Review Questions 5
Which of the following is used to check whether a certificate is still valid? a. certificate revocation list b. certification authority c. certificate publisher d. registration authority
A. CERTIFICATE REVOCATION LIST
Which of the following is used as a cryptographic primitive? (Choose all that apply.) a. pseudorandom number generators b. hashing functions c. Feistel networks d. side channels
A. PSEUDORANDOM NUMBER GENERATORS B. HASHING FUNCTIONS C. FEISTEL NETWORKS
When using symmetric and asymmetric algorithms to encrypt the same amount of data, which of the following statements is correct? a. The symmetric algorithm encrypts data faster than the asymmetric algorithm. b. The asymmetric algorithm encrypts data faster than the symmetric algorithm. c. The symmetric and asymmetric algorithms work at the same speed to encrypt data. d. The faster an asymmetric algorithm works, the stronger its encryption.
A. THE SYMMETRIC ALGORITHM ENCRYPTS DATA FASTER THAN THE ASYMMETRIC ALGORITHM.
What is the block size in the AES implementation of Rijndael? a. 128 or 256 bits b. 128, 192, or 256 bits c. variable d. 128 bits
B. 128, 192, OR 256 BITS
Which of the following issues public and private key pairs? a. certificate publisher b. certification authority c. certificate revocation list d. certificate store
B. CERTIFICATION AUTHORITY
Which of the following is a reason that IPsec has become the standard protocol for tunneled communication? (Choose all that apply.) a. IPsec is fast and supported universally. b. IPsec supports IPv4 and IPv6. c. IPsec is implemented at Layer 2. d. IPsec can encrypt the entire packet.
B. IPSEC SUPPORTS IPV4 AND IPV6
In digital signatures, which of the following values is compared to verify a message's integrity? a. public key b. message digest c. private key d. certificate
B. MESSAGE DIGEST
In tunnel mode, Encapsulating Security Payload encrypts which of the following? a. packet header b. data c. both the header and the data d. neither the header nor the data
C. BOTH THE HEADER AND THE DATA
Which of the following is a symmetric algorithm that is not considered safe for encryption use? a. AES b. Diffie-Hellman c. DES d. RSA
C. DES
Which of the following components enables IPsec to use Diffie-Hellman to create keys? a. Internet Key Exchange b. Internet Security Association Key Management Protocol c. Oakley d. IPsec driver
C. OAKLEY
Which of the following combines a hashed message authentication code with a shared secret key, processes each half of the input data with different hashing algorithms, and recombines them with an XOR function? a. SSL b. SSH c. TLS d. WPA
C. TLS
Define cryptographic primitives.
CRYPTOGRAPHIC PRIMITIVES ARE MODULAR MATHEMATICAL FUNCTIONS THAT PERFORM ONE TASK RELIABLY. THEY FORM THE BASIC BUILDING BLOCKS OF MODERN CRYPTOGRAPHY.
Which of the following attacks might have the potential to exploit AES? a. PRNG b. visual cryptanalysis c. chosen ciphertext d. XSL
D. XSL
Why are cryptographically secure pseudorandom number generators so important to cryptography?
MANY CRYPTOGRAPHIC FUNCTIONS REQUIRE RANDOM VALUES THAT SERVE AS SEEDS FOR FURTHER COMPUTATION; EXAMPLES INCLUDE NONCES, ONE-WAY FUNCTIONS, SALTS, AND KEYS.
Authentication Header verifies the integrity of TCP/IP packets by signing them with a digital signature. True or False?
TRUE