Domain 6 Questions
- Adam created a message and then computed a message digest based upon that message. He then altered a single character at the end of the message and then recomputed the message digest. Which one of the following statements about the second message digest is correct?
A. The second message digest should be one character different from the first digest.
B. The second message digest will be completely different from the first digest.
C. There may be minor differences in the second message digest,e but they will be toward the end of the digest.
D. The two digests will essentially be the same, with minor differences.
- Which one of the following encryption algorithms does not rely upon the difficulty of factoring large prime numbers to achieve its secrecy?
A. RSA
B. PGP
C. ECC
D. Diffie-Hellman
- Helen is concerned about an attack that may retrieve credit card numbers from memory in a point-of-sale terminal. What term best describes this scenario?
A. Data-in-transit
B. Data...