David Prowse SY0-401 CHAPTER 13 Encryption and Hashing Concepts

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A. (Collision resistance) B. Collision strength C. Collision cipher D Collision metric

A hash algorithm has the capability to avoid the same output from two guessed inputs. What is this known as?

A. Stream cipher B. (Block cipher) C. Hashing algorithm D. RC4

A network stream of data needs to be encrypted. Jason, a security administrator, selects a cipher that will encrypt 128 bits at a time before sending the data across the network. Which of the following has Jason chosen?

A. (Smart card) B. Network adapter C. PCI Express card D. (USB flash drive)

Give two examples of hardware devices that can store keys. (Select the two best answers.)

A. A hash produces a variable output for any input size; a cipher does not. B. A cipher produces the same size output for any input size; a hash does not. C. A hash can be revised; a cipher cannot D. (A cipher can be reversed; a hash cannot)

Of the following, which statement correctly describes the difference between a secure cipher, and a secure hash?

A. Asymmetric B. Symmetric C. PKI D. (One-way function)

The IT director wants you to use a cryptographic algorithm that can be decoded by being reversed. Which of the following would be the best option?

A. AES B. RSA C. RC6 D. (RC4)

WEP improperly uses an encryption protocol and because of this is considered to be insecure. What encryption protocol does it use?

A. A hash is not encrypted. B. A hashing chain has occurred C. A one-way hash has occurred D. (A collision has occurred)

What does it mean if a hashing algorithm creates the same hash for two different Downloads?

A. (The least significant bit of each byte) B. The most significant bit of each byte C. The least significant byte of each bit D. The most significant byte of each bit

What does steganography replace in graphic files?

A. PKI B. Asymmetrical C. (Symmetrical) D. Public key

What is another term for secret key encryption?

A. (AES) B. 3DES C. SHA-1 D. MD5

When encrypting credit card data, which would be the most secure algorithm with the least CPU utilization?

A. Username, and password B. VPN tunneling C. Biometrics D. (Key exchange)

Which of the following concepts does the Diffie-Hellman algorithm rely on?

A. SHA-1 B. (RC5) C. MD5 D. NTLM

Which of the following encryption algorithms is used to encrypt and decrypt data?

A. SHA-1 B. (RSA) C. WPA D. Symmetric

Which of the following encryption methods deals with two distinct, large prime numbers and the inability to factor those prime numbers?

A. RC4 B. (ECC) C. 3DES D. Rijndael

Which of the following is not a symmetric key algorithm?

A. (RC4) B. SHA-512 C. MD5 D. RIPEMD

Which of the following is not a valid cryptographic hash function?

A. (DES) B. RSA C. AES D. SHA

Which of the following is the weakest encryption type?

A. Asymmetric key distribution system B. Asymmetric scheme C. Symmetric key distribution system D. (Symmetric scheme)

Which of the following is used by PGP to encrypt the session key before it is sent?

A. Compare the final LANMAN hash with the original B. Download the patch file over an AES encrypted VPN connection C. Download the patch file through an SSL connection D. (Compare the final MD5 hash with the original)

Which of the following methods will best verify that a download from the Internet has not been modified since the manufacturer released it?

A. (To decrypt the hash of a digital signature) B. To encrypt web browser traffic C. To digitally sign a message D. To decrypt wireless messages

Which of the following might a public key be used to accomplish?

A. Public key B. Private key C. WEP D. (Hash)

Which of the following will provide an integrity check?

A. (Symmetric) B. Asymmetric C. Hashing D. WPA2

Which type of encryption technology is used with the bitLocker application?

A. SHA-1 B. 3DES C. (AES-256) D. MD5

You are attempting to move data to a USB flash drive. Which of the following enables a rapid and secure connection?

A. Diffie-Hellman B. BitLocker C. (RSA) D. SHA-1

You are tasked with ensuring that messages being sent and received between two systems are both encrypted and authenticated. Which of the following protocols accomplishes this?

A. RSA B. (ECC) C. DHE D. Twofish

You are tasked with selecting an asymmetric encryption method that allows for the same level of encryption strength, but with a lesser key length than is typically necessary. Which encryption method fulfills your requirement?

A. (Symmetric encryption) B. Hashing algorithm C. Asymmetric encryption D. PKI

You need to encrypt and send a large amount of data. Which of the following would be the best option?

A. (private key) B. Public key C. Cipher key D. Shared key

Your boss wants you to set up an authentication scheme in which employees will use smart cards to log in to the company network. What kind of key should be used to accomplish this?


संबंधित स्टडी सेट्स

Chapitre 12 - L'économie ouverte : le marché des biens et des capitaux

View Set

Chapter 14: Adolescence: Biosocial Development

View Set

Lesson 6 - Databases and Web Search Engines

View Set

Chapter 11: Statement of Cash Flows - Accounting Final

View Set

Some or any? Write the sentences in positive or negative form. In present simple and past. (Elementary Workbook page 58)

View Set

Cell/Living Things Questions and Answers

View Set

Chapter 5, Atoms Bonding and the Periodic table

View Set

Chapter 4: Igneous Rocks, Intrusive Activity

View Set

Spanish 110: Daily Routine, Weekend Routine, Sequence

View Set