QUIZ 9 - CHAPTER 7

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

BOB'S PUBLIC KEY

Alice would like to send a message to Bob securely and wishes to use asymmetric encryption to encrypt the contents of the message. What key does she use to encrypt this message? Bob's public key Alice's private key Alice's public key Bob's private key

INTEGRITY

Bob is sending a message to Alice. He wants to ensure that nobody tampers with the message while it is in transit. What goal of cryptography is Bob attempting to achieve? Nonrepudiation Integrity Confidentiality Authentication

ALICE'S PUBLIC KEY

Bob received a message from Alice that contains a digital signature. What cryptographic key does Bob use to verify the digital signature? Alice's private key Alice's public key Bob's private key Bob's public key

Wi-Fi PROTECTED ACCESS VERSION 3 (WPA3)

Juan is a wireless security professional. He is selecting a standard for wireless encryption protocols for access points and devices for his agency. For the highest security, which protocol should Juan choose? Wired Equivalent Privacy (WEP) Wi-Fi Protected Access (WPA) Wi-Fi Protected Access version 3 (WPA3) Wi-Fi Protected Access version 2 (WPA2)

DECRYPTION

Maria receives a ciphertext message from her colleague Wen. What type of function does Maria need to use to read the plaintext message? Decryption Validation Encryption Hashing

FALSE

True or False? A product cipher is an encryption algorithm that has no corresponding decryption algorithm.

TRUE

True or False? A salt value is a set of random characters you can combine with an input key to create an encryption key

TRUE

True or False? An algorithm is a repeatable process that produces the same result when it receives the same input.

TRUE

True or False? Digital signatures require asymmetric key cryptography.

TRUE

True or False? Elliptic curve cryptography (ECC) relies on algebraic structures of elliptic curves over finite fields.

FALSE

True or False? In a known-plaintext attack (KPA), the cryptanalyst has access only to a segment of encrypted data and has no choice as to what that data might be.

TRUE

True or False? In cryptography, a keyspace is the number of possible keys to a cipher.

TRUE

True or False? Symmetric key ciphers require that both parties first exchange keys to be able to securely communicate.

FALSE

True or False? The U.S. government currently has no standard for creating cryptographic keys for classified applications.

FALSE

True or False? The term certificate authority (CA) refers to a trusted repository of all public keys.

TRUE

True or False? Transport Layer Security (TLS) is an example of a transport encryption protocol.

TRUE

True or False? Whereas a cipher performs a particular task, a key gives the specific directions for how to do it.

TRUE

True or False? With asymmetric key ciphers, it is computationally infeasible to derive the second algorithm from the first algorithm.

TRUE

True or False? You can break a cipher by analyzing the ciphertext to find the plaintext or key or by analyzing the ciphertext and its associated plaintext to find the key.

FALSE

True or False? You must always use the same algorithm to encrypt information and decrypt the same information.


Ensembles d'études connexes

Chapter 7: The Quantum-Mechanical Model of the Atom

View Set

Finding Mean, Median, Mode and Range

View Set

SAUNDERS - INCORRECT Questions W/ Rationales Part 1

View Set

Cell bio lecture 14: Endomembrane System

View Set

Chapter 2 - Supply Chain Performance: Achieving Strategic Fit and Scope

View Set