O'Reilly logo

Designing Network Security Second Edition by Merike Kaeo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Appendix E. Answers to Review Questions

1:

Cryptography is the basic building block that enables which of the following?

  1. Authentication

  2. Integrity

  3. Confidentiality

  4. All of the above

A1:

A, B, and C. Cryptography is the basic building block that enables authentication, integrity, and confidentiality. Most current authentication, integrity, and confidentiality technologies are derived from the following three cryptographic functions: symmetric encryption, asymmetric encryption, and one-way hash functions.

2:

True or false: The best security algorithms are designed in secret.

A2:

False. Most good security algorithms undergo years of scrutiny by the world's best cryptographers, who validate the strength of the algorithm.

3:

What is a brute-force attack? ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required