Cryptography- 4

¡Supera tus tareas y exámenes ahora con Quizwiz!

Elliptic curve systems are which of the following? 1. Asymmetric algorithms 2. Symmetric algorithms 3. Public-key systems 4. Private-key systems

1 and 3

What is the bit size of IDEA? a. 40 b. 56 c. 64 d. 128

128

The key length of Message Digest 5 (MD5) is which of the following? a. 112 bits b. 128 bits c. 160 bits d. 256 bits

128 bits

What is the bit size of a secure hash algorithm (SHA)? a. 40 b. 56 c. 128 d. 160

160

The key length of Secure Hash Algorithm (SHA-1) is which of the following? a. 112 bits b. 128 bits c. 160 bits d. 256 bits

160 bits

What is the bit size of triple DES with three keys? a. 40 b. 56 c. 128 d. 168

168

In cryptography, the Rivest, Shamir, Adelman (RSA) scheme has which of the following pair of characteristics? 1. A secret key encryption algorithm system 2. An asymmetric cipher system 3. A public key encryption algorithm system 4. A symmetric cipher system

2 and 3

A message authentication code can protect against which of the following pair of actions? 1. Authorized, accidental data modification 2. Authorized, intentional data modification 3. Unauthorized, accidental data modification 4. Unauthorized, intentional data modification

3 & 4

Which of the following statements about secret key and message digest algorithms are not true? 1. The drive for message digest algorithms starts with public key cryptography 2. Message digest algorithms make the RSA much more useful 3. Secret key algorithm is designed to be irreversible 4. Message digest algorithm is designed to be reversible

3 and 4

The advanced encryption standard (AES) algorithm is currently not capable of using which of the following? a. 128 bits b. 192 bits c. 256 bits d. 320 bits

320 bits

What is the bit size of a DES? a. 40 b. 56 c. 64 d. 112

56

What is the bit size of SKIPJACK? a. 40 b. 56 c. 64 d. 80

80

The key exchange algorithm (KEA) requires which of the following? a. A 256-bit prime modulus b. A 512-bit prime modulus c. A 768-bit prime modulus d. A 1024-bit prime modulus

A 1024-bit prime modulus

The most common attack against cryptographic algorithms is: a. A ciphertext-only attack b. A brute force attack c. A known plaintext attack d. A chosen plaintext attack

A ciphertext-only attack

The elliptic curve system uses which of the following to create digital signatures? a. A hash algorithm b. A prime algorithm c. An inversion algorithm d. A linear algorithm

A hash algorithm

Which of the following is not a critical component of cryptographic key management system? a. A point-to-point environment b. A key distribution center environment c. A key translation center environment d. A key disclosure center environment

A key disclosure center environment

A digital certificate is: a. A password-protected file b. An encrypted file c. A password-protected and encrypted file d. A password-protected and modem-protected file

A password-protected and encrypted file

Message authentication is: A process of guaranteeing that the message was sent as received by the party identified in the header of the message b. A process of guaranteeing that the message was sent as received by the party identified in the footer of the message c. A process of guaranteeing that the message sent was received at the same time regardless of the location d. A process of guaranteeing that all delivered and undelivered messages are reconciled immediately

A process of guaranteeing that the message was sent as received by the party identified in the header of the message

Effective controls to detect attempts to replay an earlier successful authentication exchange do not include: a. A time-stamp b. A sequence number c. An unpredictable value d. A statistical random value

A statistical random value

The primary goal of a public key infrastructure (PKI) is to create which of the following? a. A closed environment b. A trusted environment c. An open environment d. A bounded environment

A trusted environment

During the design of data communication networks, a functional capability of providing link encryption and end-to-end encryption is addressed by which of the following? a. Administrative control b. Access control c. Cost control d. Technical control

Access control

The Rijndael algorithm uses which of the following? a. Advanced encryption standard, AES b. Data encryption standard, DES c. Digital signature standard, DSS d. Key exchange algorithm, KEA

Advanced encryption standard, AES

Which one of the following encryption keys is slow? a. Symmetric b. Asymmetric c. Semi-symmetric d. Semi-asymmetric

Asymmetric

To achieve effective security over transmission, indicate the area where encryption can be applied: a. At packet level b. At record level c. At file level d. At field level

At field level

A cryptographic module is undergoing testing. Which of the following provides the highest level of testing? a. At the algorithm level b. At the module level c. At the application level d. At the product level

At the application level

Data encryption standard (DES) cannot provide which of the following security services? a. Encryption b. Access control c. Integrity d. Authentication

Authentication

Cryptography provides all of the following services except: a. Authentication b. Confidentiality c. Integrity d. Availability

Availability

Digital signatures are not used for which of the following? a. Authentication b. Availability c. Non-repudiation d. Integrity

Availability

Public key technology and digital certificates do not provide which of the following security services? a. Authentication b. Non-repudiation c. Availability d. Data integrity

Availability

Electronic signatures and handwritten signatures are useful in their own ways. Which of the following statements is not true about these two types of signatures? a. Both signatures have the same legal status Robbins (Spring 2019) b. Both signatures are subject to forgery with equal difficulty c. Both signatures link a document with a particular person d. Both signatures are subject to trickery or coercion

Both signatures are subject to forgery with equal difficulty

Public-key cryptographic systems are not suitable for which of the following? a. Link encryption b. End-to-end encryption c. Bulk encryption d. Session encryption

Bulk encryption

Which of the following symmetric key block cipher algorithms provide authentication services? a. ECB b. CBC c. CBC-MAC d. CFB

CBC-MAC

Which of the following plays a critical role in ensuring the integrity of public keys in the commercial sector PKI? a. Registration authority, RA b. Access Certification for Electronic Services, ACES c. Federal Technology Services, FTS d. Certification authority, CA

Certification authority, CA

In order for message digests to be effectively used in digital certificates, they must be: a. Access-resistant b. Authorization-resistant c. Collision-resistant d. Attack-resistant

Collision-resistant

Criteria for trusting a digital certificate do not depend on which of the following factors? a. Compliance with a X.509 standard b. The strength of the cryptography used c. The identity validation process used d. Compliance with a X.500 standard

Compliance with a X.500 standard

In the U.S., the Clipper chip is not designed for: a. Telephones b. Facsimiles c. Computer networks d. Low-speed applications

Computer networks

Which of the following is a major problem in implementing the Rivest, Shamir, and Adelman (RSA) encryption algorithm? a. Computing power required to generate the keys b. Large numbers used in the algorithm c. Prime numbers needed in the algorithm d. History of known security break-ins

Computing power required to generate the keys

Asymmetric-key cryptography is not ideally suited for which of the following? a. Authentication b. Confidentiality c. Integrity d. Non-repudiation

Confidentiality

Symmetric key algorithms are ideally suited for which of the following? a. Authentication b. Integrity c. Confidentiality d. Non-repudiation

Confidentiality

Cryptology is defined as which of the following? a. Crypto-algorithm + crypto-operation b. Crypto-period + crypto-security c. Cryptography + cryptanalysis d. Cryptographic authentication + cryptographic key

Cryptography + cryptanalysis

Cryptography is a branch of mathematics based on the transformation of data. Which of the following is not a true statement about cryptography used in computer security? a. Cryptography ensures data confidentiality b. Cryptography ensures data integrity c. Cryptography ensures data availability d. Cryptography ensures electronic signatures

Cryptography ensures data availability

Which of the following technologies are required to ensure reliable and secure telecommunications networks? a. Cryptography and trusted encryption keys b. Advanced identification and authentication techniques and cryptography c. Firewalls, cryptography, and trusted encryption keys d. Cryptography, advanced identification and authentication techniques, firewalls, and trusted encryption keys

Cryptography, advanced identification and authentication techniques, firewalls, and trusted encryption keys

Which one of the following provides data integrity? a. Cyclic redundancy checks, CRC b. Digitized signatures c. Passwords and PINs d. Biometrics

Cyclic redundancy checks, CRC

Which of the following is an example of symmetric key encryption algorithm? a. MD5 b. DES c. RSA d. MD4

DES

Which of the following threats is not addressed by digital signatures and random number challenges? a. Masquerade b. Replay attacks c. Password compromise d. Denial-of-service

DOS

Which of the following protect the X.509 public key certificate? a. DSA and SHA-1 b. DES and SHA c. 3DES and MD4 d. IDEA and MD5

DSA and SHA-1

Which of the following is not included in the digital signature standard (DSS)? a. Digital signature algorithm, DSA b. Data encryption standard, DES c. Rivest, Shamir, Adelman algorithm, RSA d. Elliptic curve digital signature algorithm, ECDSA

Data encryption standard, DES

The SHA and HMAC provide the basis for which of the following? a. Data integrity b. Confidentiality c. Authentication d. Non-repudiation

Data integrity

Which of the following is good practice for organizations issuing digital certificates? a. Develop a consulting agreement b. Develop an employment agreement c. Develop a subscriber agreement d. Develop a security agreement

Develop a subscriber agreement

The best technique to thwart network masquerading is through the use of: a. Dial-back technique b. Dial-forward technique c. File encryption only d. Dial-back combined with data encryption

Dial-back combined with data encryption

Which of the following is an example of asymmetric encryption algorithm? a. Diffie-Hellman b. DES c. 3DES d. IDEA

Diffie-Hellman

It is particularly important to protect audit trail data against modification during communication between parties. Which of the following security control techniques would protect against such modifications? a. Strong access controls such as passwords b. Digital signatures c. Logging "before and after" image records of modifications d. Review of audit trail data

Digital signatures

Which of the following will mitigate threat to non-repudiation? a. Secure hashes b. Message digest 4 c. Message digest 5 d. Digital signatures and certificates

Digital signatures and certificates

Which of the following is primarily required for continued functioning of a public key infrastructure (PKI)? a. Disaster recovery plans b. Service level plans c. Fraud prevention plans d. Legal liability plans

Disaster recovery plans

Which of the following is the best technique to detect duplicate transactions? a. ECDSA and SHA b. ECDSA and SHA-1 c. ECDSA and MID d. ECDSA and MD5

ECDSA and MID

When compared to the Rivest, Shamir, Adelman (RSA) algorithm, the Digital Signature Standard (DSS) does not provide a. Digital signature b. Authentication c. Encryption d. Data integrity

Encryption

Which of the following can be used in conjunction with a traffic padding security mechanism? a. Passwords b. Smart tokens c. Encryption d. Memory tokens

Encryption

Which of the following methods provide the highest security to protect access from unauthorized people? a. Encryption b. Call-back or dial-back systems c. Magnetic cards with personal identification number d. User ID and password

Encryption

Which of the following provides both integrity and confidentiality services for data and messages? a. Digital signatures b. Encryption c. Cryptographic checksums d. Granular access control

Encryption

Which of the following statements about encryption is not true? a. Software encryption degrades system performance b. Hardware encryption is faster c. Encryption is a desirable option in a local-area network (LAN) d. Key management is an administrative burden

Encryption is a desirable option in a local-area network (LAN)

Which of the following is not a common method of attacking a computer system? a. Password cracking b. Packet sniffing c. Encryption key breaking d. Sendmail

Encryption key breaking

Effective controls to ensure data integrity of messages does not include: a. Encryption algorithms b. Hashing algorithms c. File seals d. File labels

File labels

Which of the following is not a valid PKI architecture? a. Gateway architecture b. Hierarchical architecture c. Mesh architecture d. Bridge architecture

Gateway architecture

A simpler alternative to a digital signature is a: a. Hash function b. Digital certificate c. Handwritten signature d. Certificate authority

Hash function

Which of the following is used to encrypt IP packets? a. PPTP b. HTTP c. IPSEC d. PPP

IPSEC

Hash-based message authentication code (HMAC) is heavily used in which of the following? a. PPP operations b. SET operations c. IPSEC operations d. PPTP operations

IPSEC operations

IPSEC uses which of the following for negotiation to take place? a. Diffie-Hellman exchange b. IPSEC SA c. ISAKMP SA d. RSA exchange

ISAKMP SA

Which of the following provides the level of "trust" required for the digital certificates to reliably complete a transaction? a. Certificate policy, CP b. Certification practices statement, CPS c. Identity proofing d. Outsourcing

Identity proofing

Which one of the following certificate authorities (CA) is subordinate to another CA and has a CA subordinate to itself? a. Root CA b. Superior CA c. Intermediate CA d. Subordinate CA

Intermediate CA

X.509 Version 3 standard, compared to previous versions, provide which of the following? a. Authentication b. Encryption c. Interoperability d. Digital signature

Interoperability

Which of the following statements is not true about asymmetric-key cryptography? a. It is used to provide an authentication service b. It is used to provide a digital signature service c. It can be used to encrypt large amounts of data d. It can be used to provide non-repudiation service

It can be used to encrypt large amounts of data

Which of the following security services or statements is not true with the U.S. digital signature standard (DSS)? a. It generates a digital signature b. It does not require a third-party certificate c. It assures non-repudiation of a message d. It verifies a digital signature

It does not require a third-party certificate

The freeware product, Tripwire is which of the following? a. It is a file integrity checker b. It is a file confidentiality checker c. It is a file availability checker d. It is a file damage checker

It is a file integrity checker

Which of the following statements is not true about Secure Sockets Layer (SSL)? a. It uses both symmetric and asymmetric key cryptography b. It is used to perform authentication c. It is a point-to-point protocol d. It is a session-oriented protocol

It is a point-to-point protocol

Which of the following is the best definition of a public key infrastructure (PKI)? a. It is a policy b. It is an infrastructure c. It is hardware d. It is software

It is an infrastructure

Which of the following is not true about one-time pad? a. It is breakable b. Each key is used only once c. It is unbreakable d. Each key is used for only one message

It is breakable

IDEA is which of the following? a. It is asymmetric and uses a 128-bit key b. It is symmetric and uses a 56-bit key c. It is asymmetric and uses a 160-bit key d. It is symmetric and uses a 128-bit key

It is symmetric and uses a 128-bit key

Which of the following statements about digital signatures is not true? a. It enhances authentication b. It makes repudiation by the sender possible c. It prevents non-repudiation by the receiver d. It makes repudiation by the sender impossible

It makes repudiation by the sender possible

The major requirement for a public key certification authority is that: a. It must be independent b. It must have a proper contract c. It must be trusted d. It must have a good reputation

It must be trusted

Which of the following is not true about the Encapsulating Security Payload (ESP) of the IPSEC protocol? a. It protects replay attacks b. It protects integrity c. It protects confidentiality d. It protects the IP header

It protects the IP header

Which is not true about the Authentication Header (AH) of the IPSEC protocol? a. It protects against modification b. It provides privacy protection c. It provides connectionless integrity d. It protects against replay attacks

It provides privacy protection

Which of the following statements is true about elliptic curve cryptography? a. It uses an asymmetric-key algorithm b. It competes with the Whitfield-Diffie algorithm c. It competes with the digital signature algorithm d. It uses a symmetric-key algorithm

It uses an asymmetric-key algorithm

In cryptographic key management, key zeroization means which of the following? a. Key recovery b. Key re-generation c. Key destruction d. Key correction

Key destruction

Which of the following is not part of cryptographic key management process? a. Key layering b. Key distribution c. Key storage d. Key generation

Key layering

Which of the following should not be subject to review during a periodic review of a cryptographic system? a. Parameters b. Operation c. Keys d. Controls

Keys

Which of the following digital certificate levels provide a photo identification? a. Level 1 b. Level 2 c. Level 3 d. Level 4

Level 3

Which of the following digital certificate levels provide a stronger identification and authentication? a. Level 1 b. Level 2 c. Level 3 d. Level 4

Level 3

The control technique that achieves confidentiality of data in transfer is: a. Line encryption b. One-time password c. File encryption d. End-to-end encryption

Line encryption

What is the best way to encrypt data? a. Bulk encryption b. Link encryption c. Transaction encryption d. End-to-end encryption

Link encryption

A birthday attack is targeted at which of the following? a. MD5 b. SSL c. SLIP d. SET

MD5

Which of the following is a hash algorithm? a. DES b. IDEA c. 3DES d. MD5

MD5

Which of the following are examples of cryptographic hash functions? a. SHA and 3DES b. DES and CBC c. MD5 and SHA-1 d. DAC and MAC

MD5 and SHA-1

Which of the following will mitigate threat to integrity when private key cryptography is used? a. Message authentication code b. Message identifier c. Message header d. Message trailer

Message authentication code

Controls to protect against malicious changes to a message include: a. Data checksums and cyclic redundancy code b. Message integrity code and message authentication code c. Message integrity code and cyclic redundancy code d. Data checksums and message authentication code

Message integrity code and message authentication code

Which of the following encryption schemes is more secure? a. Encrypting once with the same key b. Encrypting twice with the same key c. Encrypting twice with two keys d. Multiple encryption

Multiple encryption

The Secure Sockets Layer (SSL) transport protocol provides all of the following services except: a. Mutual authentication b. Message privacy c. Message integrity d. Mutual handshake

Mutual handshake

If "N" keys are required to reconstruct the original key, application of the "Split Knowledge" concept requires how many keys to be documented? a. N keys b. N-1 keys c. N+1 keys d. N+2 keys

N-1 keys

tty good privacy (PGP) is an electronic-mail security program. Which of the following statements is true about PGP? a. PGP is a standard b. PGP is a product c. PGP is interoperable d. PGP is not portable

PGP is a product

Countermeasures against replay attacks do not include which of the following? a. Time-stamps b. Protocols c. Nonces d. Kerberos

Protocols

Digital signature is another type of electronic signature. A digital signature is implemented using which of the following cryptographic techniques? a. Public key cryptography b. Key escrow cryptography c. Secret key cryptography d. Hybrid cryptographic systems

Public key cryptography

Which of the following will mitigate threat to integrity when public key cryptography is used? a. Data checksums and secure hashes b. Public key signatures and secure hashes c. Cyclic redundancy checks and secure hashes d. Simple checksums and secure hashes

Public key signatures and secure hashes

Which of the following binds the identity of a user to his public key? a. Private key technology and digital certificates b. Symmetric key technology and digital signatures c. Public key technology and digital certificates d. Cryptographic key technology and electronic signatures

Public key technology and digital certificates

What keys are used to create digital signatures? a. Public-key cryptography b. Private-key cryptography c. Hybrid-key cryptography d. Primary-key cryptography

Public-key cryptography

Zero-knowledge proof is used in which of the following applications? a. Public-key encryption process b. Zeriozation process c. Degaussing operation d. Data remanence operation

Public-key encryption process

Which of the following is an example of public-key cryptographic systems? a. MAC and DAC b. DES and 3DES c. RSA and IDEA d. RSA and DSS

RSA and DSS

What is not true about Rivest, Shamir, Adelman (RSA) algorithm? a. RSA's key length is variable b. Long key can be used in RSA for enhanced security c. Short key can be used for RSA efficiency d. RSA is faster to compute than DES and IDEA

RSA is faster to compute than DES and IDEA

Which of the following is true about the Rivest, Shamir, Adelman (RSA) algorithm? a. RSA produces a 160-bit hash b. RSA produces a 128-bit hash c. RSA uses a 512-1024 bit key d. RSA uses an 80-bit key

RSA uses a 512-1024 bit key

Which of the following features of Secure HyperText Transfer Protocol (SHTTP) achieves higher levels of protection? a. Freshness feature b. Algorithm independence feature c. Syntax compatibility feature d. Recursive feature

Recursive feature

The National Institute of Standards and Technology (NIST) selected which of the following as the advanced encryption standard (AES)? a. MARS algorithm b. Serpent algorithm c. Rijndael algorithm d. Twofish algorithm

Rijndael algorithm

Which one of the following uses a private-key system? a. RSA algorithm b. Knapsack algorithm c. Rijndael algorithm d. El Gamal algorithm

Rijndael algorithm

Which of the following is implemented in the Version 3 of X.509 protocol? a. SSL b. Regular MIME c. SHA d. S/MIME

S/MIME

Which of the following algorithms is used to create a message digest? a. SSL b.SHA c. SLIP d. SKIP

SHA

The two protocol algorithms used in cryptographic applications for compressing data are which of the following? a. SHA and MD5 b. 3DES and IDEA c. DSA and DSS d. RSA and SKIPJACK

SHA and MD5

Message digests use which of the following algorithms? a. SSL and MD4 b. DES and RC4 c. IDEA and RC4 d. SHA-1 and MD5

SHA-1 and MD5

The major components of IPSEC include which of the following? a. SPI, FH, and SPE b. SPI, AH, and ESP c. SPI, RH, and PSE d. SPI, KH, and EPS

SPI, AH, and ESP

Hash-based message authentication code (HMAC) is which of the following? a. Public key + hash function b. Primary key + hash function c. Secret key + hash function d. Secondary key + hash function

Secret key + hash function

Which of the following should be used to prevent an eavesdropping attack from remote access to firewalls? a. File encryption b. Bulk encryption c. Session encryption d. Stream encryption

Session encryption

Which of the following statements is true? Rivest, Shamir, Adelman (RSA) algorithm has a: a. Slower signature generation and slower verification than DSA b. Slower signature generation and faster verification than DSA c. Faster signature generation and faster verification than DSA d. Faster signature generation and slower verification than DSA

Slower signature generation and faster verification than DSA

A fundamental principle for protecting cryptographic keys includes which of the following? a. Zeroization and total knowledge b. Split knowledge and dual control c. Single control and formal proof d. Zero-knowledge proof and triple control

Split knowledge and dual control

Which one of the following facilitates data/information hiding in computer systems? a. Polygraph b. Holography c. Steganography d. Cryptography

Steganography

Which of the following is not part of PKI data structures? a. Public key certificate b. Certificate revocation lists c. Attribute certificate d. Subject certificate

Subject certificate

Which of the following key algorithms decrypt data with the same key used for encryption? a. Symmetric key algorithm b. Asymmetric key algorithm c. Symmetric and public key algorithms d. Asymmetric and secret key algorithms

Symmetric key algorithm

Cryptographic key management is a difficult problem for which of the following? a. Symmetric-key algorithms b. Asymmetric-key algorithms c. Hybrid-key algorithms d. Hash-key algorithms

Symmetric-key algorithms

Which of the following is required to accept digital certificates from multiple vendor certification authorities? a. The application must be PKI-enabled b. The application must be PKI-aware c. The application must use X.509 Version 3 d. The application must use PKI-vendor "plug-ins"

The application must use X.509 Version 3

Which of the following is not usually seen on a digital certificate? a. The owner name b. The public key c. The effective dates for keys d. The insurance company name

The insurance company name

The least significant bit in a bit string is which of the following? a. The left-most bit of a bit string b. The right-most bit of a bit string c. The top-most bit of a bit string d. The bottom-most bit of a bit string

The right-most bit of a bit string

Which of the following independent statements is not true about security? a. The security of the cryptography can never be greater than the security of the people using it b. The security of any electronic-mail program cannot be greater than the security of the machine where the encryption is performed c. The security of an encryption algorithm is no more or less than the security of the key d. The security of each electronic-mail message is encrypted with a standard, non-random key

The security of each electronic-mail message is encrypted with a standard, non-random key

Which of the following statements is true about one-way hash function and encryption algorithm? a. They both convert a plaintext into an unintelligent text b. They both can reverse from output to input c. They both do not destroy information d. They both operate on a key

They both convert a plaintext into an unintelligent text

Pretty good privacy (PGP) and privacy-enhanced mail (PEM) are electronic-mail security programs. Which of the following statements is not true about PGP and PEM? a. They both encrypt messages b. They both sign messages c. They both have same uses d. They are both based on public-key cryptography

They both have same uses

Which of the following statement is true about hash functions? a. They produce a large message digest than the original message b. They produce a much smaller message digest than the original message c. They produce the same size message digest as the original message d. They produce a very large message digest than the original message

They produce a much smaller message digest than the original message

Who is best qualified to evaluate the security of Public Key Infrastructure (PKI) systems and procedures? a. Certification authorities b. Registration authorities c. Third parties d. Subscribers

Third parties

What is the major purpose of a digital certificate? a. To achieve availability goal b. To maintain more information on the certificate c. To verify the certificate authority d. To establish user authentication

To establish user authentication

IPSEC protocols use which of the following modes?

Transport mode and tunnel mode

Public-key cryptographic systems are knows as: a. Two-keys or asymmetric systems b. Two-keys or symmetric systems c. One-key or symmetric systems d. One-key or asymmetric systems

Two-keys or asymmetric systems

Which of the following provides a unique user ID for a digital certificate? a. User name b. User organization c. User e-mail d. User message digest

User message digest

The least powerful method of protecting confidential data or program files is by: a. Scrambling the data b. Encoding the data before transmission c. Decoding the data after transmission d. Using passwords and other identification codes

Using passwords and other identification codes

The key length of the Rijndael algorithm is which of the following? a. Fixed b. Variable c. Semi-fixed d. Semi-variable

Variable

What is the bit size of a RSA? a. Fixed b. Variable c. Semi-fixed d. Semi-variable

Variable

The major advantage of a checksum program is that it: a. Adds more bytes to programs b. Verifies integrity of files c. Increases boot-up time d. Misleads a program recompilation

Verifies integrity of files

The Advanced Encryption Standard (AES) algorithms are: a. Very slow and very strong b. Very fast and very weak c. Very fast and very strong d. Very slow and very weak

Very fast and very strong

Digital certificates are defined by which of the following International Telecommunications Union (ITU) standards? a. X.400 b. X.25 c. X.12 d. X.509

X.509

A physical security measure for cryptographic keys is which of the following? a. Zeroization b. Zero-knowledge proof c. Zero defects proof d. Zero quantum proof

Zeroization

A hash function is which of the following? a. One-to-one function b. One-to-many function c. Many-to-one function d. Many-to-many function

any-to-one function

Which of the following encryption algorithms or schemes is absolutely unbreakable? a. Data encryption standard (DES) b. One-time pad c. International data encryption algorithm (IDEA) d. RC2 and RC4

b. One-time pad

What is the correct sequence of keys in a triple data encryption standard (3DES) algorithm operating with three keys? a. encrypt-decrypt-encrypt b. decrypt-encrypt-decrypt c. encrypt-encrypt-encrypt d. decrypt-decrypt-decrypt

encrypt-encrypt-encrypt

Most cryptographic attacks focus on which of the following? a. Cryptographic keys b. Cryptographic passwords c. Cryptographic parameters d. Cryptographic PINs

ographic parameters


Conjuntos de estudio relacionados

Sadlier-Oxford Vocabulary Workshop Level B Unit 6

View Set

Schooling in a Diverse Society Midterm Exam

View Set

Microeconomics Ch. all previous, 15, 20, 17, 18 - Quiz Answers/Notes/Terminology [Final Exam]

View Set