- Arts & Culture 5947
- Business & Economics 688
- Computers 316
- Dictionaries & Encyclopedias 81
- Education & Science 76313
- Abstracts 252
- Astrology 4
- Astronomy 1
- Biology 8
- Chemistry 2450
- Coursework 15702
- Culture 9
- Diplomas 411
- Drawings 571
- Ecology 6
- Economy 82
- English 77
- Ethics, Aesthetics 3
- For Education Students 17617
- Foreign Languages 11
- Geography 3
- Geology 1
- History 89
- Maps & Atlases 5
- Mathematics 13871
- Musical Literature 2
- Pedagogics 19
- Philosophy 23
- Physics 14886
- Political Science 5
- Practical Work 101
- Psychology 60
- Religion 4
- Russian and culture of speech 8
- School Textbooks 7
- Sexology 42
- Sociology 9
- Summaries, Cribs 87
- Test Answers 151
- Tests 9242
- Textbooks for Colleges and Universities 32
- Theses 24
- To Help Graduate Students 14
- To Help the Entrant 37
- Vetting 364
- Works 13
- Информатика 10
- Engineering 3062
- Fiction 696
- House, Family & Entertainment 107
- Law 132
- Website Promotion 71
Mathematical methods of information security Answers Sy
Refunds: 0
Uploaded: 11.03.2021
Content: Ответы к тесту.zip 224,25 kB
Product description
COLLECTION OF ANSWERS - 60 questions. Mathematical methods of information security Answers to Synergy tests. Result Excellent 97/100 points
1. Repetition is ...
2. Substitution is ...
3. One-time encryption is most acceptable for processing ...
4. In an asymmetric RSA cryptosystem ...
5. The message authentication code provides ...
6. When generating a digital signature, it is used ...
7. When simulating active actions of the enemy, he is usually put ...
8. Disposable notepad message integrity check ...
9. The Diffie-Hellman public key distribution system uses ...
10. The Diffie-Hellman protocol is a protocol ...
11. The most important component of the cipher is ...
12. When encrypting according to the GOST 28147-89 encryption standard, the complete dispersion of the input data occurs after ...
13. In a perfect (ideal) cipher, the posterior probabilities of plain texts (calculated after obtaining the cryptogram) ...
14. The enemy´s knowledge of the encryption algorithm ...
15. Formant is a spectrum region, ...
16. Algorithms for the formation and verification of electronic digital signature ...
17. Passive attack carried out by the enemy is associated with ...
18. The measure of the imitation strength of the cipher is the probability of successful ...
19. Perfect security is ensured when with a key ...
20. When verifying a digital signature, it is used ...
21. When considering the practical strength of ciphers, it is assumed that for the cipher in question, there will usually be ...
22. The advantage of asymmetric encryption systems (compared to symmetric systems) is ...
23. Public and private keys in an asymmetric system ...
24. In a simple substitution cipher, each character of the original message corresponds to ...
25. The basis for the formation of symmetric encryption algorithms is the assumption that ...
26. Meaningful plaintext obtained by decrypting a cryptogram generated using a one-time pad ...
27. In stream ciphers at one point in time, the encryption procedure is performed over ...
28. It is not true that an active attack by an adversary involves ...
29. It is not true that in the artificial formation of a speech signal, such a characteristic is used as ...
30. Using a symmetric cryptoalgorithm using different keys for encryption and decryption ...
31. With the increase in channel bandwidth, the possibility of voice identification ...
32. Diffie-Hellman Protocol ...
33. The working characteristic of the cipher is the Average amount of work W (N) required to determine ...
34. It is not true that the advantages of flow systems include ...
35. The number of operations required to determine the used encryption key from the fragment of the encrypted message and the corresponding plain text must be ..
36. In a symmetric encryption system for the independent operation of N subscribers ...
37. The encrypted message must be readable ...
38. The content of the imitation insert should depend ...
39. The enemy, making a substitution or imitation of a message, proceeds from the assumption that ...
40. The reliability of the RSA algorithm is based on ...
41. A renegade is ...
42. The maximum number of rounds of encryption according to the GOST 28147-89 standard is ...
43. It is not true that the disadvantages of asymmetric cryptosystems include ...
44. Practical implementation of the Diffie-Hellman algorithm ...
45. When scrambling a speech signal, change ...
46. An electronic digital signature is ...
47. Information security in the Diffie-Hellman system is based on complexity ...
48. A phoneme is ...
49. The imitation insert is designed to test ...
50. The secret sharing method is used primarily to reduce risks ...
51. In an asymmetric encryption system for the independent operation of N subscribers it is required ...
52. For the initial distribution of keys ...
53.
Additional information
55. The length of the ciphertext must be ...
56. The substitution of an encrypted message involves ...
57. In a symmetric system, the recipient and the sender use to encrypt and decrypt the message ...
58. The average duration of a fricative sound is ...
59. The average duration of an explosive sound is ...
60. The disadvantage of asymmetric encryption systems is ...
Feedback
0Period | |||
1 month | 3 months | 12 months | |
0 | 0 | 0 | |
0 | 0 | 0 |