ITM380 Quiz/Practice Questions
How many keys are necessary in the symmetric key algorithm? a. 2 b. 1 c. 0
1
The key space of caesar/shift cipher is _____ a. 0 b. 1 c. 2 d. 26
26
Alice wants to add a digital signature when sending a message to Bob. What she should do before sending it out? a. Encrypt the message using Bob's public key b. Encrypt the message using Alice's public key c. Encrypt the message using Bob's private key d. Encrypt the message using Alice's private key
Encrypt the message using Alice's private key.
Which one of the following is NOT a block cipher? a. AES b. DES c. 3DES d. Substitution Cipher
Substitution Cipher
A certificate authority or certification authority (CA) is an entity that issues digital certificates. True or False
True
Both encryption and decryption functions are public, only the key is secret. True or False
True
Data integrity assures that information and programs are changed only in a specified and authorized manner. True or False
True
HTTP is an application layer protocol True or False
True
Initialization Vector (IV) is an unpredictable random number used to make sure that when the same message is encrypted twice, the ciphertext always different True or False
True
Public-key encryption is asymmetric True or False
True
RSA can be weak and vulnerable for cracking when the prime values (p and q) are small. True or False
True
Symmetric ciphers use the same secret key for the encryption and decryption of information True or False
True
Symmetric ciphers use the same secret key for the encryption and decryption of information True or False
True
The certificate and certificate authority infrastructure can help defend your website from the man-in-the-midde attacks. True or False
True
Two of the most important applications of public-key encryption are digital signatures and key management. True or False
True
The symmetric block ciphers include the DES, Triple DES, and the ____________ a. AES b. RSA c. SHA d. MD5
AES
Which is the MOST secure encryption algorithm? a. AES with 256-bit key b. 3DES with 168-bit key c. DES with 56-bit key
AES with 256- bit key
Which one has the largest key space? a. DES with 56-bit key b. 3DES wit 168-bit key c. AES with 128-bit key d. AES with 256-bit key
AES with 256-bit key
_____ means authorized users are capable of accessing the information a. Confidentiality b. Integrity c. Availability d. Authenticity
Availability
Bob receives a packet that contains ciphertext and a hash value. What would Bob do to check if the message has been altered during transmission? a. Decrypt the message using Bob's Public key b. Decrypt the message using Bob's Private key c. Decrypt the message using the sender's Public key d. Calculate the hash code of the received message and see if it matches the original hash
Calculate the hash code of the received message and see if it matches the original hash
Select the term that is used to describe a trusted third-party agency that is responsible for issuing digital certificates: a. Registration Authority b. Delegation Authority c. Certification Authority d. Participation Authority
Certification Authority
Bob cracked a ciphertext by making guesses based on letter frequency. What type attack is it? a. Social analysis b. Brute force analysis c. Cryptanalysis d. Phishing
Cryptanalysis
Substitution cipher has a large key space, so it is very secure True or False
False
UDP is a connection- oriented transport protocol. True or False
False
assures that a system performs its intended function in an unimpaired manner, free from authorized manipulation. a. Confidentiality b. Integrity c. Availability d. Authenticity
Integrity
Which one is asymmetric encryption algorithm? a. DES b. 3DES c. AES d. RSA
RSA
If the only form of attack that could be made on an encryption algorithm is brute-force, then the way to counter such attacks would be to a. use longer keys b. use shorter keys c. use less keys d. use more keys
Use longer keys
The _____ is the encryption algorithm run in reverse. a. decryption algorithm b. plaintext c. ciphertext d. encryption algorithm
decryption algorithm
The purpose of a __________ is to produce a "fingerprint" of a file, message, or other type of data. It is used for protecting data integrity. a. decryption b. keystream c. hash function d. secret key
hash function
The original message or data that is fed into the algorithm is a. decryption algorithm b. plaintext c. secrey key d. encryption algorithm
plaintext
What is an IP address? a. A way of sending information b. A way of deleting viruses c. A way of indicating the location of a device d. A secure communication method
way of indicating the location of a device
Which of the following can be done using openssl (multiple answers)? a. Extracting the certificate public key b. Encryption c. Decryption d. Generating a private key with a specific length
All the above
Alice wants to send a secret message to Bob and she wants to protect the confidentiality of the message. Which key should Alice use to encrypt the message to make sure only Bob can read the message? a. Alice's public key b. Alice's private key c. Bob's public key d. Bob's private key
Bob's public key
Which of the following is a feature of Asymmetric cryptography (public key encryption)? a. Encryption is time efficient. b. Decryption is time efficient. c. This cryptography uses the best algorithm possible. d. Both encryption and decryption can take place without sharing private keys.
Both encryption and decryption can take place without sharing private keys.
_______ means you are protecting your data from getting disclosed a. Confidentiality b. Integrity c. Availability d. Authenticity
Confidentiality
Which are the applications of public key encryption? (select two answers) a. Digital signature b. Random number generation c. Secret key sharing d. Checking if message is alerted during transmission
Digital Signature and Secret Key Sharing
Alice wants to send a message to Bob and she wants to add a digital signature. What should Alice do to create the signature? a. Encrypt the message using Alice's private key b. Encrypt the message using Bob's public key c. Encrypt the message using Bob's private key d. Encrypt the message using Alice's public key
Encrypt the message using Alice's private key
Alice encrypted a piece of plaintext (stored in plain.txt) using key=00112233445566778889aabbccddeeff, IV=0101010101010101, the ciphertext is saved in cipher1.bin. The following is the command: $ openssl enc -aes-128-cbc -in plain.txt -out cipher1.bin -K 00112233445566778889aabbccddeeff -iv 0101010101010101 Bob encrypted plain.txt again using the same key=00112233445566778889aabbccddeeff, IV=0909090909090909, the ciphertext is saved in cipher2.bin. The following is the command: $ openssl enc -aes-128-cbc -in plain.txt -out cipher2.bin -K 00112233445566778889aabbccddeeff -iv 0909090909090909 a. Yes, cipher1.bin is the same as cipher2.bin b. No, cipher1.bin is different from cipher2.bin
No, cipher1.bin is different from cipher2.bin
The image was encrypted using ECB mode. Which one of the following images do you think is the encrypted image using the ECB mode? a. One with picture b. One without picture
One with picture
An X.509 certificate which is signed by a publicly trusted CA include the fields EXCEPT: a. signature algorithm b. private key c. issuer's name d. subject (the web domain)
Private Key
Suppose Alice and Bob are communicating using RSA public encryption/decryption. Their pairs of public and private key are listed below: Alice's Public Key: (e,n) = (1109b2300a79fff51384a909ce9b00df,1640a0dc17d31a9d49a2581a452f98ef) Alice's Private Key: (d,n) = (7b3b397def11a1821c883c5ab66290f,1640a0dc17d31a9d49a2581a452f98ef) Bob's Public Key: (e,n) = (106d231ecc13338084a1b857bb82a20b,a265d9387a8a395527c98eeb024806dd) Bob's Private Key: (d,n) = (969256f3feb06827b793bf8450f6d623,a265d9387a8a395527c98eeb024806dd) Alice wants to send Bob a secret message. To protect the content of the message, Alice encrypted the message. Here is the ciphertext: 983a207fbef69de40173115a0586e0518f83c6d383d1dbeba27d3fd1c155852e023afb7b1fb06a5838f65c8a5a93ca98 Use this tool to help Bob decrypt the message. put the original message here.
Use bobs private key Input = ciphertext Hello, my phone number is 123-45-6789
We have learned a RSA algorithm has the following public key: n=16109 e=47 Is this RSA vulnerable? a. Yes, this RSA is vulnerable. b. No, the RSA is not vulnerable.
Yes, this RSA is vulnerable.
A protocol is ...... a. a set of rules computers must follow b. a decision made by the router c. a way of connecting a server d. essential to CPU
a set of rules computers must follow
A __________ is to try every possible key on a piece of cipher text until an intelligible translation into plaintext is obtained. a. cryptanalysis b. mode of operation c. brute-force analysis d. hash function
brute- force analysis