Lesson 2 Quiz- Chapter 2: Cryptography
Chris' public key
Assume that Mike is trying to send an encrypted email to Chris using PGP or S/MIME. What key will Mike use to encrypt the email to Chris? Chris' private key Chris' public key Mike's private key Mike's public
All of these answers are correct.
Most digital certificates contain which of the following information? Serial number Signature Thumbprint (fingerprint) All of these answers are correct.
B. 32
SHA512 checksum (512 bits) output is represented by a 128 hexadecimal number, whereas MD5 produces a hash value that is typically expressed in text format as a _____-digit hexadecimal number. A. 128 B. 32 C. 64 D. 512
collision
There are several vulnerabilities in the MD5 hashing protocol, including _____ and pre-image vulnerabilities integrity collision observation anonimity
B. OCSP
Using the ____, a client sends a request to find the status of a certificate and gets a response without having to know the complete list of revoked certificates. A. ASSP B. OCSP C. OSPD D. PKCS
DES AES
Which of the following are encryption algorithms for confidentiality for IPsec? SHA DES MD5 AES
Substitution Polyalphabetic Transposition
Which of the following are valid cipher methods? Polyalphabetic Mixing Substitution Transposition
All of these answers are correct.
Which of the following implementations use a key pair? PGP Digital certificates on a web server running TLS S/MIME All of these answers are correct.
PKCS #12
Which of the following is a format for storing both public and private keys using a symmetric password-based key to "unlock" the data whenever the key needs to be used or accessed? PKCS #10 PKCS #12 PKCS #7 PKCS #3
Diffie-Hellman
Which of the following is an algorithm that allows two devices to negotiate and establish shared secret keying material (keys) over an untrusted network? RSA IKE Diffie-Hellman RC4
Certificate Authority (CA)
Which of the following is an entity that creates and issues digital certificates? Certificate Registry (CR) Certificate Authentication Server (CAS) Certificate Authority (CA) None of these answers is correct.
AES
Which of the following is not an asymmetric algorithm? RSA DA AES ElGamal DSA
Private key
Which of the following is not part of a certificate? Signature Public key Serial number Private key
B. Subordinate CA servers can be invalidated.
Which of the following statements is true? A. Subordinate CA servers cannot be invalidated. B. Subordinate CA servers can be invalidated. C. Root CA servers cannot be invalidated. D. Root CA servers can be invalidated.
C.PGP
___ is an example of a tool that can be used to generate public and private key pairs. A. AES B. DES C.PGP D. SHA
PKCS #3
____ is a Public Key Cryptography Standard that defines the format of a Diffie-Hellman key exchange PKCS #10 PKCS #12 PKCS #3 PKCS #1
OTP
_____ is a Public Key Cryptography Standard that defines the format of a Diffie-Hellman key exchange OTP RSA DES PKCS #7
PKI (Public Key Infrastructure)
_____ is a set of identities, roles, policies, and actions for the creation, use, management, distribution, and revocation of public and private keys. PKI PCI NIP DSA
PKCS #12
_____ is a set of identities, roles, policies, and actions for the creation, use, management, distribution, and revocation of public and private keys. PKCS #10 PKCS #12 PKCS #3 PKCS #1
HMAC
_____ uses the mechanism of hashing, but instead of using a hash that anyone can calculate, it includes in its calculation a secret key of some type. DSA HMAC SMAC AES