Quiz 5
Which solution is ideal for encrypting an entire hard drive of a PC?
BitLocker
A(n) _____ is not decrypted but is only used for comparison purposes.
digest
Which of these is the strongest symmetric cryptographic algorithm?
Advanced Encryption Standard
If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message?
Alice's public key
What type of cryptography uses two keys instead of just one, generating both a private and a public key?
Asymmetric
Which of these is NOT a characteristic of a secure hash algorithm?
Collisions should be rare.
Which of the following key exchanges uses the same keys each time?
Diffie-Hellman (DH)
Which of these has an onboard key generator and key storage facility, as well as accelerated symmetric and asymmetric encryption, and can back up sensitive material in encrypted form?
Hardware Security Module (HSM)
NTRUEncrypt is based on which cryptography method?
Lattice-based
Select below the hashing algorithm that takes plaintext of any length and generates a digest 128 bits in length:
MD2
All of the following can be broken mathematically EXCEPT _____.
OTP
Why does RC4 consume more processing power than RC5?
RC4 is a stream cipher and RC5 is a block cipher
Which asymmetric cryptographic algorithm is the most secure?
RSA
Which asymmetric encryption algorithm uses prime numbers?
RSA
A digital signature does NOT provide which of the following?
Redundancy
OTPs were originally used by whom?
Resistance groups and operation teams during World War II
What are the latest versions of the Secure Hash Algorithm? (pick two)
SHA-2 SHA-3
Which type of cryptographic algorithm takes an input string of any length, and returns a string of any requested variable length?
Sponge
Which of the following is NOT a benefit of USB device encryption?
The USB device can encrypt the hard drive of an attacker when they attempt to access data
The NTRUEncrypt cryptographic algorithm makes use of which of the following cryptographic techniques?
lattice-based
Proving that a user sent an email message is known as _____.
non-repudiation
Public key systems that generate random public keys that are different for each session are called _____.
perfect forward secrecy
What is data called that is to be encrypted by inputting it into an cryptographic algorithm?
plaintext
The Trusted Platform Module (TPM) _____.
provides cryptographic services in hardware instead of software
Which of these is NOT a basic security protection for information that cryptography can provide?
risk loss
A digital signature can provide each of the following benefits EXCEPT _____.
verify the receiver
The Hashed Message Authentication Code (HMAC) _____.
encrypts the key and the message
The areas of a file in which steganography can hide data include all of the following EXCEPT _____.
in the directory structure of the file system
Elliptic Curve Diffie-Hellman (ECDH) is an example of _____.
in-band key exchange
Which protection is provided by hashing?
integrity