Chp 3 Information Security

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

data-in-use

What term describes data actions being performed by endpoint devices, such as printing a report from a desktop computer? 1. data-in-transit 2. data-in-play 3. data-at-rest 4. data-in-use

stream cipher

What type of cipher takes one character and replaces it with one character, working one character at a time? 1. block cipher 2. single cipher 3. unit cipher 4. stream cipher

PGP

What widely used commercial asymmetric cryptography software can be used for encrypting files and email messages? 1. PGP 2. GPG 3. EFS 4. GNUPG

Diffie-Hellman

Which key exchange requires Alice and Bob to each agree upon a large prime number and related integer? Quantum Prime Prime-Curve Diffie-Hellman Elliptic Curve Diffie-Hellman

Elliptic Curve Cryptography (ECC), Digital Signature Algorithm

Which of the following are considered to be common asymmetric cryptographic algorithms? (Choose all that apply.) 1. Data Encryption Standard 2. Elliptic Curve Cryptography 3. Advanced Encryption Standard 4. Digital Signature Algorithm

RSA

Which of the following asymmetric cryptography algorithms is most commonly used? 1. AES 2. RSA 3. Twofish 4. Blowfish

perfect forward secrecy

Which of the following is a public key system that generates random public keys that are different for each session? ephemeral-secrecy perfect forward secrecy public secrecy random-key exchange

protect the public key

Which of the following is not one of the functions of a digital signature? 1. verification of the sender 2. prevention of the sender from disowning the message 3. prove the integrity of the message 4. protect the public key

sponge

Which type of cryptographic algorithm takes an input string of any length, and returns a string of any requested variable length? 1. substitution 2. block 3. loop 4. sponge

512 bits

If using the MD5 hashing algorithm, what is the length to which each message is padded? 1. 32 bits 2. 64 bits 3. 128 bits 4. 512 bits

True

In information technology, non-repudiation is the process of proving that a user performed an action. (T/F)

160 bits

The SHA-1 hashing algorithm creates a digest that is how many bits in length? 1. 96 bits 2. 128 bits 3. 160 bits 4. 192 bits

True

The XOR cipher is based on the binary operation eXclusive OR that compares two bits. (T/F)

public key cryptography

What alternative term can be used to describe asymmetric cryptographic algorithms? 1. user key cryptography 2. public key cryptography 3. private key cryptography 4. cipher-text cryptography

Cryptography can support confidentiality, integrity, authentication, and non-repudiation.

What four basic protections can cryptography support?

Security through obscurity, or the notion that virtually any system can be made secure so long as outsiders are unaware of it or how it functions. However, this is a flawed approach since it is essentially impossible to keep "secrets" from everyone.

What is meant by the phrase "security through obscurity," and why is this concept not accurate?

True

A collision attack is an attempt to find two input strings of a hash function that produce the same hash result. (T/F)

3DES

After the DES cipher was broken and no longer considered secure, what encryption algorithm was made as its successor? 1. AES 2. Twofish 3. 3DES 4. RSA

True

Ciphertext is the scrambled and unreadable output of encryption. (T/F)

False

Obfuscation is making something well known or clear. (T/F)


Kaugnay na mga set ng pag-aaral

Ch 2 - Environment and Corporate Culture

View Set

Accounting 2101 Chapter 1 Questions:

View Set

5.3: Papillary Dermis and Reticular Dermis

View Set

Org Beh Ch 2 Diversity in Organizations

View Set

Ch. 23 The Evolution of Populations Dynamic Study Module

View Set

Exploring Exercises for Muscular Fitness

View Set

Chapter 13: Preterm and Postterm Newborns

View Set

Structural Equation Modelling (SEM)

View Set

quiz 4: econ 2106 practice questions

View Set

Academic vocabulary/analyze-define

View Set