Quiz 5

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which solution is ideal for encrypting an entire hard drive of a PC?

BitLocker

A(n) _____ is not decrypted but is only used for comparison purposes.

digest

Which of these is the strongest symmetric cryptographic algorithm?

Advanced Encryption Standard

If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message?

Alice's public key

What type of cryptography uses two keys instead of just one, generating both a private and a public key?

Asymmetric

Which of these is NOT a characteristic of a secure hash algorithm?

Collisions should be rare.

Which of the following key exchanges uses the same keys each time?

Diffie-Hellman (DH)

Which of these has an onboard key generator and key storage facility, as well as accelerated symmetric and asymmetric encryption, and can back up sensitive material in encrypted form?

Hardware Security Module (HSM)

NTRUEncrypt is based on which cryptography method?

Lattice-based

Select below the hashing algorithm that takes plaintext of any length and generates a digest 128 bits in length:

MD2

All of the following can be broken mathematically EXCEPT _____.

OTP

Why does RC4 consume more processing power than RC5?

RC4 is a stream cipher and RC5 is a block cipher

Which asymmetric cryptographic algorithm is the most secure?

RSA

Which asymmetric encryption algorithm uses prime numbers?

RSA

A digital signature does NOT provide which of the following?

Redundancy

OTPs were originally used by whom?

Resistance groups and operation teams during World War II

What are the latest versions of the Secure Hash Algorithm? (pick two)

SHA-2 SHA-3

Which type of cryptographic algorithm takes an input string of any length, and returns a string of any requested variable length?

Sponge

Which of the following is NOT a benefit of USB device encryption?

The USB device can encrypt the hard drive of an attacker when they attempt to access data

The NTRUEncrypt cryptographic algorithm makes use of which of the following cryptographic techniques?

lattice-based

Proving that a user sent an email message is known as _____.

non-repudiation

Public key systems that generate random public keys that are different for each session are called _____.

perfect forward secrecy

What is data called that is to be encrypted by inputting it into an cryptographic algorithm?

plaintext

The Trusted Platform Module (TPM) _____.

provides cryptographic services in hardware instead of software

Which of these is NOT a basic security protection for information that cryptography can provide?

risk loss

A digital signature can provide each of the following benefits EXCEPT _____.

verify the receiver

The Hashed Message Authentication Code (HMAC) _____.

encrypts the key and the message

The areas of a file in which steganography can hide data include all of the following EXCEPT _____.

in the directory structure of the file system

Elliptic Curve Diffie-Hellman (ECDH) is an example of _____.

in-band key exchange

Which protection is provided by hashing?

integrity


Kaugnay na mga set ng pag-aaral

Algebraic Expressions and Word Phrases

View Set

Stereotype Hamilton and Gifford (1976)

View Set

Microbiology Ch11: Physical & Chemical Agents for Microbial Control

View Set