IS360 Chapter 7 Quiz

¡Supera tus tareas y exámenes ahora con Quizwiz!

Bob received a message from Alice that contains a digital signature. What cryptographic key does Bob use to verify the digital signature?

Alice's public key

Which cryptographic attack is relevant in only asymmetric key systems and hash functions?

Chosen ciphertext

Bob is sending a message to Alice. He wants to ensure that nobody can read the content of the message while it is in transit. What goal of cryptography is Bob attempting to achieve?

Confidentiality

True or False? A digitized signature is a combination of a strong hash of a message and a secret key.

False

True or False? A private key cipher is also called an asymmetric key cipher.

False

True or False? A product cipher is an encryption algorithm that has no corresponding decryption algorithm.

False

True or False? You must always use the same algorithm to encrypt information and decrypt the same information.

False

Some ciphers, regardless of type, rely on the difficulty of solving certain mathematical problems, which is the basis for asymmetric key cryptography. Which of the following is a branch of mathematics that involves multiplicative inverses that these ciphers use?

Field theory

Which approach to crytography uses highly parallel algorithms that could solve problems in a fraction of the time needed by conventional computers?

Quantum cryptography

Which type of cipher works by rearranging the characters in a message?

Transposition

True or False? A keyword mixed alphabet cipher uses a cipher alphabet that consists of a keyword, minus duplicates, followed by the remaining letters of the alphabet.

True

True or False? A salt key is a set of random characters you can combine with an input key to create an encryption key.

True

Juan is a wireless security professional. He is selecting a standard for wireless encryption protocols for access points and devices for his agency. For the highest security, which protocol should Juan choose?

Wi-Fi Protected Access version 3 (WPA3)

Alice would like to send a message to Bob securely and wishes to use asymmetric encryption to encrypt the contents of the message. What key does she use to encrypt this message?

Bob's public key

True or False? Elliptic curve cryptography (ECC) relies on algebraic structures of elliptic curves over finite fields.

True

True or False? Transport Layer Security (TLS) is an example of a transport encryption protocol.

True

True or False? With asymmetric key ciphers, it is computationally infeasible to derive the second algorithm from the first algorithm.

True

True or False? You can break a cipher by analyzing the ciphertext to find the plaintext or key or by analyzing the ciphertext and its associated plaintext to find the key.

True

What is the only unbreakable cipher when it is used properly?

Vernam


Conjuntos de estudio relacionados

20-768 [03] - Working with Cubes and Dimensions

View Set

Hematology: LabCE Erythrocyte Inclusions

View Set

Day 4 - Lymphatic's/mapping/pinpoint/spyphi

View Set

Commercial Pilot Oral - Human Factors

View Set

soc midterm- Latent Functions of Education

View Set

ENTR 187 - Entrepreneurship - Sac State - Dr. VanVo

View Set

Env Chem - Unit 2 Greenhouse Effect Review

View Set