Week 2 – Pelcgbybtl (Cryptology) Post author:Devendra Kumar Post published: Post comments:2 Comments it security defense against the digital dark arts week 2 answers Symmetric Encryption 1. What are the components that make up a cryptosystem? Check all that apply. Answers Key generation algorithmsEncryption algorithmsTransmission algorithmsDecryption algorithms 2. What is steganography? Answers The practice of encoding messagesThe study of languagesThe study of stegosaurusesThe practice of hiding messages 3. What makes an encryption algorithm symmetric? Answers High speedVery large key sizesDifferent keys used for encryption and decryptionThe same keys used for encryption and decryption 4. What's the difference between a stream cipher and a block cipher? Answers Stream ciphers can’t save encrypted data to disk.Stream ciphers encrypt data as a continuous stream, while block ciphers operate on chunks of data.Block ciphers are only used for block device encryption.There is no difference. 5. True or false: The smaller the encryption key is, the more secure the encrypted data is. Answers TRUEFALSE Next Please Share This Share this content Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Devendra Kumar Project Management Apprentice at Google You Might Also Like Week 1 – Initiating a project Real-World Project Challenges This Post Has 2 Comments Zee Reply please correct question 18… the answer should also include “Remote attestation” Devendra Kumar Reply Sure, thanks for sharing! Leave a Reply Cancel replyCommentEnter your name or username to comment Enter your email address to comment Enter your website URL (optional) Save my name, email, and website in this browser for the next time I comment.
please correct question 18… the answer should also include “Remote attestation”
Sure, thanks for sharing!