Chapter 3 Review

¡Supera tus tareas y exámenes ahora con Quizwiz!

Abram was asked to explain to one of his coworkers the XOR cipher. He showed his coworker an example of adding two bits, 1 and 1. What is the result of this sum? A. 16 B. 2 C. 1 D. 0

0

MD5 uses a hash value to create a hash which is typically a 32 character hex number and how many bits? A. 192 B. 98 C. 64 D. 128 E. 56 F. 256

128

Which of these is the strongest symmetric cryptographic algorithm? A. RC 1 B. Advanced Encryption Standard C. Triple Data Encryption Standard D. Data Encryption Standard

Advanced Encryption Standard

If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message? A. Bob's public key B. Alice's private key C. Bob's private key D. Alice's public key

Alice's public key

Which of these is NOT a characteristic of a secure hash algorithm? A. The hash should always be the same fixed size B. The results of a hash function should not be reversed C. Collisions should be rare D. A message cannot be produced from a predefined hash.

Collisions should be rare.

Alyosha was explaining to a friend the importance of protecting a cryptographic key from cryptoanalysis. He said that the key should not relate in a simple way to the cipher text. Which protection is Alyosha describing? A. Chaos B. Diffusion C. Confusion D. Integrity

Confusion

Which of the following key exchanges uses the same keys each time? A. Elliptic Curve Diffie-Hellman (ECDH) B. Diffie-Hellman Ephemeral (DHE) C. Diffie-Hellman (DH) D. Diffie-Hellman-RSA (DHRSA)

Diffie-Hellman (DH)

A(n) ________ is not decrypted but is only used for comparison purposes. A. Key B. Stream C. Digest D. Algorithm

Digest

Which of these has an onboard key generator and key storage facility, as well as accelerated symmetric and asymmetric encryption, and can back up sensitive material in encrypted form? A. self-encrypting hard disk drives (SED) B. Trusted Platform Module (TPM) C. encrypted hardware-based USB devices D. Hardware Security Module (HSM)

Hardware Security Module (HSM)

What is PBKDF2 for? A. Upgrading blowfish B. Enriching Diff-Hellman C. Hashing passwords for storage D. Launching brute force attack E. Key exchange F. Upgrading PGP

Hashing passwords for storage

What is a characteristic of the Trusted Platform Module (TPM)? A. It is available only on Windows computers running BitLocker B. It includes a pseudorandom number generator (PRNG) C. It provides cryptographic services in hardware instead of software D. It allows the user to boot a corrupted disk and repair it

It provides cryptographic services in hardware instead of software

Which of the following is true concerning RC4? A. It was the most widely used software stream cipher. B. It was not TLS compatible. C. It was not WEP compatible. D. It was the most widely used software block cipher.

It was the most widely used software stream cipher.

At a staff meeting one of the technicians suggested that the enterprise protect its new web server by hiding it and not telling anyone where it is located. Losif raised his hand and said that security through obscurity was a poor idea. Why did he say that? A. It depends too heavily upon non-repudiation in order for it to succeed. B. It would be too costly to have one isolated server by itself. C. It would be essentially impossible to keep its location a secret from everyone. D. It is an unproven approach and has never been tested.

It would be essentially impossible to keep its location a secret from everyone.

RIPEMD is a suite of cryptographic hash functions developed basing upon: A. SHA B. 3DES C. Blowfish D. MD5 E. MD4

MD4

Proving that a user sent an email message is known as ________. A. Repudiation B. Non-Repudiation C. Integrity D. Availability

Non-Repudiation

Public key systems that generate random public keys that are different for each session are called ________. A. Diffie-Hellman (DH) B. Public Key Exchange (PKE) C. Elliptic Curve Diffie-Hellman (ECDH) D. Perfect Forward Secrecy

Perfect Forward Secrecy

What is data called that is to be encrypted by inputting it into a cryptographic algorithm? A. Plaintext B. Opentext C. Cleartext D. Ciphertext

Plaintext

Alexei was given a key to a substitution cipher. The key showed that the entire alphabet was rotated 13 steps. What type of cipher is this? A. AES B. XAND13 C. Alphabetic D. ROT13

ROT13

Illya was asked to recommend the most secure asymmetric cryptographic algorithm to his supervisor. Which of the following did he choose? A. RSA B. SHA-2 C. BTC-2 D. ME-312

RSA

Which of these is NOT a basic security protection for information that cryptography can provide? A. Confidentiality B. Integrity C. Authenticity D. Risk Loss

Risk Loss

What is the latest version of the Secure Hash Algorithm? A. SHA-3 B. SHA-4 C. SHA-5 D. SHA-2

SHA-3

With this type of key cryptography, the sender and receiver of a message share a single common key. A. Standard B. Symmetric C. Metric D. Asymmetric

Symmetric

Egor wanted to use a digital signature. Which of the following benefits will the digital signature not provide? A. Enforce Nonrepudiation B. Verify the sender C. Prove the integrity of the message D. Verify the receiver

Verify the receiver

Hashing aims to produce: A. a 56 bit string B. a 64 bit string C. a 128 bit string D. a variable-size bit string E. a fixed-size bit string

a fixed-size bit string

The Hashed Message Authentication Code (HMAC) ________. A. hashes the DHE key only B. hashes only the message C. hashes only the key D. hashes the key and the message

hashes the key and the message

Which areas of a file cannot be used by steganography to hide data? A. in areas that contain the content data itself B. in the file header fields that describe the file C. in data that is used to describe the content or structure of the actual data D. in the directory structure of the file system

in the directory structure of the file system


Conjuntos de estudio relacionados

Chapter 11: The Late Baroque Handel

View Set

A& P II Female Reproductive System Structure and Function

View Set

Chapter 19/3: Florida Life Review

View Set

Anatomy & Physiology II Test 3 Study

View Set

Ruby Association Certified Ruby Examination Silver Sample Questions

View Set