Module 6

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following is NOT a symmetric cryptographic algorithm?

A. DES B. SHA C. Blowfish D. 3DES B. SHA

What is collision?

a. Two files produce the same digest. b. Two ciphertexts have the same length. c. Two algorithms have the same key. d. Two keys are the same length. a. Two files produces the same digest

Which of the following hides the existence of information?

Encryption Decryption Steganography Ciphering - Steganography (hides the existence of data)

Cryptography can prevent an individual from fraudulently reneging on an action. What is this known as?

Repudiation Nonrepudiation Obfuscation Integrity -Nonrepudiation

Brielle is researching substitution ciphers. She came across a cipher in which the entire alphabet was rotated 13 steps. What type of cipher is this?

XOR XAND13 ROT13 Alphabetic - ROT13

Which of these is NOT a basic security protection for information that cryptography can provide?

a Integrity b. Authenticity c. Risk d. Confidentiality c. Risk

If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message?

a. Alice's private key b. Alice's public key c. Bob's public key d. Bob's private key b. Alice's public key

What is low latency?

The time between when a byte is input into a cryptographic cipher and when the output is obtained.

Which of these is the strongest symmetric cryptographic algorithm?

a. Data Encryption Standard b. Advanced Encryption Standard c. Triple Data Encryption Standard d. RC 1 b. Advanced Encryption Standard

Basil was reading about a new attack that forces the system to abandon a higher cryptographic security mode of operation and instead fall back to an older and less secure mode. What type of attack is this?

a. Deprecation attack b. Pullback attack c. Downgrade attack d. Obfuscation attack c. Downgrade attack

Which of the following is not to be decrypted but is only used for comparison purposes?

a. Digest b. Key c. Stream d. Algorithm a. Digest

Which of the following is FALSE about "security through obscurity"?

a. It attempts to hide its existence from outsiders. b. It can only provide limited security. c. It is essentially impossible. d. Proprietary cryptographic algorithms are an example. b. It can only provide limited security

Which of the following is NOT a characteristic of the Trusted Platform Module (TPM)?

a. It provides cryptographic services in hardware instead of software. b. It can generate asymmetric cryptographic public and private keys. c. It can easily be transported to another computer. d. It includes a pseudorandom number generator (PRNG). d. It includes a pseudorandom number generator (PRNG)

What is data called that is to be encrypted by inputting it into a cryptographic algorithm?

a. Plaintext b. Byte-text c. Cleartext d. Ciphertext a. Plaintext

What are public key systems that generate different random public keys for each session?

a. Public Key Exchange (PKE) b. perfect forward secrecy c. Elliptic Curve Diffie-Hellman (ECDH) d. Diffie-Hellman (DH) b. perfect forward secrecy

Deo has been asked to explain RSA to his colleague. After his explanation, Deo is asked what, if any, weaknesses RSA has. How would Deo respond?

a. RSA has no known weaknesses. b. As computers become more powerful, the ability to compute factoring has increased. c. RSA weaknesses are based on ECC. d. The digest produced by the RSA algorithm is too short to be secure. b. As computers become more powerful, the ability to compute factoring has increased

Cicero is researching hash algorithms. Which algorithm would produce the longest and most secure digest?

a. SHA-256 b. MD5 c. SHA3-512 d. SHA6-6 c. SHA3-512

Which of these is NOT a characteristic of a secure hash algorithm?

a. The results of a hash function should not be reversed. b. Collisions should occur no more than 15 percent of the time. c. A message cannot be produced from a predefined hash. d. The hash should always be the same fixed size. b. Collisions should occur no more than 15 percent of the time

Which of these provides cryptographic services and is external to the device?

a. Trusted Platform Module (TPM) b. Hardware Security Module (HSM) c. Self-encrypting hard disk drives (SED) d. Encrypted hardware-based USB devices b. Hardware Security Module (HSM)

Egor wanted to use a digital signature. Which of the following benefits will the digital signature NOT provide?

a. Verify the sender b. Verify the receiver c. Prove the integrity of the message d. Enforce nonrepudiation b. Verify the receiver


संबंधित स्टडी सेट्स

Chapter 33: Management of Patients With Nonmalignant Hematologic Disorders

View Set

Ch. 6 - Privacy and Security Standards

View Set

automatic transmissions section 1 test: CH 1, 2, 3

View Set

Series 66 - Investment Advisers and Their Representatives

View Set

Ch. 2 - Collecting Subjective Data

View Set

Unit III Mental Health Test Bank (All Answers)

View Set

Object Oriented Programming Final

View Set

PassPoint Pharmacology Exam Prep

View Set

Chapter 5 - Molecules and Compounds

View Set

Lesson Introduction to the Nursing Process Chapter 16, Nursing Assessment

View Set

Intro. to Environmental Science - Exam 1

View Set