Module 06 Basic Cryptography

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Brielle is researching substitution ciphers. She came across a cipher in which the entire alphabet was rotated 13 steps. What type of cipher is this? a. XOR b. ROT13 c. Alphabetic d. XAND13

b. ROT13

What is a collision? a. Two ciphertexts have the same length. b. Two algorithms have the same key. c. Two files produce the same digest. d. Two keys are the same length.

c. Two files produce the same digest.

Cryptography can prevent an individual from fraudulently reneging on an action. What is this known as? a. Nonrepudiation b. Repudiation c. Obfuscation d. Integrity

a. Nonrepudiation

Egor wanted to use a digital signature. Which of the following benefits will the digital signature NOT provide? a. Verify the receiver b. Verify the sender c. Enforce nonrepudiation d. Prove the integrity of the message

a. Verify the receiver

Which of these is the strongest symmetric cryptographic algorithm? a. Advanced Encryption Standard b. RC1 c. Triple Data Encryption Standard d. Data Encryption Standard

a. Advanced Encryption Standard

If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message? a. Alice's public key b. Bob's public key c. Alice's private key d. Bob's private key

a. Alice's public key

Which of the following is not to be decrypted but is only used for comparison purposes? a. Digest b. Stream c. Algorithm d. Key

a. Digest

What is data called that is to be encrypted by inputting it into a cryptographic algorithm? a. Plaintext b. Byte-text c. Ciphertext d. Cleartext

a. Plaintext

What is low latency? a. The time between when a byte is input into a cryptographic cipher and when the output is obtained. b. The delay between when a substitution cipher decrypts the first block and when it finishes with the last block. c. The requirements for an IoT device that is using a specific network. d. A low-power source requirement of a sensor.

a. The time between when a byte is input into a cryptographic cipher and when the output is obtained.

What are public key systems that generate different random public keys for each session? a. perfect forward secrecy b. Public Key Exchange (PKE) c. Diffie-Hellman (DH) d. Elliptic Curve Diffie-Hellman (ECDH)

a. perfect forward secrecy

Which of these is NOT a characteristic of a secure hash algorithm? a. The results of a hash function should not be reversed. b. Collisions should occur no more than 15 percent of the time. c. A message cannot be produced from a predefined hash. d. The hash should always be the same fixed size.

b. Collisions should occur no more than 15 percent of the time.

Basil was reading about a new attack that forces the system to abandon a higher cryptographic security mode of operation and instead fall back to an older and less secure mode. What type of attack is this? a. Deprecation attack b. Downgrade attack c. Obfuscation attack d. Pullback attack

b. Downgrade attack

Which of the following is FALSE about "security through obscurity"? a. Proprietary cryptographic algorithms are an example. b. It can only provide limited security. c. It attempts to hide the existence from outsiders. d. It is essentially impossible.

b. It can only provide limited security.

Which of the following hides the existence of information? a. Decryption b. Steganography c. Ciphering d. Encryption

b. Steganography

Which of the following is NOT a characteristic of the Trusted Platform Module (TPM)? a. It can easily be transported to another computer. b. It can generate asymmetric cryptographic public and private keys. c. It includes a pseudorandom number generator (PRNG). d. It provides cryptographic services in hardware instead of software

c. It includes a pseudorandom number generator (PRNG).

Which of these is NOT a basic security protection for information that cryptography can provide? a. Integrity b. Confidentiality c. Risk d. Authenticity

c. Risk

Deo has been asked to explain RSA to his colleague. After his explanation, Deo is asked what, if any, weaknesses RSA has. How would Deo respond? a. RSA has no known weaknesses. b. RSA weaknesses are based on ECC. c. The digest produced by the RSA algorithm is too short to be secure. d. As computers become more powerful, the ability to compute factoring has increase

d. As computers become more powerful, the ability to compute factoring has increase

Which of these provides cryptographic services and is external to the device? a. Trusted Platform Module (TPM) b. encrypted hardware-based USB devices c. self-encrypting hard disk drives (SED) d. Hardware Security Module (HSM)

d. Hardware Security Module (HSM)

Which of the following is NOT a symmetric cryptographic algorithm? a. DES b. Blowfish c. 3DES d. SHA

d. SHA

icero is researching hash algorithms. Which algorithm would produce the longest and most secure digest? a. SHA6-6 b. MD5 c. SHA-256 d. SHA3-512

d. SHA3-512


Ensembles d'études connexes

REAL NUMBERS, IMAGINARY NUMBERS, AND COMPLEX NUMBERS

View Set

Principles of Management Chapter 5; Planning and Decision-making

View Set

Age of Exploration - Chapter 6 - Magellan's Voyage

View Set

Module 1 Exam, Practice T2, EAQ #6 Nursing Process/sexuality, N204 Practice Quizes, Fundamentals Quiz, Health and Physical Assessment, Leadership EAQ's, EAQ NCLEX, Maternity Chap 28, Maternity and Women's Health Nursing - Newborn, Nur 106- Module G2,...

View Set

Voice Exam 3 - Facilitating Techniques

View Set

MH Exam 4 , MH EXAM 4 - ATI, Dementia & Delirium Questions

View Set

Chapter 61 Neurologic Dysfunction Prep U

View Set