CompTIA Module 6 Review

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following is not to be decrypted but is only used for comparison purposes? A) Digest B) Key C) Stream D) Algorithm

Digest

Cicero is researching hash algorithms. Which algorithm would produce the longest and most secure digest? A) SHA-256 B) MD5 C) SHA3-512 D) SHA6-6

SHA3-512

Which of these is the strongest symmetric cryptographic algorithm? A) Data Encryption Standard B) Advanced Encryption Standard C) Triple Data Encryption Standard D) RC1

Advanced Encryption Standard

If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message? A) Alice's private Key B) Alice's public Key C) Bob's public Key D) Bob's private Key

Alice's public Key

Which is FALSE concerning hashing? A) It can generate asymmetric cryptographic public keys and private keys B) The hash represents the contents of the input message C) Hashing is one way and is used for comparison purposes D) Creates a unique "digital fingerprint" of a set of data and is commonly called hashing

It can generate asymmetric cryptographic public keys and private keys

Which of these is NOT a basic security protection for information that cryptography can provide? A) Integrity B) Authenticity C) Risk D) Confidentiality

Risk

Which of the following is NOT a symmetric cryptographic algorithm? A) DES B) SHA C) Blowfish D) 3DES

SHA

Which of the following hides the existence of information? A) Encryption B) Decryption C) Steganography D) Ciphering

Steganography

What type of cipher is based on the binary operation eXclusive OR that compares two bits? A) XOR B) XAND13 C) ROT13 D) Alphabetic

XOR

How many keys are required in asymmetric encryption? A) 3 B) 1 C) Depends on the algorithm D) 2 E) 4

2

What is the key length of the Data Encryption Standard (DES) algorithm? A) 256-bit B) 56-bit C) 168-bit D) 128-bit

56-bit

Deo has been asked to explain RSA to his colleague. After his explanation, Deo is asked what, if any, weaknesses RSA has. How would Deo respond? A) RSA has no known weaknesses B) As computers become more powerful. the ability to compute factoring has increased C) RSA weaknesses are based on ECC D) The digest produced by the RSA algorithm is too short to be secure

As computers become more powerful. the ability to compute factoring has increased

Which type of cryptography attack attempts to find two input strings of a hash function that produce the same hash result? A) Downgrade attack B) Birthday attack C) Ciphertext attack D) Algorithm attack

Birthday attack

Which of the following is an example of FDE? Full Disk Encryption A) BitLocker B) EFS C) GNuPG D) Folder Lock

BitLocker

What is the process of scrambling encrypted information? A) Encryption B) Decryption C) Steganography D) Ciphering

Ciphering

Which of these is NOT a characteristic of a secure hash algorithm? A) The results of a hash function should not be reversed B) Collisions should occur no more than 15 percent of the time C) A message cannot be produced from a predefined hash D) The hash should always be the same fixed size

Collisions should occur no more than 15 percent of the time

Which key exchange channel uses a key once and then discards them? A) Public Key Exchange (PKE) B) Diffie-Hellman Ephemeral (DHE) C) Elliptic Curve Diffie-Hellman (ECDH) D) Diffie-Hellman (DH)

Diffie-Hellman Ephemeral (DHE)

Which of the following will thwart threat actors from discovering the underlying key to cryptographic algorithms? Select any that apply. A) Diffusion B) Confusion C) Collusion D) Delusion

Diffusion & Confusion

Which hashing algorithm is no longer used because it has been hacked? A) SHA-256 B) MD5 C) SHA3-512 D) SHA6-6

MD5

What is TRUE about non-repudiation? A) Non-repudiation proves that a user performed an action B) Non-repudiation ensures that only authorized users parties can view the information C) Non-repudiation ensures the information is correct and no unauthorized person or malicious software has altered the data D) Non-repudiation ensures two keys are the same length

Non-repudiation proves that a user performed an action

Cryptography can prevent an individual from fraudulently reneging on an action. What is this known as? A) Repudiation B) Nonrepudiation C) Obfuscation D) Integrity

Nonrepudiation

Which of the following is a term that proves that a user performed an action with a computer or on data? A) Confidentiality B) Nonrepudiation C) Obfuscation D) Authentication

Nonrepudiation

Which of the following algorithms are examples of lightweight cryptography? [Choose all that apply] A) RSA B) OTR C) ECC D) TWINE

OTR, TWINE

What does it mean to make something "obscure" or "unclear"? A) Repudiation B) Nonrepudiation C) Obfuscation D) Integrity

Obfuscation

Which of the following is TRUE about "security through obscurity"? A) It sets a precedent by encouraging other employees to violate company policy B) Open Source Software is secure C) The cryptography used is secure D) Obscurity means a hacker has a difficult time find the actual thing they are trying to hack

Obscurity means a hacker has a difficult time find the actual thing they are trying to hack

What are public key systems that generate different random public keys for each session? A) Public Key Exchange (PKE) B) Perfect forward secrecy C) Elliptic Curve Diffie-Hellman (ECDH) D) Diffie-Hellman (DH)

Perfect forward secrecy

What is data called that is to be encrypted by inputting it into a cryptographic algorithm? A) Plaintext B) Byte-text C) Cleartext D) Ciphertext

Plaintext

Brielle is researching substitution ciphers. She came across a cipher in which the entire alphabet was rotated 13 steps. What type of cipher is this? A) XOR B) XAND13 C) ROT13 D) Alphabetic

ROT13

What is low latency? A) A low-power source requirement of a sensor B) The time between when a byte is input into a cryptographic cipher and when the output is obtained C) The requirements for an IoT device that is using a specific network D) The delay between when a substitution cipher decrypts the first block and when it finishes with the last block

The time between when a byte is input into a cryptographic cipher and when the output is obtained

In asymmetric key encryption, what is the next step when a client initiates a session with a web server that is configured with a certificate? A) The client takes the public key from the certificate B) The web server decrypts the asymmetric key C) The client shares the encrypted key D) The web server sends a certificate to the web browse

The web server sends a certificate to the web browse

What statement is FALSE concerning cryptographic keys? A) The key is a mathematical value entered into the algorithm to produce ciphertext B) To decipher an encrypted message, you must always use ROT13 C) XOR cipher is based on the binary operation of eXclusive OR that compares two bits D) Prove the integrity of the message

To decipher an encrypted message, you must always use ROT13

Which statement is FALSE about Public Key Cryptography? A) Uses only one key called the Public Key B) Uses two mathematically related keys C) The Public key is available to everyone and freely distributed D) The Private key is known only to the individual to whom it belongs

Uses only one key called the Public Key


संबंधित स्टडी सेट्स

CHAPTER 14 THE FEDERAL BUDGET AND SOCIAL SECURITY

View Set

IMS 3300 quiz 2/sample quiz & exam questions

View Set

English 111 Final Passage Id's (all attribution for these analyses goes to those who contributed to the Google Doc "English 111 Passage ID's")

View Set

Activity Three: What is the Human Development Index?

View Set

Chapter 11: Surveys & Questionnaires

View Set

Bio 104; Mastering Biology Lab Chapt. 18- An introduction to Ecology & Biosphere

View Set

Intro to Environmental Issues INQUIZITIVE chapter 11

View Set