Security+ CH 5

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

If using the MD5 hashing algorithm, what is the length to which each message is padded? 32 bits 64 bits 128 bits 512 bits

512bits

Which of these is the strongest symmetric cryptographic algorithm? Advanced Encryption Standard Data Encryption Standard Triple Data Encryption Standard Rivest Cipher (RC) 1

Advanced Encryption Standard

If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message? Alice's private key Alice's private key Bob's public key Bob's public key

Alice's public key

Which solution is ideal for encrypting an entire hard drive of a PC? EFS BitLocker PGP 3DES

BitLocker

What is the block cipher algorithm that operates on 64-bit blocks and can have a key length from 32 to 448 bits known as? RSA AES Blowfish 3DES

Blowfish

Which of these is NOT a characteristic of a secure hash algorithm? Collisions should be rare The results of a hash function should not be reversed The hash should always be the same fixed size A message cannot be produced from the predefined hash

Collisions should be rare

Which of the following key exchanges uses the same keys each time? Diffie-Hellman Ephemeral (DHE) Diffie-Hellman (DH) Diffie-Hellman-RSA (DHRSA) Elliptic Curve Diffie-Hellman (ECDH)

Diffie-Hellman (DH)

What is the name of the open source asymmetric cryptography system that runs on Windows, UNIX, and Linux systems, and is compatible with PGP? GPG OGP CGP GPP

GPG

Which of these has an onboard key generator and key storage facility, as well as accelerated symmetric and asymmetric encryption, and can back up sensitive material in encrypted form? Trusted Platform Module (TPM) self-encrypting hard disk drives (HDDs) encrypted hardware-based USB devices Hardware Security Module (HSM)

Hardware Security Module (HSM)

NTRUEncrypt is based on which cryptography method? Quantum-based Prim number based Lattice-based Elliptic curve cryptography

Lattice-based

All of the following can be broken mathematically EXCEPT _____. AES 3DES SHA OTP

OTP

Which asymmetric cryptographic algorithm is the most secure? SHA-2 BTC-2 RSA ME-14

RSA

Which asymmetric encryption algorithm uses prime numbers? EFS quantum computing ECC RSA

RSA

What is the disadvantage of RSA compared to most symmetrical algorithms? There is no disadvantage of asymmetrical algorithms RSA is slower in software but not in hardware RSA is complicated and slower than other algorithms RSA doesn't provide nonrepudiation like symmetrical algorithms

RSA is complicated and slower than other algorithms

What are the latest versions of the Secure Hash Algorithm? (pick two) SHA-2 SHA-3 SHA-4 SHA-5

SHA-2 SHA-3

Which type of cryptographic algorithm takes an input string of any length, and returns a string of any requested variable length? Substitution Block Loop Sponge

Sponge

Which of the following is NOT a benefit of USB device encryption? Administrators can initiate a self-destruct command to eliminate data Administrators can lock a user out of the device during the next connection Files moved to the USB are automatically encrypted The USB device can encrypt the hard drive of an attacker when they attempt to access data pg 208

The USB device can encrypt the hard drive of an attacker when they attempt to access data

A(n) _____ is not decrypted but is only used for comparison purposes? stream digest algorithm key

digest

The Hashed Message Authentication Code (HMAC) _____. encrypts only the key encrypts the key and the message encrypts only the message encrypts the DHE key only

encrypts the key and the message

What type of cryptographic algorithm is considered to be a one-way algorithm, in that its contents can't be used to reveal the original set of data? hash key digest block

hash

The areas of a file in which steganography can hide data include all of the following EXCEPT _____. in data that is used to describe the content or structure of the actual data in the directory structure of the file system in the file header fields that describe the file in areas that contain the content data itself

in the directory structure of the file system

Elliptic Curve Diffie-Hellman (ECDH) is an example of _____ in-band key exchange out-of-band key exchange SHA-1 key managment AES key certification

in-band key exchange

Which protection is provided by hashing? authenticity confidentiality integrity availability

integrity

Proving that a user sent an email message is known as _____. repudiation integrity non-repudiation availability

non-repudiation

Public key systems that generate random public keys that are different for each session are called _____ Public Key Exchange (PKE) Elliptic Curve Diffie-Hellman (ECDH) Diffie-Hellman (DH) perfect forward secrecy

perfect forward secrecy

What is data called that is to be encrypted by inputting it into an cryptographic algorithm? plaintext cleartext opentext ciphertext

plaintext

A key that is generated by a symmetric cryptographic algorithm is said to be a: private key public key symmetric key shared key

private key

The Trusted Platform Module (TPM) _____. allows the user to boot a corrupted disk and repair it is available only on Windows computers running BitLocker includes a pseudorandom number generator (PRNG) provides cryptographic services in hardware instead of software

provides cryptographic services in hardware instead of software

Which of these is NOT a basic security protection for information that cryptography can provide? risk loss integrity confidentiality authenticity

risk loss

A digital signature can provide each of the following benefits EXCEPT _____. prove the integrity of the message verify the receiver verify the sender enforce nonrepudiation

verify the receiver


Ensembles d'études connexes

Medical Terminology: Chapter 19 Questions, med term chapter 1-19

View Set

Communications Midterm MC CHAPTER 9

View Set

Intro to Programming - Chapter 7

View Set

Chapter #10: Recordings - From Bach to Rock and Rap

View Set