CYSE 300 Module 9 Quiz

¡Supera tus tareas y exámenes ahora con Quizwiz!

What mathematical problem forms the basis of most modern cryptographic algorithms?

factoring large primes

Alice would like to send a message to Bob securely and wishes to encrypt the contents of the message. What key does she use to encrypt this message?

bob's public key

Which cryptographic attack offers cryptanalysts the most information about how an encryption algorithm works?

chosen plaintext

What standard is NOT secure and should never be used on modern wireless networks?

Wired Equivalent Privacy (WEP)

What type of function generates the unique value that corresponds to the contents of a message and is used to create a digital signature?

hash

Gary is sending a message to Patricia. He wants to ensure that nobody tampers with the message while it is in transit. What goal of cryptography is Gary attempting to achieve?

integrity

Which of the following allows a certificate authority (CA) to revoke a compromised digital certificate in real time?

online certificate status protocol

Which approach to cryptography provides the strongest theoretical protection?

quantum cryptography

Which set of characteristics describes the Caesar cipher accurately?

symmetric, stream, substitution

A private key cipher is also called an asymmetric key cipher.

false

The hash message authentication code (HMAC) is a hash function that uses a key to create a hash, or message digest.

true

What is NOT an effective key distribution method for plaintext encryption keys?

uncrypted email

A keyword mixed alphabet cipher uses a cipher alphabet that consists of a keyword, minus duplicates, followed by the remaining letters of the alphabet.

true

A person demonstrates anonymity when posting information to a web discussion site without authorities knowing who he or she is.

true

A salt value is a set of random characters you can combine with an actual input key to create the encryption key

true

In a chosen-ciphertext attack, cryptanalysts submit data coded with the same cipher and key they are trying to break to the decryption device to see either the plaintext output or the effect the decrypted message has on some system.

true

The Diffie-Hellman (DHE) algorithm is the basis for several common key exchange protocols, including Diffie-Hellman in Ephemeral mode (DHE) and Elliptic Curve DHE (ECDHE).

true

The financial industry created the ANSI X9.17 standard to define key management procedures.

true

A physical courier delivering an asymmetric key is an example of in-band key exchange.

ture


Conjuntos de estudio relacionados

Medical Terminology Suffixes- Surgical (-centesis to -tripsy) & Diagnostic, Pathological, and Related (-gram to -trophy) & Adjective, Noun, and Diminutive (-ac to -ule)

View Set

Antarctic GeoScience 125 Sec 700 Exam #4

View Set

Geometry Lesson 1-2: Points, Lines, Planes

View Set

Accounting 231 ch 5, 7, 8 practice questions

View Set

Chapter 31: The Infant and Family Perry: Maternal Child Nursing Care, 6th Edition

View Set

standard precautions & transmission based precautions

View Set