Security3

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

True

A collision attack is an attempt to find two input strings of a hash function that produce the same hash result.

3DES

After the DES cipher was broken and no longer considered secure, what encryption algorithm was made as its successor?

False

Asymmetric cryptographic algorithms are also known as private key cryptography.

True

Ciphertext is the scrambled and unreadable output of encryption.

cleartext

Data in an unencrypted form is referred to as which of the following?

False

Encryption is the practice of transforming information so that it is secure and cannot be accessed by unauthorized parties.

False

GNU Privacy Guard a proprietary software that runs on different operating systems.

Bob's private key

If Bob receives and encrypted reply message from Alice, whose private key is used to decrypt the received message?

512 bits

If using the MD5 hashing algorithm, what is the length to which each message is padded?

integrity

In cryptography, which of the five basic protections ensures that the information is correct and no unauthorized person or malicious software has altered that data?

True

In information technology, nonrepudiation is the process of proving that a user performed an action.

Symmetric

In which type of encryption is the same key used to encrypt and decrypt data?

False

Obfuscation is making something well known or clear.

False

One of the first popular symmetric cryptography algorithms was RSA.

160 bits

The SHA-1 hashing algorithm creates a digest that is how many bits in length?

True

The XOR cipher is based on the binary operation exclusive OR that compares two bits.

substitution

The simplest type of stream cipher, one in which one letter or character is exchanged for another, is known as what?

public key cryptography

What alternative term can be used to describe asymmetric cryptographic algorithms?

ECC

What cryptographic method, first proposed in the mid-1980s, makes use of sloping curves instead of large prime numbers?

Blowfish

What is a block cipher algorithm that operates on 64-bit blocks and can have a key length from 32 to 448 bits?

Digital Signature Algorithm

What is the U.S. federal government standard for digital signatures?

TPM

What technology uses a chip on the motherboard of the computer to provide cryptographic services?

full disk encryption

What term best describes when cryptography is applied to entire disks instead of individual files or groups of files?

data-in-use

What term describes data actions being performed by endpoint devices, such as printing a report from a desktop computer?

stream cipher

What type of cipher takes one character and replaces it with one character, working one character at a time?

hash

What type of cryptographic algorithm creates a unique digital fingerprint of a set of data?

asymmetric

What type of cryptography uses two keys instead of just one, generating both a private and a public key?

HMAC

What type of message authentication code uses hashing to authenticate the sender by using both a hash function and a secret cryptographic key?

PGP

What widely used commercial asymmetric cryptography software can be used for encrypting files and email messages?

Bob's private key

When Bob needs to send Alice a message with a digital signature, whose private key is used to encrypt the hash?

RIPEMD

Which hash algorithm's primary design feature is two different and independent parallel chains of computation, the results of which are then cobbled at the end of the process?

Diffie-Hellman

Which key exchange requires Alice and Bob to each agree upon a large prime number and related integer?

Elliptic Curve Cryptography Digital Signature Algorithm

Which of the following are considered to be common asymmetric cryptographic algorithms?

RSA

Which of the following asymmetric cryptography algorithms is most commonly used?

perfect forward secrecy

Which of the following is a public key system that generates random public keys that are different for each session?

hardware encryption

Which of the following is more secure than software encryption?

protect the public key

Which of the following is not one of the functions of a digital signature?

AES

Which standard was approved by NIST in late 2000 as a replacement for DES?

sponge

Which type of cryptographic algorithm takes an input string of any length, and returns a string of any requested variable length?

True

Wireless data networks are particularly susceptible to known ciphertext attacks.


Kaugnay na mga set ng pag-aaral

Series 7 Finals: Missed Questions

View Set

ECON 2010 Exam 1 - Chris Barker Harding University

View Set

BIO 1114 - Ch 4 - The Energy of Life

View Set

Diesel-Chapter 1: Introduction to Diesel Engines

View Set

Patho Exam 2 Musculoskeletal System

View Set

Chapter 1 Video Lecture Assignment

View Set