Cryptography- 4
Elliptic curve systems are which of the following? 1. Asymmetric algorithms 2. Symmetric algorithms 3. Public-key systems 4. Private-key systems
1 and 3
What is the bit size of IDEA? a. 40 b. 56 c. 64 d. 128
128
The key length of Message Digest 5 (MD5) is which of the following? a. 112 bits b. 128 bits c. 160 bits d. 256 bits
128 bits
What is the bit size of a secure hash algorithm (SHA)? a. 40 b. 56 c. 128 d. 160
160
The key length of Secure Hash Algorithm (SHA-1) is which of the following? a. 112 bits b. 128 bits c. 160 bits d. 256 bits
160 bits
What is the bit size of triple DES with three keys? a. 40 b. 56 c. 128 d. 168
168
In cryptography, the Rivest, Shamir, Adelman (RSA) scheme has which of the following pair of characteristics? 1. A secret key encryption algorithm system 2. An asymmetric cipher system 3. A public key encryption algorithm system 4. A symmetric cipher system
2 and 3
A message authentication code can protect against which of the following pair of actions? 1. Authorized, accidental data modification 2. Authorized, intentional data modification 3. Unauthorized, accidental data modification 4. Unauthorized, intentional data modification
3 & 4
Which of the following statements about secret key and message digest algorithms are not true? 1. The drive for message digest algorithms starts with public key cryptography 2. Message digest algorithms make the RSA much more useful 3. Secret key algorithm is designed to be irreversible 4. Message digest algorithm is designed to be reversible
3 and 4
The advanced encryption standard (AES) algorithm is currently not capable of using which of the following? a. 128 bits b. 192 bits c. 256 bits d. 320 bits
320 bits
What is the bit size of a DES? a. 40 b. 56 c. 64 d. 112
56
What is the bit size of SKIPJACK? a. 40 b. 56 c. 64 d. 80
80
The key exchange algorithm (KEA) requires which of the following? a. A 256-bit prime modulus b. A 512-bit prime modulus c. A 768-bit prime modulus d. A 1024-bit prime modulus
A 1024-bit prime modulus
The most common attack against cryptographic algorithms is: a. A ciphertext-only attack b. A brute force attack c. A known plaintext attack d. A chosen plaintext attack
A ciphertext-only attack
The elliptic curve system uses which of the following to create digital signatures? a. A hash algorithm b. A prime algorithm c. An inversion algorithm d. A linear algorithm
A hash algorithm
Which of the following is not a critical component of cryptographic key management system? a. A point-to-point environment b. A key distribution center environment c. A key translation center environment d. A key disclosure center environment
A key disclosure center environment
A digital certificate is: a. A password-protected file b. An encrypted file c. A password-protected and encrypted file d. A password-protected and modem-protected file
A password-protected and encrypted file
Message authentication is: A process of guaranteeing that the message was sent as received by the party identified in the header of the message b. A process of guaranteeing that the message was sent as received by the party identified in the footer of the message c. A process of guaranteeing that the message sent was received at the same time regardless of the location d. A process of guaranteeing that all delivered and undelivered messages are reconciled immediately
A process of guaranteeing that the message was sent as received by the party identified in the header of the message
Effective controls to detect attempts to replay an earlier successful authentication exchange do not include: a. A time-stamp b. A sequence number c. An unpredictable value d. A statistical random value
A statistical random value
The primary goal of a public key infrastructure (PKI) is to create which of the following? a. A closed environment b. A trusted environment c. An open environment d. A bounded environment
A trusted environment
During the design of data communication networks, a functional capability of providing link encryption and end-to-end encryption is addressed by which of the following? a. Administrative control b. Access control c. Cost control d. Technical control
Access control
The Rijndael algorithm uses which of the following? a. Advanced encryption standard, AES b. Data encryption standard, DES c. Digital signature standard, DSS d. Key exchange algorithm, KEA
Advanced encryption standard, AES
Which one of the following encryption keys is slow? a. Symmetric b. Asymmetric c. Semi-symmetric d. Semi-asymmetric
Asymmetric
To achieve effective security over transmission, indicate the area where encryption can be applied: a. At packet level b. At record level c. At file level d. At field level
At field level
A cryptographic module is undergoing testing. Which of the following provides the highest level of testing? a. At the algorithm level b. At the module level c. At the application level d. At the product level
At the application level
Data encryption standard (DES) cannot provide which of the following security services? a. Encryption b. Access control c. Integrity d. Authentication
Authentication
Cryptography provides all of the following services except: a. Authentication b. Confidentiality c. Integrity d. Availability
Availability
Digital signatures are not used for which of the following? a. Authentication b. Availability c. Non-repudiation d. Integrity
Availability
Public key technology and digital certificates do not provide which of the following security services? a. Authentication b. Non-repudiation c. Availability d. Data integrity
Availability
Electronic signatures and handwritten signatures are useful in their own ways. Which of the following statements is not true about these two types of signatures? a. Both signatures have the same legal status Robbins (Spring 2019) b. Both signatures are subject to forgery with equal difficulty c. Both signatures link a document with a particular person d. Both signatures are subject to trickery or coercion
Both signatures are subject to forgery with equal difficulty
Public-key cryptographic systems are not suitable for which of the following? a. Link encryption b. End-to-end encryption c. Bulk encryption d. Session encryption
Bulk encryption
Which of the following symmetric key block cipher algorithms provide authentication services? a. ECB b. CBC c. CBC-MAC d. CFB
CBC-MAC
Which of the following plays a critical role in ensuring the integrity of public keys in the commercial sector PKI? a. Registration authority, RA b. Access Certification for Electronic Services, ACES c. Federal Technology Services, FTS d. Certification authority, CA
Certification authority, CA
In order for message digests to be effectively used in digital certificates, they must be: a. Access-resistant b. Authorization-resistant c. Collision-resistant d. Attack-resistant
Collision-resistant
Criteria for trusting a digital certificate do not depend on which of the following factors? a. Compliance with a X.509 standard b. The strength of the cryptography used c. The identity validation process used d. Compliance with a X.500 standard
Compliance with a X.500 standard
In the U.S., the Clipper chip is not designed for: a. Telephones b. Facsimiles c. Computer networks d. Low-speed applications
Computer networks
Which of the following is a major problem in implementing the Rivest, Shamir, and Adelman (RSA) encryption algorithm? a. Computing power required to generate the keys b. Large numbers used in the algorithm c. Prime numbers needed in the algorithm d. History of known security break-ins
Computing power required to generate the keys
Asymmetric-key cryptography is not ideally suited for which of the following? a. Authentication b. Confidentiality c. Integrity d. Non-repudiation
Confidentiality
Symmetric key algorithms are ideally suited for which of the following? a. Authentication b. Integrity c. Confidentiality d. Non-repudiation
Confidentiality
Cryptology is defined as which of the following? a. Crypto-algorithm + crypto-operation b. Crypto-period + crypto-security c. Cryptography + cryptanalysis d. Cryptographic authentication + cryptographic key
Cryptography + cryptanalysis
Cryptography is a branch of mathematics based on the transformation of data. Which of the following is not a true statement about cryptography used in computer security? a. Cryptography ensures data confidentiality b. Cryptography ensures data integrity c. Cryptography ensures data availability d. Cryptography ensures electronic signatures
Cryptography ensures data availability
Which of the following technologies are required to ensure reliable and secure telecommunications networks? a. Cryptography and trusted encryption keys b. Advanced identification and authentication techniques and cryptography c. Firewalls, cryptography, and trusted encryption keys d. Cryptography, advanced identification and authentication techniques, firewalls, and trusted encryption keys
Cryptography, advanced identification and authentication techniques, firewalls, and trusted encryption keys
Which one of the following provides data integrity? a. Cyclic redundancy checks, CRC b. Digitized signatures c. Passwords and PINs d. Biometrics
Cyclic redundancy checks, CRC
Which of the following is an example of symmetric key encryption algorithm? a. MD5 b. DES c. RSA d. MD4
DES
Which of the following threats is not addressed by digital signatures and random number challenges? a. Masquerade b. Replay attacks c. Password compromise d. Denial-of-service
DOS
Which of the following protect the X.509 public key certificate? a. DSA and SHA-1 b. DES and SHA c. 3DES and MD4 d. IDEA and MD5
DSA and SHA-1
Which of the following is not included in the digital signature standard (DSS)? a. Digital signature algorithm, DSA b. Data encryption standard, DES c. Rivest, Shamir, Adelman algorithm, RSA d. Elliptic curve digital signature algorithm, ECDSA
Data encryption standard, DES
The SHA and HMAC provide the basis for which of the following? a. Data integrity b. Confidentiality c. Authentication d. Non-repudiation
Data integrity
Which of the following is good practice for organizations issuing digital certificates? a. Develop a consulting agreement b. Develop an employment agreement c. Develop a subscriber agreement d. Develop a security agreement
Develop a subscriber agreement
The best technique to thwart network masquerading is through the use of: a. Dial-back technique b. Dial-forward technique c. File encryption only d. Dial-back combined with data encryption
Dial-back combined with data encryption
Which of the following is an example of asymmetric encryption algorithm? a. Diffie-Hellman b. DES c. 3DES d. IDEA
Diffie-Hellman
It is particularly important to protect audit trail data against modification during communication between parties. Which of the following security control techniques would protect against such modifications? a. Strong access controls such as passwords b. Digital signatures c. Logging "before and after" image records of modifications d. Review of audit trail data
Digital signatures
Which of the following will mitigate threat to non-repudiation? a. Secure hashes b. Message digest 4 c. Message digest 5 d. Digital signatures and certificates
Digital signatures and certificates
Which of the following is primarily required for continued functioning of a public key infrastructure (PKI)? a. Disaster recovery plans b. Service level plans c. Fraud prevention plans d. Legal liability plans
Disaster recovery plans
Which of the following is the best technique to detect duplicate transactions? a. ECDSA and SHA b. ECDSA and SHA-1 c. ECDSA and MID d. ECDSA and MD5
ECDSA and MID
When compared to the Rivest, Shamir, Adelman (RSA) algorithm, the Digital Signature Standard (DSS) does not provide a. Digital signature b. Authentication c. Encryption d. Data integrity
Encryption
Which of the following can be used in conjunction with a traffic padding security mechanism? a. Passwords b. Smart tokens c. Encryption d. Memory tokens
Encryption
Which of the following methods provide the highest security to protect access from unauthorized people? a. Encryption b. Call-back or dial-back systems c. Magnetic cards with personal identification number d. User ID and password
Encryption
Which of the following provides both integrity and confidentiality services for data and messages? a. Digital signatures b. Encryption c. Cryptographic checksums d. Granular access control
Encryption
Which of the following statements about encryption is not true? a. Software encryption degrades system performance b. Hardware encryption is faster c. Encryption is a desirable option in a local-area network (LAN) d. Key management is an administrative burden
Encryption is a desirable option in a local-area network (LAN)
Which of the following is not a common method of attacking a computer system? a. Password cracking b. Packet sniffing c. Encryption key breaking d. Sendmail
Encryption key breaking
Effective controls to ensure data integrity of messages does not include: a. Encryption algorithms b. Hashing algorithms c. File seals d. File labels
File labels
Which of the following is not a valid PKI architecture? a. Gateway architecture b. Hierarchical architecture c. Mesh architecture d. Bridge architecture
Gateway architecture
A simpler alternative to a digital signature is a: a. Hash function b. Digital certificate c. Handwritten signature d. Certificate authority
Hash function
Which of the following is used to encrypt IP packets? a. PPTP b. HTTP c. IPSEC d. PPP
IPSEC
Hash-based message authentication code (HMAC) is heavily used in which of the following? a. PPP operations b. SET operations c. IPSEC operations d. PPTP operations
IPSEC operations
IPSEC uses which of the following for negotiation to take place? a. Diffie-Hellman exchange b. IPSEC SA c. ISAKMP SA d. RSA exchange
ISAKMP SA
Which of the following provides the level of "trust" required for the digital certificates to reliably complete a transaction? a. Certificate policy, CP b. Certification practices statement, CPS c. Identity proofing d. Outsourcing
Identity proofing
Which one of the following certificate authorities (CA) is subordinate to another CA and has a CA subordinate to itself? a. Root CA b. Superior CA c. Intermediate CA d. Subordinate CA
Intermediate CA
X.509 Version 3 standard, compared to previous versions, provide which of the following? a. Authentication b. Encryption c. Interoperability d. Digital signature
Interoperability
Which of the following statements is not true about asymmetric-key cryptography? a. It is used to provide an authentication service b. It is used to provide a digital signature service c. It can be used to encrypt large amounts of data d. It can be used to provide non-repudiation service
It can be used to encrypt large amounts of data
Which of the following security services or statements is not true with the U.S. digital signature standard (DSS)? a. It generates a digital signature b. It does not require a third-party certificate c. It assures non-repudiation of a message d. It verifies a digital signature
It does not require a third-party certificate
The freeware product, Tripwire is which of the following? a. It is a file integrity checker b. It is a file confidentiality checker c. It is a file availability checker d. It is a file damage checker
It is a file integrity checker
Which of the following statements is not true about Secure Sockets Layer (SSL)? a. It uses both symmetric and asymmetric key cryptography b. It is used to perform authentication c. It is a point-to-point protocol d. It is a session-oriented protocol
It is a point-to-point protocol
Which of the following is the best definition of a public key infrastructure (PKI)? a. It is a policy b. It is an infrastructure c. It is hardware d. It is software
It is an infrastructure
Which of the following is not true about one-time pad? a. It is breakable b. Each key is used only once c. It is unbreakable d. Each key is used for only one message
It is breakable
IDEA is which of the following? a. It is asymmetric and uses a 128-bit key b. It is symmetric and uses a 56-bit key c. It is asymmetric and uses a 160-bit key d. It is symmetric and uses a 128-bit key
It is symmetric and uses a 128-bit key
Which of the following statements about digital signatures is not true? a. It enhances authentication b. It makes repudiation by the sender possible c. It prevents non-repudiation by the receiver d. It makes repudiation by the sender impossible
It makes repudiation by the sender possible
The major requirement for a public key certification authority is that: a. It must be independent b. It must have a proper contract c. It must be trusted d. It must have a good reputation
It must be trusted
Which of the following is not true about the Encapsulating Security Payload (ESP) of the IPSEC protocol? a. It protects replay attacks b. It protects integrity c. It protects confidentiality d. It protects the IP header
It protects the IP header
Which is not true about the Authentication Header (AH) of the IPSEC protocol? a. It protects against modification b. It provides privacy protection c. It provides connectionless integrity d. It protects against replay attacks
It provides privacy protection
Which of the following statements is true about elliptic curve cryptography? a. It uses an asymmetric-key algorithm b. It competes with the Whitfield-Diffie algorithm c. It competes with the digital signature algorithm d. It uses a symmetric-key algorithm
It uses an asymmetric-key algorithm
In cryptographic key management, key zeroization means which of the following? a. Key recovery b. Key re-generation c. Key destruction d. Key correction
Key destruction
Which of the following is not part of cryptographic key management process? a. Key layering b. Key distribution c. Key storage d. Key generation
Key layering
Which of the following should not be subject to review during a periodic review of a cryptographic system? a. Parameters b. Operation c. Keys d. Controls
Keys
Which of the following digital certificate levels provide a photo identification? a. Level 1 b. Level 2 c. Level 3 d. Level 4
Level 3
Which of the following digital certificate levels provide a stronger identification and authentication? a. Level 1 b. Level 2 c. Level 3 d. Level 4
Level 3
The control technique that achieves confidentiality of data in transfer is: a. Line encryption b. One-time password c. File encryption d. End-to-end encryption
Line encryption
What is the best way to encrypt data? a. Bulk encryption b. Link encryption c. Transaction encryption d. End-to-end encryption
Link encryption
A birthday attack is targeted at which of the following? a. MD5 b. SSL c. SLIP d. SET
MD5
Which of the following is a hash algorithm? a. DES b. IDEA c. 3DES d. MD5
MD5
Which of the following are examples of cryptographic hash functions? a. SHA and 3DES b. DES and CBC c. MD5 and SHA-1 d. DAC and MAC
MD5 and SHA-1
Which of the following will mitigate threat to integrity when private key cryptography is used? a. Message authentication code b. Message identifier c. Message header d. Message trailer
Message authentication code
Controls to protect against malicious changes to a message include: a. Data checksums and cyclic redundancy code b. Message integrity code and message authentication code c. Message integrity code and cyclic redundancy code d. Data checksums and message authentication code
Message integrity code and message authentication code
Which of the following encryption schemes is more secure? a. Encrypting once with the same key b. Encrypting twice with the same key c. Encrypting twice with two keys d. Multiple encryption
Multiple encryption
The Secure Sockets Layer (SSL) transport protocol provides all of the following services except: a. Mutual authentication b. Message privacy c. Message integrity d. Mutual handshake
Mutual handshake
If "N" keys are required to reconstruct the original key, application of the "Split Knowledge" concept requires how many keys to be documented? a. N keys b. N-1 keys c. N+1 keys d. N+2 keys
N-1 keys
tty good privacy (PGP) is an electronic-mail security program. Which of the following statements is true about PGP? a. PGP is a standard b. PGP is a product c. PGP is interoperable d. PGP is not portable
PGP is a product
Countermeasures against replay attacks do not include which of the following? a. Time-stamps b. Protocols c. Nonces d. Kerberos
Protocols
Digital signature is another type of electronic signature. A digital signature is implemented using which of the following cryptographic techniques? a. Public key cryptography b. Key escrow cryptography c. Secret key cryptography d. Hybrid cryptographic systems
Public key cryptography
Which of the following will mitigate threat to integrity when public key cryptography is used? a. Data checksums and secure hashes b. Public key signatures and secure hashes c. Cyclic redundancy checks and secure hashes d. Simple checksums and secure hashes
Public key signatures and secure hashes
Which of the following binds the identity of a user to his public key? a. Private key technology and digital certificates b. Symmetric key technology and digital signatures c. Public key technology and digital certificates d. Cryptographic key technology and electronic signatures
Public key technology and digital certificates
What keys are used to create digital signatures? a. Public-key cryptography b. Private-key cryptography c. Hybrid-key cryptography d. Primary-key cryptography
Public-key cryptography
Zero-knowledge proof is used in which of the following applications? a. Public-key encryption process b. Zeriozation process c. Degaussing operation d. Data remanence operation
Public-key encryption process
Which of the following is an example of public-key cryptographic systems? a. MAC and DAC b. DES and 3DES c. RSA and IDEA d. RSA and DSS
RSA and DSS
What is not true about Rivest, Shamir, Adelman (RSA) algorithm? a. RSA's key length is variable b. Long key can be used in RSA for enhanced security c. Short key can be used for RSA efficiency d. RSA is faster to compute than DES and IDEA
RSA is faster to compute than DES and IDEA
Which of the following is true about the Rivest, Shamir, Adelman (RSA) algorithm? a. RSA produces a 160-bit hash b. RSA produces a 128-bit hash c. RSA uses a 512-1024 bit key d. RSA uses an 80-bit key
RSA uses a 512-1024 bit key
Which of the following features of Secure HyperText Transfer Protocol (SHTTP) achieves higher levels of protection? a. Freshness feature b. Algorithm independence feature c. Syntax compatibility feature d. Recursive feature
Recursive feature
The National Institute of Standards and Technology (NIST) selected which of the following as the advanced encryption standard (AES)? a. MARS algorithm b. Serpent algorithm c. Rijndael algorithm d. Twofish algorithm
Rijndael algorithm
Which one of the following uses a private-key system? a. RSA algorithm b. Knapsack algorithm c. Rijndael algorithm d. El Gamal algorithm
Rijndael algorithm
Which of the following is implemented in the Version 3 of X.509 protocol? a. SSL b. Regular MIME c. SHA d. S/MIME
S/MIME
Which of the following algorithms is used to create a message digest? a. SSL b.SHA c. SLIP d. SKIP
SHA
The two protocol algorithms used in cryptographic applications for compressing data are which of the following? a. SHA and MD5 b. 3DES and IDEA c. DSA and DSS d. RSA and SKIPJACK
SHA and MD5
Message digests use which of the following algorithms? a. SSL and MD4 b. DES and RC4 c. IDEA and RC4 d. SHA-1 and MD5
SHA-1 and MD5
The major components of IPSEC include which of the following? a. SPI, FH, and SPE b. SPI, AH, and ESP c. SPI, RH, and PSE d. SPI, KH, and EPS
SPI, AH, and ESP
Hash-based message authentication code (HMAC) is which of the following? a. Public key + hash function b. Primary key + hash function c. Secret key + hash function d. Secondary key + hash function
Secret key + hash function
Which of the following should be used to prevent an eavesdropping attack from remote access to firewalls? a. File encryption b. Bulk encryption c. Session encryption d. Stream encryption
Session encryption
Which of the following statements is true? Rivest, Shamir, Adelman (RSA) algorithm has a: a. Slower signature generation and slower verification than DSA b. Slower signature generation and faster verification than DSA c. Faster signature generation and faster verification than DSA d. Faster signature generation and slower verification than DSA
Slower signature generation and faster verification than DSA
A fundamental principle for protecting cryptographic keys includes which of the following? a. Zeroization and total knowledge b. Split knowledge and dual control c. Single control and formal proof d. Zero-knowledge proof and triple control
Split knowledge and dual control
Which one of the following facilitates data/information hiding in computer systems? a. Polygraph b. Holography c. Steganography d. Cryptography
Steganography
Which of the following is not part of PKI data structures? a. Public key certificate b. Certificate revocation lists c. Attribute certificate d. Subject certificate
Subject certificate
Which of the following key algorithms decrypt data with the same key used for encryption? a. Symmetric key algorithm b. Asymmetric key algorithm c. Symmetric and public key algorithms d. Asymmetric and secret key algorithms
Symmetric key algorithm
Cryptographic key management is a difficult problem for which of the following? a. Symmetric-key algorithms b. Asymmetric-key algorithms c. Hybrid-key algorithms d. Hash-key algorithms
Symmetric-key algorithms
Which of the following is required to accept digital certificates from multiple vendor certification authorities? a. The application must be PKI-enabled b. The application must be PKI-aware c. The application must use X.509 Version 3 d. The application must use PKI-vendor "plug-ins"
The application must use X.509 Version 3
Which of the following is not usually seen on a digital certificate? a. The owner name b. The public key c. The effective dates for keys d. The insurance company name
The insurance company name
The least significant bit in a bit string is which of the following? a. The left-most bit of a bit string b. The right-most bit of a bit string c. The top-most bit of a bit string d. The bottom-most bit of a bit string
The right-most bit of a bit string
Which of the following independent statements is not true about security? a. The security of the cryptography can never be greater than the security of the people using it b. The security of any electronic-mail program cannot be greater than the security of the machine where the encryption is performed c. The security of an encryption algorithm is no more or less than the security of the key d. The security of each electronic-mail message is encrypted with a standard, non-random key
The security of each electronic-mail message is encrypted with a standard, non-random key
Which of the following statements is true about one-way hash function and encryption algorithm? a. They both convert a plaintext into an unintelligent text b. They both can reverse from output to input c. They both do not destroy information d. They both operate on a key
They both convert a plaintext into an unintelligent text
Pretty good privacy (PGP) and privacy-enhanced mail (PEM) are electronic-mail security programs. Which of the following statements is not true about PGP and PEM? a. They both encrypt messages b. They both sign messages c. They both have same uses d. They are both based on public-key cryptography
They both have same uses
Which of the following statement is true about hash functions? a. They produce a large message digest than the original message b. They produce a much smaller message digest than the original message c. They produce the same size message digest as the original message d. They produce a very large message digest than the original message
They produce a much smaller message digest than the original message
Who is best qualified to evaluate the security of Public Key Infrastructure (PKI) systems and procedures? a. Certification authorities b. Registration authorities c. Third parties d. Subscribers
Third parties
What is the major purpose of a digital certificate? a. To achieve availability goal b. To maintain more information on the certificate c. To verify the certificate authority d. To establish user authentication
To establish user authentication
IPSEC protocols use which of the following modes?
Transport mode and tunnel mode
Public-key cryptographic systems are knows as: a. Two-keys or asymmetric systems b. Two-keys or symmetric systems c. One-key or symmetric systems d. One-key or asymmetric systems
Two-keys or asymmetric systems
Which of the following provides a unique user ID for a digital certificate? a. User name b. User organization c. User e-mail d. User message digest
User message digest
The least powerful method of protecting confidential data or program files is by: a. Scrambling the data b. Encoding the data before transmission c. Decoding the data after transmission d. Using passwords and other identification codes
Using passwords and other identification codes
The key length of the Rijndael algorithm is which of the following? a. Fixed b. Variable c. Semi-fixed d. Semi-variable
Variable
What is the bit size of a RSA? a. Fixed b. Variable c. Semi-fixed d. Semi-variable
Variable
The major advantage of a checksum program is that it: a. Adds more bytes to programs b. Verifies integrity of files c. Increases boot-up time d. Misleads a program recompilation
Verifies integrity of files
The Advanced Encryption Standard (AES) algorithms are: a. Very slow and very strong b. Very fast and very weak c. Very fast and very strong d. Very slow and very weak
Very fast and very strong
Digital certificates are defined by which of the following International Telecommunications Union (ITU) standards? a. X.400 b. X.25 c. X.12 d. X.509
X.509
A physical security measure for cryptographic keys is which of the following? a. Zeroization b. Zero-knowledge proof c. Zero defects proof d. Zero quantum proof
Zeroization
A hash function is which of the following? a. One-to-one function b. One-to-many function c. Many-to-one function d. Many-to-many function
any-to-one function
Which of the following encryption algorithms or schemes is absolutely unbreakable? a. Data encryption standard (DES) b. One-time pad c. International data encryption algorithm (IDEA) d. RC2 and RC4
b. One-time pad
What is the correct sequence of keys in a triple data encryption standard (3DES) algorithm operating with three keys? a. encrypt-decrypt-encrypt b. decrypt-encrypt-decrypt c. encrypt-encrypt-encrypt d. decrypt-decrypt-decrypt
encrypt-encrypt-encrypt
Most cryptographic attacks focus on which of the following? a. Cryptographic keys b. Cryptographic passwords c. Cryptographic parameters d. Cryptographic PINs
ographic parameters