of users who have been granted the same level of access to the same objects within the database

B

A group of users who have the same password hashing algorithm applied

C

Individualized User Security access provisioning

D

Users who have similar job functions, but different database needs

Which of the following hashing algorithms supports the greatest number of salt bits?

A.

MD5

B.

Original UNIX crypt

C.

Blowfish

D.

Extended Des

Which of the following is not a characteristic of hashing?

A.

Hashing functions are generally reversible

B.

They can be subject to brute force attacks without salts

C.

They can be subject to brute force attacks without multiple iterations

D.

You can use a per user salt

Which of the following privileges can be granted to user based on the Grant/Revoke command?

A.

Update

B.

Trigger

C.

Truncate

D.

Reference

E.

Delete

F.

Insert

G.

Select

H.

Connect

I.

Create

J.

Execute

Data Governance pertains to how password hashing algorithms are selected.

True

False

Passwords hashed with the crypt function include the algorithm in the type to allow passwords hashed with different algorithms to coexist

True

False

What is meant when stating that a hashing algorithm is adaptive?

A.

The algorithms can be slowed as computers become faster to mitigate brute force attacks

B.

A new salt can be used for hashing when the original becomes breached

C.

The hashed value output changes over time to prevent brute force attacks

D.

Users can choose their own salt allowing for secondary level of user password selection

Solutions

Expert Solution

Solution:

Which of the following is not true of symmetric encryption?

C) Breach of the encryption key can enable a brute force attack to be successful

Explanation;

The given statement false because if we get the encryption key then the data can be decrypted just like that, there won't be any need of brute force attack then.

Which of the following best describes the use of security roles?

A) A group of users who have been granted the same level of access to the same objects within the database​​​​​​​

Explanation:

Obviously, a group of users who have access to the same objects in the database will lie on the same level of a security role.

Which of the following hashing algorithms supports the greatest number of salt bits?

Which of the following hashing algorithms supports the greatest number of salt bits?

A) MD5

Explanation:

  1. Md5 uses 128 bits
  2. Original UNIX crypt uses 56-bit DES
  3. Blowfish uses 64-bits
  4. Extended Des uses 64 -bits

Which of the following is not a characteristic of hashing?

Hashing functions are generally reversible​​​​​​​

Explanation:

The primary property for which hashing came into existence is because hashing is a one-way function.

Which of the following privileges can be granted to a user based on the Grant/Revoke command?

The list is given below:

  1. SELECT
  2. INSERT
  3. UPDATE
  4. DELETE
  5. INDEX
  6. ALTER
  7. CREATE
  8. DROP
  9. ALL
  10. GRANT

Data Governance pertains to how password hashing algorithms are selected.

True

Passwords hashed with the crypt function include the algorithm in the type to allow passwords hashed with different algorithms to coexist

True

What is meant when stating that a hashing algorithm is adaptive?

The algorithms can be slowed as computers become faster to mitigate brute force attacks

Hit the thumbs up if you liked the answer. :)


Related Solutions

Which statement is true of symmetric encryption? Question 2 options: a) It is impossible to create...
Which statement is true of symmetric encryption? Question 2 options: a) It is impossible to create digital signatures using symmetric encryption. b) It requires more processing power than asymmetric encryption. c) It is difficult to share a key over the Internet in symmetric encryption. d) It uses two different keys to encrypt and decrypt a message. Which type of access control is used to protect systems from unauthorized access? Question 4 options: a) Electronic trackers b) Identification badges c) Passwords...
Symmetric Authenticated Encryption (AE)     Explain intuition behind authenticated encryption modes, and fully describe one mode of...
Symmetric Authenticated Encryption (AE)     Explain intuition behind authenticated encryption modes, and fully describe one mode of your choice with block diagrams. You can use PowerPoint drawing tools to draw your block diagrams. If you strictly wish to avoid drawing, you can also express modes of operations with proper algorithmic descriptions. For example, one can express ECB mode as simple as    C_i ß E(K,M_i), i=1,…,n, where n is the number of message blocks. You can seek from various resources how to...
1. Which of the following statements about the t-distribution is NOT true? The t-distribution is symmetric...
1. Which of the following statements about the t-distribution is NOT true? The t-distribution is symmetric about 0. The t-distribution has heavier tails than the standard normal distribution. The t-distribution has support on the entire real number line The t-distribution is characterized by two parameters, the mean μ and the variance σ2. 2.Which of the following statements is true? When division by a factor of n-1 is used, the sample variance s2 is an unbiased estimator of the population variance...
1. Which of the following statements is not true? a. Exercising an option involves buying or...
1. Which of the following statements is not true? a. Exercising an option involves buying or selling some asset. b. The option price is the price paid to acquire the option. c. An option is the right to buy or sell an underlying asset at the strike price. d. After the expiration date the option becomes valuable. 2. Which of the following examples best represents a passive dividend policy? a. The firm sets a policy such that the proportion of...
Which of the following is NOT true of the relaxation of a muscle fiber? Multiple Choice...
Which of the following is NOT true of the relaxation of a muscle fiber? Multiple Choice calcium release channels open allowing Ca to leave SR ATP is needed to fuel the calcium ATPase pumping Ca into SR Ca2+ moves from the sarcoplasm into the sarcoplasmic reticulum (SR) Action potentials must cease
2. Which of the following best describes the nature of personal selling? Multiple Choice It involves...
2. Which of the following best describes the nature of personal selling? Multiple Choice It involves direct spoken communication between sellers and potential customers. It costs less than advertising for reaching a large, widespread market. It tries to communicate with many customers at the same time. It refers to "promoting" at trade shows, demonstrations, and contests. It is less flexible than mass selling 3. .Agent wholesalers are Multiple Choice mainly concerned with buying and selling. used by small companies that...
Organizing a project involves which of the following activities? Multiple Choice Defining the project Controlling the...
Organizing a project involves which of the following activities? Multiple Choice Defining the project Controlling the project All of these are correct Planning the project
Now let’s look at a more modern symmetric encryption. Assume that the algorithm for this system...
Now let’s look at a more modern symmetric encryption. Assume that the algorithm for this system is to rotate the bits in the message right 4 positions, XOR the bits with the key, and rotate the bits 2 positions to the left. a.What is the key? (The Key is 5A) b. Using the key and the above algorithm, decrypt the following message which contains a name (given in hex): BD 7D FA BC 78 3C 3D. Remember that you’ll have...
Now let’s look at a more modern symmetric encryption. Assume that the algorithm for this system...
Now let’s look at a more modern symmetric encryption. Assume that the algorithm for this system is to rotate the bits in the message right 4 positions, XOR the bits with the key, and rotate the bits 2 positions to the left. a. The key is 5A b. Using the key and the above algorithm, decrypt the following message which contains a name (given in hex): BD 7D FA BC 78 3C 3D. Remember that you’ll have to reverse the...
You are building a safe messaging system by using an Encryption such as private key (symmetric)...
You are building a safe messaging system by using an Encryption such as private key (symmetric) and public key (Asymmetric) that would prevent the utility company from knowing the content of the communications being exchanged. The receiver can be disconnected and cannot receive messages, how can this situation be managed by your system?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT