7.1.14
Which of the following algorithms are used in asymmetric encryption? (Select two.)
Diffie-Hellman,RSA
Above all else, what must be protected to maintain the security and benefit of an asymmetric cryptographic solution, especially if it is widely used for digital certificates?
Private keys
Which of the following algorithms are used in symmetric encryption? (Select two.)
Blowfish,3DES
Which of the following can be classified as a stream cipher?
RC4
Mary wants to send a message to Sam in such a way that only Sam can read it. Which key should be used to encrypt the message?
Sam's public key
A receiver wants to verify the integrity of a message received from a sender. A hashing value is contained within the digital signature of the sender. Which of the following must the receiver use to access the hashing value and verify the integrity of the transmission?
Sender's public key
When a cryptographic system is used to protect data confidentiality, what actually takes place?
Unauthorized users are prevented from viewing or accessing the resource.
Which of the following encryption mechanisms offers the least security because of weak keys?
DES
Which type of password attack employs a list of pre-defined passwords that it tries against a login prompt?
Dictionary attack
Which term means a cryptography mechanism that hides secret communications within various forms of data?
Steganography