FISS Chapter 9

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What is NOT a valid encryption key length for use with the Blowfish algorithm? a. 32 bits b. 64 bits c. 256 bits d. 512 bits

512 bits

Which information security objective allows trusted entities to endorse information? a. Witnessing b. Authorization c. Certification d. Validation

Certification

What mathematical problem forms the basis of most modern cryptographic algorithms? a. Birthday problem b. Traveling salesman problem c. Factoring large primes d. Quantum mechanics

Factoring large primes

Product cipher is an encryption algorithm that has no corresponding decryption algorithm. True False

False

What is NOT a symmetric encryption algorithm? a. Carlisle Adams Stafford Tavares (CAST) b. Rivest-Shamir-Adelman (RSA) c. Data Encryption Standard (DES) d. International Data Encryption Algorithm (IDEA)

Rivest-Shamir-Adelman (RSA)

Alice would like to send a message to Bob using a digital signature. What cryptographic key does Alice use to create the digital signature? a. Alice's private key b. Alice's public key c. Bob's private key d. Bob's public key

Alice's private key

Bob received a message from Alice that contains a digital signature. What cryptographic key does Bob use to verify the digital signature? a. Bob's public key b. Alice's private key c. Alice's public key d. Bob's private key

Alice's public key

Which cryptographic attack offers cryptanalysts the most information about how an encryption algorithm works? a. Chosen plaintext b. Chosen ciphertext c. Known plaintext d. Ciphertext only

Chosen plaintext

Betty receives a ciphertext message from her colleague Tim. What type of function does Betty need to use to read the plaintext message? a. Validation b. Decryption c. Encryption d. Hashing

Decryption

Alice and Bob would like to communicate with each other using a session key but they do not already have a shared secret key. Which algorithm can they use to exchange a secret key? a. Message digest algorithm (MD5) b. Rivest, Shamir, Adelman (RSA) c. Blowfish d. Diffie-Hellman

Diffie-Hellman

What type of function generates the unique value that corresponds to the contents of a message and is used to create a digital signature? a. Elliptic curve b. Decryption c. Encryption d. Hash

Hash

Gary is sending a message to Patricia. He wants to ensure that nobody tampers with the message while it is in transit. What goal of cryptography is Gary attempting to achieve? a. Confidentiality b. Authentication c. Integrity d. Nonrepudiation

Integrity

Which type of cipher works by rearranging the characters in a message? a. Transposition b. Steganographic c. Substitution d. Asymmetric

Transposition

A salt value is a set of random characters you can combine with an actual input key to create the encryption key. True False

True

A substitution cipher replaces bits, characters, or blocks of information with other bits, characters, or blocks. True False

True

What is the only unbreakable cipher when it is used properly? a. Vernam b. Rivest-Shamir-Adelman (RSA) c. Blowfish d. Elliptic Curve Diffie-Hellman in Ephemeral mode (ECDHE)

Vernam

When Patricia receives a message from Gary, she wants to be able to demonstrate to Sue that the message actually came from Gary. What goal of cryptography is Patricia attempting to achieve? a. Confidentiality b. Nonrepudiation c. Authentication d. Integrity

Nonrepudiation

Which of the following allows a certificate authority (CA) to revoke a compromised digital certificate in real time? a. International Data Encryption Algorithm (IDEA) b. Certificate revocation list (CRL) c. Transport Layer Security (TLS) d. Online Certificate Status Protocol (OCSP)

Online Certificate Status Protocol (OCSP)

Which approach to cryptography provides the strongest theoretical protection? a. Elliptic curve cryptography b. Quantum cryptography c. Asymmetric cryptography d. Classic cryptography

Quantum cryptography

Which set of characteristics describes the Caesar cipher accurately? a. Asymmetric, block, substitution b. Asymmetric, stream, transposition c. Symmetric, block, transposition d. Symmetric, stream, substitution

Symmetric, stream, substitution


Ensembles d'études connexes

Upper Arm Muscles (origin, insertion, action)

View Set

Investment Management Chapter 3, Chapter 3, Homework 2, Investments Test 1, Chapter 6 FI, Investments Exam 1, FIN 427 Exam 4, Quiz 2, Chapter 2 Mult, Ch. 2 chapter questions, exame 4200

View Set

NCLEX Review Q&A Medical Surgical

View Set

Chapter 1 Employee Training and Development

View Set