22

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A type of encryption scheme that uses a paired public and private key is known as: (Select 2 answers) Secret-key encryption Asymmetric encryption Symmetric encryption Public-key encryption Session-key encryption

Asymmetric encryption ( Missed) Public-key encryption ( Missed)

What are the characteristic features of Elliptic Curve Cryptography (ECC)? (Select 3 answers) Asymmetric encryption Low processing power requirements Suitable for small wireless devices High processing power requirements Symmetric encryption Not suitable for small wireless devices

Asymmetric encryption ( Missed) Low processing power requirements ( Missed) Suitable for small wireless devices ( Missed)

A cryptographic standard for digital signatures is known as: DSA PFS DES RSA

DSA

Which of the three states of digital data requires data to be processed in an unencrypted form? Data-in-transit Data-at-rest Data-in-use

Data-in-use

Which of the algorithms listed below does not belong to the category of symmetric ciphers? RC4 DES RSA AES Blowfish 3DES Twofish

RSA

In cryptography, the term "Key stretching" refers to a mechanism for extending the length of a cryptographic key to make it more secure against brute-force attacks. True False

True

In cryptography, the term "Secret algorithm" refers to an algorithm designed in a way that prevents the examination of its inner workings. True False

True

The term "Ephemeral key" refers to an asymmetric encryption key designed to be used only for a single session or transaction. True False

True

Which of the following terms illustrate(s) the security through obscurity concept? (Select all that apply) Code obfuscation Steganography SSID broadcast suppression Encryption Substitution ciphers

Code obfuscation ( Missed) Steganography ( Missed) SSID broadcast suppression ( Missed) Substitution ciphers ( Missed)

Which of the following terms is used in conjunction with the assumption that the output of a cryptographic function should be considerably different from the corresponding plaintext input? Confusion Obfuscation Collision Diffusion

Confusion

Examples of means that provide randomization during the encryption process include: (Select 3 answers) Cryptographic nonce Obfuscation Salting Initialization Vector (IV) Shimming

Cryptographic nonce Salting Initialization Vector (IV)

Which of the following answers refers to a commonly used asymmetric algorithm for secure exchange of symmetric keys? RC4 Bcrypt Diffie-Hellman RIPEMD

Diffie-Hellman

Which of the terms listed below is used to describe a situation where a small change introduced to the input data before encryption causes large changes in its encrypted version? Diffusion Confusion Obfuscation Collision

Diffusion

Which of the block cipher modes listed below provides both data integrity and confidentiality? CBC GCM ECB CTR

GCM

Pseudo-random data used in combination with a secret key in WEP and SSL encryption schemes is known as: Salt Shim IV Seed

IV

Digital signatures provide: (Select 3 answers) Integrity Authentication Confidentiality Authorization Non-repudiation Accounting

Integrity ( Missed) Authentication ( Missed) Non-repudiation ( Missed)

Which of the answers listed below refers to a solution designed to strengthen the security of session keys? ECB PFS EFS PFX

PFS

Pseudo-random data added to a password before hashing is called: Shim Salt Seed IV

Salt

Which of the following answers refers to a type of additional input that increases password complexity and provides better protection against brute-force, dictionary, and rainbow table attacks? Seed IV Salt Shim

Salt

Which of the answers listed below refer to the Advanced Encryption Standard (AES)? (Select 3 answers) Symmetric-key algorithm 128-, 192-, and 256-bit keys Asymmetric-key algorithm Stream cipher algorithm 56-, 112-, and 168-bit keys Block cipher algorithm

Symmetric-key algorithm ( Missed) 128-, 192-, and 256-bit keys ( Missed) Block cipher algorithm ( Missed)

In asymmetric encryption, any message encrypted with the use of a public key can only be decrypted by applying the same algorithm and a matching private key. True False

True

In cryptography, the number of bits in a key used by a cryptographic algorithm is referred to as a key size or key length. The key size determines the maximum number of combinations required to break the encryption algorithm, therefore typically a longer key means stronger cryptographic security. True False

True

Unlike stream ciphers which process data by encrypting individual bits, block ciphers divide data into separate fragments and encrypt each fragment separately. True False

True

What are the characteristic features of a session key? (Select 2 answers) Used during a single session Asymmetric key Reused during multiple sessions Symmetric key

Used during a single session ( Missed) Symmetric key ( Missed)

What are the examples of weak/deprecated cryptographic solutions? (Select 3 answers) WEP AES SSL DES PGP

WEP ( Missed) SSL ( Missed) DES ( Missed)


संबंधित स्टडी सेट्स

Nursing Research Exam II (Part I: Inferential Statistics)

View Set

Interest Rates and Bond Valuation

View Set