BSL-3 organisms are those that:
Why has Haemophilus influenzae type b (Hib) infections decre…
Why has Haemophilus influenzae type b (Hib) infections decreased in children?
It is vitally important to have a pure culture or isolated c…
It is vitally important to have a pure culture or isolated colonies when performing antimicrobial susceptibility testing (AST). This may require colonies to be “subbed out” prior to setting AST.
Which of the following encryption schemes does a ciphertext…
Which of the following encryption schemes does a ciphertext leak nothing about the key that was used?
What is log210 in the group Z11∗?
What is log210 in the group Z11∗?
Assume the Diffie-Hellman protocol is run by two parties in…
Assume the Diffie-Hellman protocol is run by two parties in the subgroup of Z23∗ generated by 2. (This subgroup has order 11.) If the first party chooses private exponent 3 and the second chooses private exponent 10, which of the following characterizes the execution of the protocol in this case?
Let H1, H2 be collision-resistant hash functions. Which of t…
Let H1, H2 be collision-resistant hash functions. Which of the following functions H3 is NOT necessarily collision-resistant?
True or false: CBC-mode encryption with PKCS #7 padding prov…
True or false: CBC-mode encryption with PKCS #7 padding provides message integrity, as long as the receiver makes sure to verify the padding upon decryption.
Assume CBC-mode encryption using an 8-byte (64-bit) block ci…
Assume CBC-mode encryption using an 8-byte (64-bit) block cipher. Say a sender encrypts the 8-byte message “sendme$2” (encoded in ASCII), resulting in ciphertext 0xFF 09 28 30 8C 93 81 06 39 D0 81 5A 07 79 17 43. Which of the following ciphertexts will decrypt to the message “sendme$4” ?
Assume a sender and receiver use the encrypt-and-authenticat…
Assume a sender and receiver use the encrypt-and-authenticate approach for variable-length messages, using CTR-mode encryption and a variant of CBC-MAC secure for authenticating variable-length data (and independent keys for each). Which of the following statements is true?