Info sys - CH 7 Practice Questions

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following is not an objective of cryptanalysis, the process of breaking codes?

Encrypt the plaintext of a target message

When Alice receives a message from Bob, she wants to be able to demonstrate to Miriam that the message actually came from Bob. What goal of cryptography is Alice attempting to achieve?

Nonrepudiation

Juan is a wireless security professional. He is selecting a standard for wireless encryption protocols for access points and devices for his agency. For the highest security, which protocol should Juan choose?

Wi-Fi Protected Access version 3 (WPA3)

Alice would like to send a message to Bob using a digital signature. What cryptographic key does Alice use to create the digital signature?

Alice's public key

Which cryptographic attack is relevant in only asymmetric key systems and hash functions?

Chosen ciphertext

Some ciphers, regardless of type, rely on the difficulty of solving certain mathematical problems, which is the basis for asymmetric key cryptography. Which of the following is a branch of mathematics that involves multiplicative inverses that these ciphers use?

Field theory

Bob is sending a message to Alice. He wants to ensure that nobody tampers with the message while it is in transit. What goal of cryptography is Bob attempting to achieve?

Integrity

Which set of characteristics describes the Caesar cipher accurately?

Symmetric, stream, substitution

Which of the following is not true of hash functions?

The hashes produced by a specific hash function may vary in size.

What is the only unbreakable cipher when it is used properly?

Vernam

Which type of cipher works by rearranging the characters in a message?

Transposition

Bob is sending a message to Alice. He wants to ensure that nobody can read the content of the message while it is in transit. What goal of cryptography is Bob attempting to achieve?

Confidentiality

Bob received a message from Alice that contains a digital signature. What cryptographic key does Bob use to verify the digital signature?

Alice's public key

Maria receives a ciphertext message from her colleague Wen. What type of function does Maria need to use to read the plaintext message?

Decryption

Alice and Bob would like to communicate with each other using a session key, but they do not already have a shared secret key. Which algorithm can they use to exchange a secret key?

Diffie-Hellman

What is not a symmetric encryption algorithm?

Diffie-Hellman

Security objectives add value to relationships between businesses or between businesses and their customers. Which objective binds a message or data to a specific entity?

Digital signature

Which approach to cryptography uses highly parallel algorithms that could solve problems in a fraction of the time needed by conventional computers?

Quantum cryptography

Which information security objective verifies the action to create an object or verifies an object's existence by an entity other than the creator?

Witnessing

Alice would like to send a message to Bob securely and wishes to use asymmetric encryption to encrypt the contents of the message. What key does she use to encrypt this message?

Bob's public key


Conjuntos de estudio relacionados

Ch. 31: The Nurse in the Schools

View Set

Difference between reducing valve and regulator, operation of flow restrictors, Bourdon gauges, and Thorpe tubes, effects of downstream pressure on meters, laboratory value that increases during hypoxia, clinical signs of mild/moderate and severe hypoxia,

View Set

Chapter 12: Marketing Channels: Delivering Customer Value

View Set

Chapter 18: Marketing in a Global Economy

View Set

POL California Life: Contract Law

View Set

Ch 18 Intraoperative Nursing Management

View Set

AP Gov. Chapter 2 Quiz Questions

View Set