CET459 Chapter 11
Each of the following is a characteristic of a secure hash algorithm except _______.
A. collisions should be rare*** B. the results of a hash function should not be reversed C. the hash should always be the same fixed size D. a message cannot be produced from a predefined hash
Which of the following is the strongest symmetric cryptographic algorithm?
Advanced Encryption Standard
If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, the key he uses to encrypt the message is _______.
Alice's public key
Hashing would not be used in which of the following examples?
Encrypting and decrypting e-mail attachments***
Which of the following has an onboard key generator and key storage facility, accelerated symmetric and asymmetric encryption, and can back up sensitive material in encrypted form?
Hardware Security Module (HSM)
A(n) _____ is not decrypted but is only used for comparison purposes.
Hash
_____ encrypts a hash with a shared secret key.
Hashed Message Authentication Code (HMAC)***
The areas of a file in which steganography can hide data include all of the following except ______.
In the directory structure of the file system***
Which of the following is a protection provided by hashing?
Integrity
The Microsoft Windows LAN Manager hash ______.
Is weaker than NTLMv2
_____ uses lattice-based cryptography and may be more resistant to quantum computing attacks.
NTRUENcrypt
Symmetric cryptographic algorithmsare also called ______.
Private key cryptography
Which of the following asymmetric cryptographic algorithms is the most secure?
RSA
Which of the following asymmetric encryption algorithms uses prime numbers?
RSA
Which of the following is not a basic security protection over information that cryptography can provide?
Stop loss
A digital signature can provide each of the following benefits except ______.
Verify the receiver
Proving that a user sent an e-mail message is known as ______.
Non-repudiation
What is data called that is to be encrypted by inputting into an encryption algorithm?
Plaintext
The Trusted Platform Module (TPM) _____.
Provides cryptographic services in hardware instead of software
_____ is a hash that uses two different and independent parallel chains of computation, the result of which are then combined at the end of the process.
RIPEMD