Lesson 2 Quiz- Chapter 2: Cryptography

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Chris' public key

Assume that Mike is trying to send an encrypted email to Chris using PGP or S/MIME. What key will Mike use to encrypt the email to Chris? Chris' private key Chris' public key Mike's private key Mike's public

All of these answers are correct.

Most digital certificates contain which of the following information? Serial number Signature Thumbprint (fingerprint) All of these answers are correct.

B. 32

SHA512 checksum (512 bits) output is represented by a 128 hexadecimal number, whereas MD5 produces a hash value that is typically expressed in text format as a _____-digit hexadecimal number. A. 128 B. 32 C. 64 D. 512

collision

There are several vulnerabilities in the MD5 hashing protocol, including _____ and pre-image vulnerabilities integrity collision observation anonimity

B. OCSP

Using the ____, a client sends a request to find the status of a certificate and gets a response without having to know the complete list of revoked certificates. A. ASSP B. OCSP C. OSPD D. PKCS

DES AES

Which of the following are encryption algorithms for confidentiality for IPsec? SHA DES MD5 AES

Substitution Polyalphabetic Transposition

Which of the following are valid cipher methods? Polyalphabetic Mixing Substitution Transposition

All of these answers are correct.

Which of the following implementations use a key pair? PGP Digital certificates on a web server running TLS S/MIME All of these answers are correct.

PKCS #12

Which of the following is a format for storing both public and private keys using a symmetric password-based key to "unlock" the data whenever the key needs to be used or accessed? PKCS #10 PKCS #12 PKCS #7 PKCS #3

Diffie-Hellman

Which of the following is an algorithm that allows two devices to negotiate and establish shared secret keying material (keys) over an untrusted network? RSA IKE Diffie-Hellman RC4

Certificate Authority (CA)

Which of the following is an entity that creates and issues digital certificates? Certificate Registry (CR) Certificate Authentication Server (CAS) Certificate Authority (CA) None of these answers is correct.

AES

Which of the following is not an asymmetric algorithm? RSA DA AES ElGamal DSA

Private key

Which of the following is not part of a certificate? Signature Public key Serial number Private key

B. Subordinate CA servers can be invalidated.

Which of the following statements is true? A. Subordinate CA servers cannot be invalidated. B. Subordinate CA servers can be invalidated. C. Root CA servers cannot be invalidated. D. Root CA servers can be invalidated.

C.PGP

___ is an example of a tool that can be used to generate public and private key pairs. A. AES B. DES C.PGP D. SHA

PKCS #3

____ is a Public Key Cryptography Standard that defines the format of a Diffie-Hellman key exchange PKCS #10 PKCS #12 PKCS #3 PKCS #1

OTP

_____ is a Public Key Cryptography Standard that defines the format of a Diffie-Hellman key exchange OTP RSA DES PKCS #7

PKI (Public Key Infrastructure)

_____ is a set of identities, roles, policies, and actions for the creation, use, management, distribution, and revocation of public and private keys. PKI PCI NIP DSA

PKCS #12

_____ is a set of identities, roles, policies, and actions for the creation, use, management, distribution, and revocation of public and private keys. PKCS #10 PKCS #12 PKCS #3 PKCS #1

HMAC

_____ uses the mechanism of hashing, but instead of using a hash that anyone can calculate, it includes in its calculation a secret key of some type. DSA HMAC SMAC AES


संबंधित स्टडी सेट्स

vocab chapters 6-10 freak the mighty

View Set