Chapter 11 Review

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

5. Symmetric cryptographic algorithms are also called ______. A. private key cryptography B. cipherkey cryptography C. public/private key cryptography D. public key cryptography

A. private key cryptography***

7. Each of the following is a characteristic of a secure hash algorithm except _______. A. collisions should be rare B. the results of a hash function should not be reversed C. the hash should always be the same fixed size D. a message cannot be produced from a predefined hash

A. collisions should be rare***

20. The Microsoft Windows LAN Manager hash ______. A. is weaker than NTLMv2 B. is part of BitLocker C. is required to be present when using TPM D. is identical to MD-4

A. is weaker than NTLMv2***

12. Which of the following is the strongest symmetric cryptographic algorithm? A. Advanced Encryption Standard B. Data Encryption Standard C. Triple Data Encryption Standard D. Rivest Cipher (RC) 1

A. Advanced Encryption Standard***

17. _____ uses lattice-based cryptography and may be more resistant to quantum computing attacks. A. NTRUEncrypt B. ECC C. RC4 D. SHA-512

A. NTRUEncrypt***

1. What is data called that is to be encrypted by inputting into an encryption algorithm? A. Plaintext B. Cleartext C. Opentext D. Ciphertext

A. Plaintext***

13. If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, the key he uses to encrypt the message is _______. A. Alice's private key B. Alice's public key C. Bob's public key D. Bob's private key

B. Alice's public key***

15. Which of the following asymmetric cryptographic algorithms is the most secure? A. MEC-2 B. RSA C. MD-17 D. SHA-2

B. RSA***

2. Which of the following is not a basic security protection over information that cryptography can provide? A. Confidentiality B. Stop loss C. Integrity D. Authenticity

B. Stop loss***

8. Hashing would not be used in which of the following examples? A. bank automatic teller machine (ATM) B. encrypting and decrypting e-mail attachments C. verifying a user password entered on a Linux system D. determining the integrity of a message

B. encrypting and decrypting e-mail attachments***

6. A(n) _____ is not decrypted but is only used for comparison purposes. A. stream B. hash C. algorithm D. key

B. hash***

3. The areas of a file in which steganography can hide data include all of the following except ______. A. in data that is used to describe the content or structure of the actual data B. in the directory structure of the file system C. in the file header fields that describe the file D. in areas that contain the content data itself

B. in the directory structure of the file system***

14. A digital signature can provide each of the following benefits except ______. A. prove the integrity of the message B. verify the receiver C. verify the sender D. enforce non-repudiation

B. verify the receiver***

10. Which of the following is a protection provided by hashing? A. Authenticity B. Confidentiality C. Integrity D. Availability

C. Integrity***

4. Proving that a user sent an e-mail message is known as ______. A. repudiation B. integrity C. non-repudiation D. availability

C. non-repudiation***

19. Which of the following has an onboard key generator and key storage facility, accelerated symmetric and asymmetric encryption, and can back up sensitive material in encrypted form? A. Trusted Platform Module (TPM) B. Self-encrypting hard disk drives (HDDs) C. Encrypted hardware-based USB devices D. Hardware Security Module (HSM)

D. Hardware Security Module (HSM)***

9. _____ encrypts a hash with a shared secret key. A. Key_hash B. WEP C. MDRIPE D. Hashed Message Authentication Code (HMAC)

D. Hashed Message Authentication Code (HMAC)***

11. _____ is a hash that uses two different and independent parallel chains of computation, the result of which are then combined at the end of the process. A. DES B. AES C. RC4 D. RIPEMD

D. RIPEMD***

16. Which of the following asymmetric encryption algorithms uses prime numbers? A. EFS B. Quantum computing C. ECC D. RSA

D. RSA***

18. The Trusted Platform Module (TPM) _____. A. allows the user to boot a corrupted disk and repair it B. is only available on Windows computers running BitLocker C. includes a pseudorandom number generator (PRNG) D. provides cryptographic services in hardware instead of software

D. provides cryptographic services in hardware instead of software***


Ensembles d'études connexes

Chapter 16: Adolescence: Psychosocial Development

View Set

Chapter Fifteen -- Commercial Paper

View Set

Cosmetology, Chapter 8, Design Decisions

View Set

PH 506: Eight Prakriti and Organ Systems

View Set

Chapter 21 Earth & Space Science

View Set

Chapter 21: The Child's Experience of Hospitalization

View Set

module 11: skeletal system and axial division

View Set

1- 1 الدرس الأول - هل قضيت عطلة سعيدة؟

View Set