BFOR 203 Final - Hashing-Symmetric-Asymmetric

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which one of the following algorithm is not used in asymmetric-key cryptography? A. rsa algorithm B. diffie-hellman algorithm C. Advanced Encryption Standard D. none of the mentioned

Advanced Encryption Standard

Symmetric encryption provides (choose all that apply) A. Confidentiality B. Integrity C. Availability D. Authenticity E. Non-Repudiation

Confidentiality/ Integrity/Availability

asymmetric encryption provides (choose all that apply) A. Confidentiality B. Integrity C. Availability D. Authenticity E. Non-Repudiation

Confidentiality/Integrity/Availability/Authenticity/Non-Repudiation

A common hash algorithm no longer considered secure is? A. AES B. DES C. MD5 D. RSA E. RC4

MD5

Common Hash algorithms (choose all that apply) A. MD5 B. RSA C. AES D. 3DES E. SHA1

MD5/SHA1

Which is the largest disadvantage of the symmetric Encryption? A. More complex and therefore more time-consuming calculations. B. Problem of the secure transmission of the Secret Key. C. Less secure encryption function. D. Rarely used.

Problem of the secure transmission of the Secret Key.

the following is a stream cipher A. AES B. DES C. RC4 D. RSA E. none of the above

RC4

Hash algorithm based on MD hash A. RSA B. ECC C. Keccak D. SHA1 E. SHA3

SHA1

In cryptography, what is cipher? A. algorithm for performing encryption and decryption B. encrypted message C. both (A) and (B) D. none of the mentioned

algorithm for performing encryption and decryption

Diffie Hellman (choose best answer) A. is a key exchange algorithmm B. is used to begin symmetric encryption C. is often used during asymmetric encryption to pass a key D. all of the above

all of the above

What is data encryption standard? A. block cipher B. stream cipher C. bit cipher D. none of the above

block cipher

A hash will... A. be a variable length file B. encrypt the data in a file C. be reversible D. always be the same if the data is the same.

called public key encryption/ used for digital signatures

Asymmetric encryption is (choose all that apply) A. Stream cipher only B. called public key encryption C. Uses a single key D. used for digital signatures E. all of the above

called public key encryption/used for digital signatures

Hashing should make: A. data encrypted B. conversion back to the original data impossible C. asymmetric encryption possible D. symmetric encryption possible

conversion back to the original data impossible

A cryptographic hash function takes an arbitrary block of data and returns A. fixed size bit string B. variable size bit string C. reversible string D. none of the above

fixed size bit string

DES (choose all that apply) A. is a block Cipher B. has been cracked C. is less secure than AES D. is a stream cipher E. uses 256-bit encryption

is a block Cipher/ has been cracked/ is less secure than AES

RSA (choose all that apply) A. is slower than DES B. is faster than symmetric encryption C. is an asymmetric algorithm D. uses prime numbers E. has been deprecated

is slower than DES/ is an asymmetric algorithm/ uses prime numbers

In asymmetric key cryptography, the private key is kept by A. sender B. receiver C. sender and receiver D. all the connected devices to E. the network

receiver

Block ciphers are (choose all that apply) A. slower than stream ciphers when text is short B. more prone to attack C. More secure D. divided into equal length plaintext for encryption E. all of the above

slower than stream ciphers when text is short/More secure/divided into equal length plaintext for encryption

Why are hash values of files often stored online with the file? A. so you can verify the file is the original B. so you can decrypt the file C. so you can identify the creator of the file D. to confirm the size of the file

so you can verify the file is the original

Is Bob sends a message to Alice and the message content hash is 543 but when Alice gets the email the hash of the message contents is 544... what does this mean? A. the message has been decrypted B. the message has been encrypted C. the message has been changed D. the message is the original and the ttl has increased by 1

the message has been changed

Cryptanalysis is used... A. to find some insecurity in a cryptographic stream B. to increase speed of the algorithm C. to encrypt the data D. to create cryptographic alorithms

to find some insecurity in a cryptographic stream

which of the following is used to secure an HTTP connection? A. stream control transmission protocol B. transport layer security C. secure standards layer D. hypertext transport header encryption E. markup language encryption

transport layer security

In cryptography, the order of the letters in a message is rearranged by A. transpositional ciphers B. substitution ciphers C. both (A) and (B) D. none of the mentioned

transpositional ciphers

Symmetric key algorithms A. use a private/public key B. use a single key C. use a hash algorithm D. are all block Ciphers E. are all stream Ciphers

use a single key

If I XOR 1 and 1... what is the result? A. 2 B. 1 C. 0 D. none of the above

0

If I XOR 0 and 1... what is the result? A. 2 B. 1 C. 0 D. none of the above

1

If I XOR 11010 and 01011... what is the result? A. 10001 B. 10100 C. 01110 D. 01010 E. none of the above

10001

Which of the following algorithms are symmetric encryption? A. 3DES (TripleDES) B. RSA C. RC5 D. IDEA

3DES (TripleDES)/RC5/ IDEA

Two different sets of data creating an identical hash is considered what in the cryptography field? A. A mistake B. Impossible C. A collision D. A cipher anomaly

A collision

Which is the principle of the encryption using a key? A. The key indicates which function is used for encryption. Thereby it is more difficult to decrypt a intercepted message as the function is unknown. B. The key contains the secret function for encryption including parameters. Only a password can activate the key. C. All algorithms are public, only the key is secret. It contains the parameters used for the encryption resp. decryption. D. The key prevents the user of having to reinstall the software at each change in technology or in the algorithms for encryption.

All algorithms are public, only the key is secret. It contains the parameters used for the encryption resp. decryption.

Repudiation in cryptography is A. Denying the sending of a message B. Not being able to deny the sending of a message C. Deciphering of a message D. Reputation

Denying the sending of a message

Hash algorithms ensure? A. Confidentiality B. Reference C. Absolution D. Availability E. Integrity

Integrity

If I change the data in a file I have compromised its A. Confidentiality B. Integrity C. Availability D. Authenticity E. Repudiation

Integrity

Which are categories of cryptographic algorithms? A. Symmetric B. RSA C. Data Encryption Standard D. Hashing

Symmetric/Hashing

Cryptography is: A. The process of converting from plaintext to ciphertext B. A scheme C. Techniques used for deciphering a message without any knowledge of the enciphering details D. The areas of cryptology and cryptanalysis E. The area of study of the many schemes used for encryption

The area of study of the many schemes used for encryption

How does IPsec, TLS, SSL combine symmetric and asymmetric encryption? A. First, the message is encrypted with symmetric encryption and afterwards it is encrypted asymmetrically together with the key. B. The secret key is symmetrically transmitted, the message itself asymmetrically. C. First, the message is encrypted with asymmetric encryption and afterwards it is encrypted symmetrically together with the key. D. The secret key is asymmetrically transmitted, the message itself symmetrically.

The secret key is asymmetrically transmitted, the message itself symmetrically.


Ensembles d'études connexes

Management Information Systems Chapter 4 Ethics and Information Security: MIS Business Concerns

View Set

Countries and Bodies of Water that Border France

View Set

NURS 2156 Practice Questions Test One (From Accompanying Study Guide)

View Set