Module 3 Fundamentals of Cryptography

¡Supera tus tareas y exámenes ahora con Quizwiz!

If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message?

Alice's public key

Which of the following is a weakness of RSA?

As computers become more powerful, the ability to compute factoring has increased

Which of the following is NOT a form of obfuscation?

Ciphering

Which of these is NOT a characteristic of a secure hash algorithm?

Collisions may occur but they should be rare

Layla has encrypted a document so that it can only be viewed by those who have been provided the key. What protection has she given to this document?

Confidentiality

Which of the following is NOT to be decrypted but is only used for comparison purposes?

Digest

Which type of encryption would protect all data on a hard drive, including the installed OS?

FDE

Farah needs to encrypt only a few files and does not want the entire disk contents to be encrypted. What type of encryption would she use?

File-level encryption

Which of the following is NOT correct about "security through obscurity"?

It should only be used as a general information security protection in extreme circumstances

Which of these is NOT true about ECC?

It uses both sloping curves and prime numbers

Zeinab has been asked by her supervisor to speak with an angry customer who claims that they never received notification of a change in the terms of service agreement. Zeinab learned that an automated "read receipt" was received, showing that the customer opened the email with the new terms of service outlined. What action will Zeinab now take regarding this customer?

Nonrepudiation

Which type of blockchain can anyone join?

Public blackchain

Aaliyah wants to send a message to a friend, but she does not want anyone else to know that she is communicating with them. Which technique would she use?

Steganography

Which algorithm uses the same key to both encrypt and decrypt data?

Symmetric cryptographic algorithm

Nahla has been asked to make a recommendation about the most secure TEE. Which of the following would she choose?

TPM

What is a collision?

Two files that produce the same digest

Karyme needs to select a hash algorithm that will produce the longest and most secure digest. Which would she choose?

Whirlpool

Which of the following is NOT correct about a one-time pad (OTP)?

it requires a cipher disk

What is data called that is to be encrypted by inputting it into a cryptographic algorithm?

plaintext

Which of the following creates the most secure ciphertext?

sponge function


Conjuntos de estudio relacionados

Political Philosophy Readings/ Weekly Questions

View Set

Final Exam: Osteoporosis, Stress, Chronic Diseases, Body Weight, Infectious Disease

View Set

Chapter 26: Newborns and Infants PrepU

View Set

International Environmental Law - Midterm 1

View Set

CHEM 123 SAPLING LEARNING CHAPTER 14

View Set

FORD: CH: 33 Antihyperlipidemic Drugs

View Set

Chapter 30 - Adrenergic Agonists

View Set