CSIT 161 Chapter 7 Quiz

¡Supera tus tareas y exámenes ahora con Quizwiz!

Alice would like to send a message to Bob securely and wishes to use asymmetric encryption to encrypt the contents of the message. What key does she use to encrypt this message?

Bob's public key

Bob is sending a message to Alice. He wants to ensure that nobody can read the content of the message while it is in transit. What goal of cryptography is Bob attempting to achieve?

Confidentiality

Some ciphers, regardless of type, rely on the difficulty of solving certain mathematical problems, which is the basis for asymmetric key cryptography. Which of the following is a branch of mathematics that involves multiplicative inverses that these ciphers use?

Field theory

Bob is sending a message to Alice. He wants to ensure that nobody tampers with the message while it is in transit. What goal of cryptography is Bob attempting to achieve?

Integrity

Which approach to cryptography uses highly parallel algorithms that could solve problems in a fraction of the time needed by conventional computers?

Quantum cryptography

Which set of characteristics describes the Caesar cipher accurately?

Symmetric, stream, substitution

Alice would like to send a message to Bob using a digital signature. What cryptographic key does Alice use to create the digital signature?

Alice's private key

Bob received a message from Alice that contains a digital signature. What cryptographic key does Bob use to verify the digital signature?

Alice's public key

Which cryptographic attack is relevant in only asymmetric key systems and hash functions?

Chosen ciphertext

Maria receives a ciphertext message from her colleague Wen. What type of function does Maria need to use to read the plaintext message?

Decryption

Alice and Bob would like to communicate with each other using a session key, but they do not already have a shared secret key. Which algorithm can they use to exchange a secret key?

Diffie-Hellman

What is not a symmetric encryption algorithm?

Diffie-Hellman

Security objectives add value to relationships between businesses or between businesses and their customers. Which objective binds a message or data to a specific entity?

Digital signature

Which of the following is not an objective of cryptanalysis, the process of breaking codes?

Encrypt the plaintext of a target message

When Alice receives a message from Bob, she wants to be able to demonstrate to Miriam that the message actually came from Bob. What goal of cryptography is Alice attempting to achieve?

Nonrepudiation

What is the only unbreakable cipher when it is used properly?

Vernam

Juan is a wireless security professional. He is selecting a standard for wireless encryption protocols for access points and devices for his agency. For the highest security, which protocol should Juan choose?

Wi-Fi Protected Access version 3 (WPA3)

Which information security objective verifies the action to create an object or verifies an object's existence by an entity other than the creator?

Witnessing

Which of the following is not true of hash functions?

The hashes produced by a specific hash function may vary in size.

Which type of cipher works by rearranging the characters in a message?

Transposition


Conjuntos de estudio relacionados

Steroid Hormones and Adrenal Glands

View Set

5.02: Constitutional versus Absolute Monarchies

View Set

A+PII: The Autonomic Nervous System and Visceral Reflexes

View Set

PSYC 3303 - All Quizzes 14, 9, 15

View Set

Mineral and Igneous Rocks Practicum

View Set

ECO 3132 History of Economic Thought

View Set

Saunders 46 Immunodeficiency 564

View Set

Brooker Genetics, Chapters 9-10, 16-21, 24

View Set

Social Psychology Chapter 11: Prosocial Behavior

View Set