fund of cyb - chpt. 9

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

False

A digitized signature is a combination of a strong hash of a message and a secret key.

true

A keyword mixed alphabet cipher uses a cipher alphabet that consists of a keyword, minus duplicates, followed by the remaining letters of the alphabet.

true

A person demonstrates anonymity when posting information to a web discussion site without authorities knowing who he or she is.

false ribs

A physical courier delivering an asymmetric key is an example of in-band key exchange

false

A private key cipher is also called an asymmetric key cipher.

true

A salt value is a set of random characters you can combine with an actual input key to create the encryption key.

true

A substitution cipher replaces bits, characters, or blocks of information with other bits, characters, or blocks.

diffle-hellman

Alice and Bob would like to communicate with each other using a session key but they do not already have a shared secret key. Which algorithm can they use to exchange a secret key?

Bob's public key

Alice would like to send a message to Bob securely and wishes to encrypt the contents of the message. What key does she use to encrypt this message?

Alice's private key

Alice would like to send a message to Bob using a digital signature. What cryptographic key does Alice use to create the digital signature?

true

An algorithm is a repeatable process that produces the same result when it receives the same input.

decryption

Betty receives a cipher text message from her colleague Tim. What type of function does Betty need to use to read the plaintext message?

Alice's public key

Bob received a message from Alice that contains a digital signature. What cryptographic key does Bob use to verify the digital signature?

false

Cryptographic key distribution is typically done by phone.

true

Digital signatures require asymmetric key cryptography.

integrity

Gary is sending a message to Patricia. He wants to ensure that nobody tampers with the message while it is in transit. What goal of cryptography is Gary attempting to achieve?

true

In a chosen-ciphertext attack, cryptanalysts submit data coded with the same cipher and key they are trying to break to the decryption device to see either the plaintext output or the effect the decrypted message has on some system.

false

In a known-plaintext attack (KPA), the cryptanalyst has access only to a segment of encrypted data, and has no choice as to what that data might be.

true

Integrity-checking tools use cryptographic methods to make sure nothing and no one has modified the software.

true

Message authentication confirms the identity of the person who started a correspondence.

false

Product cipher is an encryption algorithm that has no corresponding decryption algorithm.

true

The Diffie-Hellman (DHE) algorithm is the basis for several common key exchange protocols, including Diffie-Hellman in Ephemeral mode (DHE) and Elliptic Curve DHE (ECDHE).

true

The financial industry created the ANSI X9.17 standard to define key management procedures.

true

The hash message authentication code (HMAC) is a hash function that uses a key to create a hash, or message digest.

false

The term certificate authority (CA) refers to a trusted repository of all public keys.

512 bits

What is NOT a valid encryption key length for use with the Blowfish algorithm?

Uncrypted email

What is NOT an effective key distribution method for plaintext encryption keys?

vernam

What is the only unbreakable cipher when it is used properly

Factoring large primes

What mathematical problem forms the basis of most modern cryptographic algorithms?

Wired Equivalent Privacy (WEP)

What standard is NOT secure and should never be used on modern wireless networks?

hash

What type of function generates the unique value that corresponds to the contents of a message and is used to create a digital signature?

Nonrepudiation

When Patricia receives a message from Gary, she wants to be able to demonstrate to Sue that the message actually came from Gary. What goal of cryptography is Patricia attempting to achieve?

Quantum cryptography

Which approach to cryptography provides the strongest theoretical protection?

false

You must always use the same algorithm to encrypt information and decrypt the same information.

Transposition

Which type of cipher works by rearranging the characters in a message?

Rivest-Shamir-Adelman (RSA)

What is NOT a symmetric encryption algorithm?

Chosen plaintext

Which cryptographic attack offers cryptanalysts the most information about how an encryption algorithm works?

Certification

Which information security objective allows trusted entities to endorse information?

Symmetric, stream, substitution

Which set of characteristics describes the Caesar cipher accurately?

Online Certificate Status Protocol (OCSP)

Which of the following allows a certificate authority (CA) to revoke a compromised digital certificate in real time?


Kaugnay na mga set ng pag-aaral

Ch. 13 Med-Surg: Palliative and End-of-Life Care

View Set

Quiz Results - SBE Refresher 1 - Defining Research with Human Subjects

View Set

RN Fundamentals Online Practice 2019 A with NGN

View Set

energy and the law of conservation of energy

View Set

MCB W61 Final QUIZ QUESTIONS, MCB C61 Final Quizzy, PSYCH / MCB C61 Final, BMB Test 3, MCB C61 Midterm 2, MCB c61 Midterm 2, Psych C 61 midterm 2

View Set

Texas Real Estate Finance Part 2

View Set

Scenario-Based Questions, Answers, and Explanations - Access Control

View Set