CET459 Chapter 11

¡Supera tus tareas y exámenes ahora con Quizwiz!

Each of the following is a characteristic of a secure hash algorithm except _______.

A. collisions should be rare*** B. the results of a hash function should not be reversed C. the hash should always be the same fixed size D. a message cannot be produced from a predefined hash

Which of the following is the strongest symmetric cryptographic algorithm?

Advanced Encryption Standard

If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, the key he uses to encrypt the message is _______.

Alice's public key

Hashing would not be used in which of the following examples?

Encrypting and decrypting e-mail attachments***

Which of the following has an onboard key generator and key storage facility, accelerated symmetric and asymmetric encryption, and can back up sensitive material in encrypted form?

Hardware Security Module (HSM)

A(n) _____ is not decrypted but is only used for comparison purposes.

Hash

_____ encrypts a hash with a shared secret key.

Hashed Message Authentication Code (HMAC)***

The areas of a file in which steganography can hide data include all of the following except ______.

In the directory structure of the file system***

Which of the following is a protection provided by hashing?

Integrity

The Microsoft Windows LAN Manager hash ______.

Is weaker than NTLMv2

_____ uses lattice-based cryptography and may be more resistant to quantum computing attacks.

NTRUENcrypt

Symmetric cryptographic algorithmsare also called ______.

Private key cryptography

Which of the following asymmetric cryptographic algorithms is the most secure?

RSA

Which of the following asymmetric encryption algorithms uses prime numbers?

RSA

Which of the following is not a basic security protection over information that cryptography can provide?

Stop loss

A digital signature can provide each of the following benefits except ______.

Verify the receiver

Proving that a user sent an e-mail message is known as ______.

Non-repudiation

What is data called that is to be encrypted by inputting into an encryption algorithm?

Plaintext

The Trusted Platform Module (TPM) _____.

Provides cryptographic services in hardware instead of software

_____ is a hash that uses two different and independent parallel chains of computation, the result of which are then combined at the end of the process.

RIPEMD


Conjuntos de estudio relacionados

PM - Foundations of Project Management - Module 1

View Set

Upper Extremity Anatomy and Positioning Review Sheet

View Set

Peds Sherpath Growth and Development and Health Promotion of Adolescents

View Set

Pre-Licensing Insurance Course Chapter 19 (Part 2)

View Set

Unit 10 Reviewing the Basics Quiz

View Set