Security+ Chapter 5 review questions

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

b. verify the receiver

A digital signature can provide each of the following benefits EXCEPT _____________. a. prove the integrity of the message b. verify the receiver c. verify the sender d. enforce nonrepudiation

b. digest

A(n) ______________ is not decrypted but is only used for comparison purposes. a. stream b. digest c. algorithm d. key

d. OTP

All of the following can be broken mathematically EXCEPT____________. a. AES b. 3DES c. SHA d. OTP

a. in-band key exchange

Elliptic Curve Diffie-Hellman (ECDH) is an example of ______________. a. in-band key exchange b. out-of-band key exchange c. SHA-1 key management d. AES key certification

b. Alice's public key

If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message? a. Alice's private key b. Alice's public key c. Bob's public key d. Bob's private key

c. non-repudiation

Proving that a user sent an email message is known as ______________. a. repudiation b. integrity c. non-repudiation d. availability

d. perfect forward secrecy

Public key systems that generate random public keys that are different for each session are called __________________. a. Public Key Exchange (PKE) b. Elliptic Curve Diffie-Hellman (ECDH) c. Diffie-Hellman (DH) d. perfect forward secrecy

b. encrypts the key and the message

The Hashed Message Authentication Code (HMAC) __________. a. encrypts only the key b. encrypts the key and the message c. encrypts only the message d. encrypts the DHE key only

d. provides cryptographic services in hardware instead of software.

The Trusted Platform Module (TPM) ____________. a. allows the user to boot a corrupted disk and repair it b. is available only on Windows computers running BitLocker. c. includes a pseudorandom number generator (PRNG) d. provides cryptographic services in hardware instead of software.

b. in the directory structure of the file system

The areas of a file in which steganography can hide data include all of the following EXCEPT_________. a. in data that is used to describe the content or structure of the actual data b. in the directory structure of the file system c. in the file header fields that describe the file d. in areas that contain the content data itself.

a. plaintext

What is data called that is to be encrypted by inputting it into a cryptographic algorithm? a. plaintext b. cleartext c. opentext d. ciphertext

b. SHA-3

What is the latest version of the Secure Hash Algorithm? a. SHA-2 b. SHA-3 c. SHA-4 d. SHA-5

c. RSA

Which asymmetric cryptographic algorithm is the most secure? a. SHA-2 b. BTC-2 c. RSA d. ME-14

d. RSA

Which asymmetric encryption algorithm uses prime numbers? a. EFS b. quantum computing c. ECC d. RSA

b. Diffie-Hellman (DH)

Which of the following key exchanges uses the same keys each time? a. Diffie-Hellman Ephemeral (DHE) b. Diffie-Hellman (DH) c. Diffie-Hellman-RSA (DHRSA) d. Elliptic Curve Diffie-Hellman (ECDH)

d. Hardware Security Module (HSM)

Which of these has an onboard key generator and key storage facility, as well as accelerated symmetric and asymmetric encryption, and can back up sensitive material in encrypted form? a. Trusted Platform Module (TPM) b. self-encrypting hard disk drives (HDDs) c. encrypted hardware-based USB drives d. Hardware Security Module (HSM)

a. risk loss

Which of these is NOT a basic security protection for information that cryptography can provide? a. risk loss b. integrity c. confidentiality d. authenticity

a. Collisions should be rare

Which of these is NOT a characteristic of a secure has algorithm? a. Collisions should be rare b. The results of a hash function should not be reversed. c. The hash should always be the same fixed size d. A message cannot be produced from a predefined hash

a. Advanced Encryption Standard

Which of these is the strongest symmetric cryptographic algorithm? a. Advanced Encryption Standard b. Data Encryption Standard c. Triple Data Encryption Standard d. Rivest Cipher (RC) 1

c. integrity

Which protection is provided by hashing? a. authenticity b. confidentiality c. integrity d. availability


Kaugnay na mga set ng pag-aaral

Chapter 23- Endocrine Emergencies

View Set

Adult Development and Aging exam 1

View Set

Machine Learning True False questions

View Set

MGT 2180 Exam 4 Multiple Choice Questions

View Set

Chapter 1: General Concepts and Administrative Issues

View Set

Microeconomics HW Questions Ch. 5-8

View Set

CPR Online Portion Study Guide 2021 January

View Set