Security+ Chapter 3 Quiz

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Encryption is the practice of transforming information so that it is secure and cannot be accessed by unauthorized parties. T/F

False

GNU Privacy Guard a proprietary software that runs on different operating systems. T/F

False

Obfuscation is making something well known or clear. T/F

False

What is a characteristic of the Trusted Platform Module (TPM)?

It provides cryptographic services in hardware instead of software

Alexei was given a key to a substitution cipher. The key showed that the entire alphabet was rotated 13 steps. What type of cipher is this?

ROT13

What is the latest version of the Secure Hash Algorithm?

SHA-3

A collision attack is an attempt to find two input strings of a hash function that produce the same hash result. T/F

True

Wireless data networks are particularly susceptible to known ciphertext attacks. T/F

True

What technology uses a chip on the motherboard of the computer to provide cryptographic services?

Trusted Platform Module (TPM)

What is a block cipher algorithm that operates on 64-bit blocks and can have a key length from 32 to 448 bits?

blowfish

Alyosha was explaining to a friend the importance of protecting a cryptographic key from cryptoanalysis. He said that the key should not relate in a simple way to the cipher text. Which protection is Alyosha describing?

confusion

Which of these has an onboard key generator and key storage facility, as well as accelerated symmetric and asymmetric encryption, and can back up sensitive material in encrypted form?

hardware security module (HSM)

What type of cryptographic algorithm creates a unique digital fingerprint of a set of data?

hash

Which areas of a file cannot be used by steganography to hide data?

in the directory structure of the file system

Proving that a user sent an email message is known as _____.

non-repudiation

Public key systems that generate random public keys that are different for each session are called _____.

perfect forward secrecy

What alternative term can be used to describe asymmetric cryptographic algorithms?

public key cryptography

Egor wanted to use a digital signature. Which of the following benefits will the digital signature not provide?

verify the receiver


Ensembles d'études connexes

Differences in Environmental Influences: Diathesis Stress & Differential Susceptibility

View Set

Chapter 16: Outcome and Identification Planning PrepU

View Set

Pharm made easy: Neuro system (part 1) test

View Set

Chapter 25: The Child with Cancer

View Set

Fahmy 2017 day 888 -= Choose the correct answer:

View Set