CIST 1601 Chapter 8
The __________ algorithm, developed in 1977, was the first public-key encryption algorithm published for commercial use. a. MAC b. AES c. RSA d. DES
RSA
The __________ is responsible for the fragmentation, compression, encryption, and attachment of an SSL header to the cleartext prior to transmission. a. Standard HTTP b. SSL Record Protocol c. S-HTTP d. SFTP
SSL Record Protocol
__________ is the amount of effort (usually in hours) required to perform cryptanalysis to decode an encrypted message when the key or algorithm (or both) are unknown. a. A key b. An algorithm c. Work factor d. Code
Work factor
Bit stream methods commonly use algorithm functions like the exclusive OR operation (__________). a. XOR b. OR c. NOR d. EOR
XOR
A method of encryption that requires the same secret key to encipher and decipher the message is known as __________ encryption. a. asymmetric b. private c. symmetric d. public
symmetric
Pretty Good Privacy (PGP) uses the freeware ZIP algorithm to compress the message after it has been digitally signed but before it is encrypted. _________________________ True False
True
Within a PKI, a(n) registration authority issues, manages, authenticates, signs, and revokes users' digital certificates, which typically contain the user name, public key, and other identifying information. _________________________ True False
False
__________ functions are mathematical algorithms that generate a message summary or digest to confirm the identity of a specific message and to confirm that there have not been any changes to the content. a. Map b. Key c. Encryption d. Hash
Hash
A(n) distinguished name uniquely identifies a certificate entity to a user's public key. _________________________ True False
True
Ciphertext or a cryptogram is an encoded message, or a message that has been successfully encrypted. _________________________ True False
True
In transport mode the entire IP packet is encrypted and is then placed as the content portion of another IP packet. _________________________ True False
False
The S-HTTP security solution provides six services: authentication by digital signatures, message encryption, compression, e-mail compatibility, segmentation, and key management. True False
False
SHA-1 produces a(n) ___________-bit message digest, which can then be used as an input to a digital signature algorithm. a. 48 b. 56 c. 160 d. 256
160
Digital signatures should be created using processes and products that are based on the __________. a. SSL b. HTTPS c. NIST d. DSS
DSS
As DES became known as being too weak for highly classified communications, Double DES was created to provide a level of security far beyond that of DES. _________________________ True False
False
