ITN 260 Module 6 Review
downgrade attack
Basil was reading about a new attack that forces the system to abandon a higher cryptographic security mode of operation and instead fall back to an older and less secure mode. What type of attack is this? a. Pullback attack b. Downgrade attack c. Obfuscation attack d. Deprecation attack
ROT13
Brielle is researching substitution ciphers. She came across a cipher in which the entire alphabet was rotated 13 steps. What type of cipher is this? a. ROT13 b. XOR c. XAND13 d. Alphabetic
SHA3-512
Cicero is researching hash algorithms. Which algorithm would produce the longest and most secure digest? a. SHA-256 b. SHA3-512 c. SHA6-6 d. MD5
Nonrepudiation
Cryptography can prevent an individual from fraudulently reneging on an action. What is this known as? a. Nonrepudiation b. Repudiation c. Integrity d. Obfuscation
Perfect forward secrecy
What are public key systems that generate different random public keys for each session? a. perfect forward secrecy b. Elliptic Curve Diffie-Hellman (ECDH) c. Public Key Exchange (PKE) d. Diffie-Hellman (DH)
plaintext
What is data called that is to be encrypted by inputting it into a cryptographic algorithm? a. Byte-text b. Cleartext c. Plaintext d. Ciphertext
two files produce the same digest
What is a collision? a. Two files produce the same digest. b. Two ciphertexts have the same length. c. Two algorithms have the same key. d. Two keys are the same length.
unknown
Which of the following is NOT a characteristic of the Trusted Platform Module (TPM)? a. It can generate asymmetric cryptographic public and private keys. b. It includes a pseudorandom number generator (PRNG). c. It provides cryptographic services in hardware instead of software. d. It can easily be transported to another computer.
SHA
Which of the following is NOT a symmetric cryptographic algorithm? a. 3DES b. SHA c. Blowfish d. DES
digest
Which of the following is not to be decrypted but is only used for comparison purposes? a. Key b. Stream c. Algorithm d. Digest
risk
Which of these is NOT a basic security protection for information that cryptography can provide? a. Authenticity b. Risk c. Confidentiality d. Integrity
As computers become more powerful, the ability to compute factoring has increased.
Deo has been asked to explain RSA to his colleague. After his explanation, Deo is asked what, if any, weaknesses RSA has. How would Deo respond? a. The digest produced by the RSA algorithm is too short to be secure. b. RSA weaknesses are based on ECC. c. RSA has no known weaknesses. d. As computers become more powerful, the ability to compute factoring has increased.
The time between when a byte is input into a cryptographic cipher and when the output is obtained.
What is low latency? a. The time between when a byte is input into a cryptographic cipher and when the output is obtained. b. The requirements for an IoT device that is using a specific network. c. The delay between when a substitution cipher decrypts the first block and when it finishes with the last block. d. A low-power source requirement of a sensor.
Steganography
Which of the following hides the existence of information? a. Ciphering b. Decryption c. Encryption d. Steganography
unknown
Which of the following is FALSE about "security through obscurity"? b. Proprietary cryptographic algorithms are an example. c. It can only provide limited security. d. It attempts to hide the existence from outsiders.
Advanced Encryption Standard
Which of these is the strongest symmetric cryptographic algorithm? a. Data Encryption Standard b. Triple Data Encryption Standard c. RC1 d. Advanced Encryption Standard
verify the receiver
Egor wanted to use a digital signature. Which of the following benefits will the digital signature NOT provide? a. Verify the receiver b. Enforce nonrepudiation c. Prove the integrity of the message d. Verify the sender
Collisions should occur no more than 15 percent of the time.
Which of these is NOT a characteristic of a secure hash algorithm? a. A message cannot be produced from a predefined hash. b. Collisions should occur no more than 15 percent of the time. c. The results of a hash function should not be reversed. d. The hash should always be the same fixed size.
Hardware Security Module (HSM)
Which of these provides cryptographic services and is external to the device? a. self-encrypting hard disk drives (SED) b. encrypted hardware-based USB devices c. Trusted Platform Module (TPM) d. Hardware Security Module (HSM)
Alice's public key
If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message? a. Bob's public key b. Alice's private key c. Alice's public key d. Bob's private key