Cryptography is defined as:(2 points)

Responses

Verified authority to view information, such as a password or key.
Verified authority to view information, such as a password or key.

Sensitive information sent over networks that needs to be secured.
Sensitive information sent over networks that needs to be secured.

The practice of encoding information so only authorized people can read it.
The practice of encoding information so only authorized people can read it.

The act of stealing personal information online.
The act of stealing personal information online.
Question 2
In order to decrypt an encrypted message, pass the encrypted message and the _____________ to the decrypt function.(2 points)
Responses

cipertext
cipertext

cryptology
cryptology

key
key

decrypted message
decrypted message
Question 3
Hash functions got the name "hash" because it's easy to compute the function with a given input, but nearly impossible to reverse engineer the hash function to get the original input. (2 points)
Responses

True
True

False
False
Question 4
What is a collision in a hash function?(2 points)
Responses

2 outputs come from the same input
2 outputs come from the same input

2 inputs map to the same output
2 inputs map to the same output

There are few outputs, but a lot of inputs.
There are few outputs, but a lot of inputs.

There are few inputs, but a lot of outputs.
There are few inputs, but a lot of outputs.
Question 5
What do most attacks on hash functions involve?

A. Finding Collisions
B. Pre-generating millions of hashes and comparing them to the plain text that generates it.
C. Really good random guessing.

(2 points)
Responses

A and B
A and B

A and C
A and C

B and C
B and C
Question 6
_____________ is the process of decrypting coded messages without being told the key.(2 points)
Responses

Cryptography
Cryptography

Cryptology
Cryptology

Cryptanalysis
Cryptanalysis
Question 7
The practice of solving and writing encryptions is ______________.(2 points)
Responses

cryptanalysis
cryptanalysis

cryptography
cryptography

cryptology
cryptology
Question 8
________________ is the output from any input that has been processed through a hashing algorithm/function.(2 points)
Responses

Digest
Digest

Collision
Collision

Firewalls
Firewalls
Question 9
A general property of a good encryption is good encryptions are easy to encrypt but very hard to decrypt.(2 points)
Responses

True
True

False
False
Question 10
The word hashing literally means to scramble.(2 points)
Responses

True
True

False
False

1 answer

Here are the answers to your cryptography questions:

Question 1: The practice of encoding information so only authorized people can read it.

Question 2: key

Question 3: True

Question 4: 2 inputs map to the same output

Question 5: A and B

Question 6: Cryptanalysis

Question 7: cryptography

Question 8: Digest

Question 9: True

Question 10: False

Feel free to ask if you have any more questions or need further clarification!

Similar Questions
  1. How can you identify bias on a website? (1 point)COURSE TOOLS • Multiple sources present unique points of view. • The most
    1. answers icon 1 answer
  2. Which of the following describes advertising?(1 point)Responses an exchange of information, news, or ideas an exchange of
    1. answers icon 0 answers
    1. answers icon 1 answer
  3. Which of the following describes advertising?(1 point)Responses an underlying point of view an underlying point of view a true
    1. answers icon 11 answers
more similar questions