QUIZ 9 - CHAPTER 7
BOB'S PUBLIC KEY
Alice would like to send a message to Bob securely and wishes to use asymmetric encryption to encrypt the contents of the message. What key does she use to encrypt this message? Bob's public key Alice's private key Alice's public key Bob's private key
INTEGRITY
Bob is sending a message to Alice. He wants to ensure that nobody tampers with the message while it is in transit. What goal of cryptography is Bob attempting to achieve? Nonrepudiation Integrity Confidentiality Authentication
ALICE'S PUBLIC KEY
Bob received a message from Alice that contains a digital signature. What cryptographic key does Bob use to verify the digital signature? Alice's private key Alice's public key Bob's private key Bob's public key
Wi-Fi PROTECTED ACCESS VERSION 3 (WPA3)
Juan is a wireless security professional. He is selecting a standard for wireless encryption protocols for access points and devices for his agency. For the highest security, which protocol should Juan choose? Wired Equivalent Privacy (WEP) Wi-Fi Protected Access (WPA) Wi-Fi Protected Access version 3 (WPA3) Wi-Fi Protected Access version 2 (WPA2)
DECRYPTION
Maria receives a ciphertext message from her colleague Wen. What type of function does Maria need to use to read the plaintext message? Decryption Validation Encryption Hashing
FALSE
True or False? A product cipher is an encryption algorithm that has no corresponding decryption algorithm.
TRUE
True or False? A salt value is a set of random characters you can combine with an input key to create an encryption key
TRUE
True or False? An algorithm is a repeatable process that produces the same result when it receives the same input.
TRUE
True or False? Digital signatures require asymmetric key cryptography.
TRUE
True or False? Elliptic curve cryptography (ECC) relies on algebraic structures of elliptic curves over finite fields.
FALSE
True or False? In a known-plaintext attack (KPA), the cryptanalyst has access only to a segment of encrypted data and has no choice as to what that data might be.
TRUE
True or False? In cryptography, a keyspace is the number of possible keys to a cipher.
TRUE
True or False? Symmetric key ciphers require that both parties first exchange keys to be able to securely communicate.
FALSE
True or False? The U.S. government currently has no standard for creating cryptographic keys for classified applications.
FALSE
True or False? The term certificate authority (CA) refers to a trusted repository of all public keys.
TRUE
True or False? Transport Layer Security (TLS) is an example of a transport encryption protocol.
TRUE
True or False? Whereas a cipher performs a particular task, a key gives the specific directions for how to do it.
TRUE
True or False? With asymmetric key ciphers, it is computationally infeasible to derive the second algorithm from the first algorithm.
TRUE
True or False? You can break a cipher by analyzing the ciphertext to find the plaintext or key or by analyzing the ciphertext and its associated plaintext to find the key.
FALSE
True or False? You must always use the same algorithm to encrypt information and decrypt the same information.