Cyber security moduel 7-8

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following is NOT a characteristic of good one-way hash functions: a. All are characteristics of one-way hash functions b. Almost impossible to find an x that satisfies Hash(x) c. Almost impossible to find two messages x and x' to have the same hash value d. Easy to get Hash(x) when giving x e. Minor change in x, large changes in Hash(x)

A

Which of the following is a recommendation to use when a specific standard or procedure does not exist? a. Guideline b. Procedure c. Standard d. Baseline

A

Which of the following is the size of the output message digest in MD5? a. 128 bits b. 160 bits c. 512 bits d. 256 bits

A

For transposition ciphers, the key is typically a. None of these options represent the transposition cipher key b. The column/row dimensions of the table used to encode and decode the plaintext message c. The number of letters to shift each plaintext letter by to obtain the corresponding ciphertext letter d. The length of the one-time pad

B

Which of the following is NOT a benefit of symmetric-key cryptographic algorithms a. Relatively less complex math compared to public-key algorithms b. Highly scaleable c. None of these d. efficient and fast

B

While most cryptographic algorithms are not theoretically unbreakable, we rely on all of the following to make them unbreakable in practice EXCEPT? a. Data complexity b. Algorithm complexity c. Storage requirements d. Processing complexity

B

MD5 processes the input message in 512-bit blocks, after adding padding and message length. If the original input message length is 640 bits, the blocks (ready for processing) would be two blocks of size 512-bits. The first block has 512 bits of the message. The contents of the second block are: a. 448 bits of message and 64 bits for the length b. None of these options c. 128 bits of message, 320 bits of padding, and 64 bits for the length d. 512 bits of message e. 320 bits of message, 128 bits of padding, and 64 bits for the length

C

The result of bitwise 10101 XOR 11011 is: a. 11111 b. 10001 c. 01110 d. 01010

C

HIPAA is a set of federal regulations that define security guidelines. What do HIPAA guidelines protect? a. Integrity b. Availability c. Non-repudiation d. Privacy

D

What are the downsides of having a cryptographic algorithm with the encryption method kept a secret? a. Security will be compromised if someone reverse-engineers the secret method b. A user who leaves the group can accidentally reveal the secret c. Quality control/ standardization opportunities are lost d. All the answers are downsides

D

Which of the following is a problem in the Caesar cipher encryption mechanism: a. Each key letter is used exactly once, for only one message b. Implementation requires a lot of memory c. Easy to break with anagramming d. Frequency of characters is preserved

D

GDPR is a comprehensive regulation implemented in all Asian countries, requiring organizations to implement reasonable data protection measures to protect the personal data of consumers and employees against data loss or exposure. t/f

False

In the encryption using XOR, if the keystream is generated by a pseudo-random number generator, the result is a one-time pad, which is unbreakable even in theory. t/f

False

Key pre-distribution is one of the main challenges of public key cryptography t/f

False

The strength of one-time pad encryption mechanism comes from the usage of a purely random and fixed-size key (e.g. 2048 bits), and this key is then repeated along the entire message length. t/f

False

A "regulation" can be defined as "a requirement published by a government or other licensing body that must be followed". t/f

True

In a chosen-plaintext attack, the cryptanalyst gets to pick the pairs of plaintext and ciphertext he wants access to, obtaining the secret key or an algorithm to infer another plaintext from its ciphertext. t/f

True

Public-key algorithms can be used to preserve the integrity of a message. t/f

True


Ensembles d'études connexes

LC13: LearningCurve - Ch. 13: Monopoly

View Set

Rational and irrational numbers step by step

View Set

Module 12 Helping and prosocial behavior

View Set

Pathophysiology Unit 5 Prep U Chs 13, 14, 15, 16

View Set

Patho 8 Eye, Ear, Nose, and Throat Health Problems

View Set

Chapter 20 Accounting Changes and Error Corrections

View Set

Real Estate Practice Online Chapter 1 Unit 1-3 Online

View Set

business 10 pre-IB quiz 3 - management

View Set