Hashing/Symmetric/Asymmetric

¡Supera tus tareas y exámenes ahora con Quizwiz!

D. always be the same if the data is the same.

A hash will... Answers: A. be a variable length file B. encrypt the data in a file C. be reversible D. always be the same if the data is the same.

A. MD5 E. SHA1

Common Hash algorithms (choose all that apply) Answers: A. MD5 B. RSA C. AES D. 3DES E. SHA1

D. SHA1

Hash algorithm based on MD hash Answers: A. RSA B. ECC C. Keccak D. SHA1 E. SHA3

E. Integrity

Hash algorithms ensure? Answers: A. Confidentiality B. Reference C. Absolution D. Availability E. Integrity

B. conversion back to the original data impossible

Hashing should make Answers: A. data encrypted B. conversion back to the original data impossible C. asymmetric encryption possible D. symmetric encryption possible

D. The secret key is asymmetrically transmitted, the message itself symmetrically.

How does IPsec, TLS, SSL combine symmetric and asymmetric encryption? Answers: A. First, the message is encrypted with symmetric encryption and afterwards it is encrypted asymmetrically together with the key. B. The secret key is symmetrically transmitted, the message itself asymmetrically. C. First, the message is encrypted with asymmetric encryption and afterwards it is encrypted symmetrically together with the key. D. The secret key is asymmetrically transmitted, the message itself symmetrically.

B. 1

If I XOR 0 and 1... what is the result? Answers: A. 2 B. 1 C. 0 D. none of the above

C. 0

If I XOR 1 and 1... what is the result? Answers: A. 2 B. 1 C. 0 D. none of the above

A. 10001

If I XOR 11010 and 01011... what is the result? Answers: A. 10001 B. 10100 C. 01110 D. 01010 E. none of the above

B. Integrity

If I change the data in a file I have compromised its Answers: A. Confidentiality B. Integrity C. Availability D. Authenticity E. Repudiation

C. the message has been changed

Is Bob sends a message to Alice and the message content hash is 543 but when Alice gets the email the hash of the message contents is 544... what does this mean? Answers: A. the message has been decrypted B. the message has been encrypted C. the message has been changed D. the message is the original and the ttl has increased by 1

A. is slower than DES C. is an asymmetric algorithmm D. uses prime numbers

RSA (choose all that apply) Answers: A. is slower than DES B. is faster than symmetric encryption C. is an asymmetric algorithmm D. uses prime numbers E. has been deprecated

A. Denying the sending of a message

Repudiation in cryptography is Answers: A. Denying the sending of a message B. Not being able to deny the sending of a message C. Deciphering of a message D. Reputation

C. A collision

Two different sets of data creating an identical hash is considered what in the cryptography field? Answers: A. A mistake B. Impossible C. A collision D. A cipher anomaly

Confidentiality Non-repudiation Authenticity Availability Integrity

What can cryptography provide for security? Check all that apply Answers: Confidentiality Non-repudiation Authenticity Availability Integrity

A. block cipher

What is data encryption standard? Answers: A. block cipher B. stream cipher C. bit cipher D. none of the above

A. Symmetric D. Hashing

Which are categories of cryptographic algorithms? Answers: A. Symmetric B. RSA C. Data Encryption Standard D. Hashing

B. Problem of the secure transmission of the Secret Key.

Which is the largest disadvantage of the symmetric Encryption? Answers: A. More complex and therefore more time-consuming calculations. B. Problem of the secure transmission of the Secret Key. C. Less secure encryption function. D. Rarely used.

C. All algorithms are public, only the key is secret. It contains the parameters used for the encryption resp. decryption.

Which is the principle of the encryption using a key? Answers: A.The key indicates which function is used for encryption. Thereby it is more difficult to decrypt a intercepted message as the function is unknown. B. The key contains the secret function for encryption including parameters. Only a password can activate the key. C. All algorithms are public, only the key is secret. It contains the parameters used for the encryption resp. decryption. D. The key prevents the user of having to reinstall the software at each change in technology or in the algorithms for encryption.

A. 3DES (TripleDES) C. RC5 D. IDEA

Which of the following algorithms are symmetric encryption? Answers: A. 3DES (TripleDES) B. RSA C. RC5 D. IDEA

C. Advanced Encryption Standard

Which one of the following algorithm is not used in asymmetric-key cryptography? Answers: A. rsa algorithm B. diffie-hellman algorithm C. Advanced Encryption Standard D. none of the mentioned

A. so you can verify the file is the original

Why are hash values of files often stored online with the file? Answers: A. so you can verify the file is the original B. so you can decrypt the file C. so you can identify the creator of the file D. to confirm the size of the file

Confidentiality Integrity Availability Authenticity Non-Repudiation

asymmetric encryption provides (choose all that apply) Answers: Confidentiality Integrity Availability Authenticity Non-Repudiation

C. RC4

the following is a stream cipher Answers: A. AES B. DES C. RC4 D. RSA E. none of the above

B. transport layer security

which of the following is used to secure an HTTP connection? Answers: A. stream control transmission protocol B. transport layer security C. secure standards layer D. hypertext transport header encryption E. markup language encryption

C. MD5

A common hash algorithm no longer considered secure is? Answers: A. AES B. DES C. MD5 D. RSA E. RC4

A. fixed size bit string

A cryptographic hash function takes an arbitrary block of data and returns Answers: A. fixed size bit string B. variable size bit string C. reversible string D. none of the above

B. called public key encryption D. used for digital signatures

Asymmetric encryption is (choose all that apply) Answers: A. Stream cipher only B. called public key encryption C. Uses a single key D. used for digital signatures E. all of the above

A. slower than stream ciphers when text is short C. More secure D. divided into equal length plaintext for encryption

Block ciphers are (choose all that apply) Answers: A. slower than stream ciphers when text is short B. more prone to attack C. More secure D. divided into equal length plaintext for encryption E. all of the above

A. to find some insecurity in a cryptographic stream

Cryptanalysis is used... Answers: A. to find some insecurity in a cryptographic stream B. to increase speed of the algorithm C. to encrypt the data D. to create cryptographic alorithms

E. The area of study of the many schemes used for encryption

Cryptography is Answers: A. The process of converting from plaintext to ciphertext B. A scheme C. Techniques used for deciphering a message without any knowledge of the enciphering details D. The areas of cryptology and cryptanalysis E. The area of study of the many schemes used for encryption

A. is a block Cipher B. has been cracked C. is less secure than AES

DES (choose all that apply) Answers: A. is a block Cipher B. has been cracked C. is less secure than AES D. is a stream cipher E. uses 256-bit encryption

E. all of the above

Diffie Hellman (choose best answer) Answers: A. is a key exchange algorithmm B. Is used to begin symmetric encryption C. is often used during asymmetric encryption to D. pass a key E. all of the above

B. receiver

In asymmetric key cryptography, the private key is kept by Answers: A. sender B. receiver C. sender and receiver D. all the connected devices to the network

A. transpositional ciphers

In cryptography, the order of the letters in a message is rearranged by Answers: A. transpositional ciphers B. substitution ciphers C. both (A) and (B) D. none of the mentioned

A. algorithm for performing encryption and decryption

In cryptography, what is cipher? Answers: A. algorithm for performing encryption and decryption B. encrypted message C. both (A) and (B) D. none of the mentioned

A. Confidentiality B. Integrity C. Availability

Symmetric encryption provides (choose all that apply) Answers: A. Confidentiality B. Integrity C. Availability D. Authenticity E. Non-Repudiation

B. use a single key

Symmetric key algorithms Answers: A. use a private/public key B. use a single key C. use a hash algorithm D. are all block Ciphers E. are all stream Ciphers


Conjuntos de estudio relacionados