IS360 Chapter 7 Quiz
Bob received a message from Alice that contains a digital signature. What cryptographic key does Bob use to verify the digital signature?
Alice's public key
Which cryptographic attack is relevant in only asymmetric key systems and hash functions?
Chosen ciphertext
Bob is sending a message to Alice. He wants to ensure that nobody can read the content of the message while it is in transit. What goal of cryptography is Bob attempting to achieve?
Confidentiality
True or False? A digitized signature is a combination of a strong hash of a message and a secret key.
False
True or False? A private key cipher is also called an asymmetric key cipher.
False
True or False? A product cipher is an encryption algorithm that has no corresponding decryption algorithm.
False
True or False? You must always use the same algorithm to encrypt information and decrypt the same information.
False
Some ciphers, regardless of type, rely on the difficulty of solving certain mathematical problems, which is the basis for asymmetric key cryptography. Which of the following is a branch of mathematics that involves multiplicative inverses that these ciphers use?
Field theory
Which approach to crytography uses highly parallel algorithms that could solve problems in a fraction of the time needed by conventional computers?
Quantum cryptography
Which type of cipher works by rearranging the characters in a message?
Transposition
True or False? A keyword mixed alphabet cipher uses a cipher alphabet that consists of a keyword, minus duplicates, followed by the remaining letters of the alphabet.
True
True or False? A salt key is a set of random characters you can combine with an input key to create an encryption key.
True
Juan is a wireless security professional. He is selecting a standard for wireless encryption protocols for access points and devices for his agency. For the highest security, which protocol should Juan choose?
Wi-Fi Protected Access version 3 (WPA3)
Alice would like to send a message to Bob securely and wishes to use asymmetric encryption to encrypt the contents of the message. What key does she use to encrypt this message?
Bob's public key
True or False? Elliptic curve cryptography (ECC) relies on algebraic structures of elliptic curves over finite fields.
True
True or False? Transport Layer Security (TLS) is an example of a transport encryption protocol.
True
True or False? With asymmetric key ciphers, it is computationally infeasible to derive the second algorithm from the first algorithm.
True
True or False? You can break a cipher by analyzing the ciphertext to find the plaintext or key or by analyzing the ciphertext and its associated plaintext to find the key.
True
What is the only unbreakable cipher when it is used properly?
Vernam