Fundamentals of Information Security CH9

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What is NOT a valid encryption key length for use with the Blowfish algorithm?

512 bits

Alice would like to send a message to Bob securely and wishes to encrypt the contents of the message. What key does she use to encrypt this message?

Bob's public key

What mathematical problem forms the basis of most modern cryptographic algorithms?

Factoring large primes

Which information security objective allows trusted entities to endorse information?

Certification

Which cryptographic attack offers cryptanalysts the most information about how an encryption algorithm works?

Chosen plaintext

What type of function generates the unique value that corresponds to the contents of a message and is used to create a digital signature?

Hash

Which set of characteristics describes the Caesar cipher accurately?

Symmetric, stream, substitution

What is the only unbreakable cipher when it is used properly?

Vernam

When Patricia receives a message from Gary, she wants to be able to demonstrate to Sue that the message actually came from Gary. What goal of cryptography is Patricia attempting to achieve?

Nonrepudiation

What is NOT a symmetric encryption algorithm?

? RSA, marked wrong

Alice and Bob would like to communicate with each other using a session key but they do not already have a shared secret key. Which algorithm can they use to exchange a secret key?

Diffie-Hellman

Which approach to cryptography provides the strongest theoretical protection?

Quantum Cryptography

What is NOT an effective key distribution method for plaintext encryption keys?

Unencrypted email

What standard is NOT secure and should never be used on modern wireless networks?

Wired Equivalent Privacy (WEP)

Bob received a message from Alice that contains a digital signature. What cryptographic key does Bob use to verify the digital signature?

Alice's public key

Alice would like to send a message to Bob using a digital signature. What cryptographic key does Alice use to create the digital signature?

Alice's private key

Betty receives a ciphertext message from her colleague Tim. What type of function does Betty need to use to read the plaintext message?

Decryption

Which of the following allows a certificate authority (CA) to revoke a compromised digital certificate in real time?

Online Certificate Status Protocol (OCSP)

Gary is sending a message to Patricia. He wants to ensure that nobody tampers with the message while it is in transit. What goal of cryptography is Gary attempting to achieve?

Integrity

Which type of cipher works by rearranging the characters in a message?

Transposition


संबंधित स्टडी सेट्स

PSYC Chapter 13 Connect Questions & Answers

View Set

CFPE501 Module 4 Chapter 7: Choosing Insurance Agents/Companies

View Set

Vocabulary for Examination - Sentence Transformation 11

View Set

Chapter 17: Freedom's Boundaries, at Home and Abroad, 1890-1900 (Matching)

View Set

Real Estate: Texas Law of Agency

View Set

Chapter 8: The Executive Branch and the Federal Bureaucracy

View Set