Security + Chapter 3

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What is a block cipher algorithm that operates on 64-bit blocks and can have a key length from 32 to 448 bits?

Blowfish

If Bob receives an encrypted reply message from Alice, whose private key is used to decrypt the received message?

Bob's Private Key

When Bob needs to send Alice a message with a digital signature, whose private key is used to encrypt the hash?

Bob's Private Key

What term describes data actions being performed by endpoint devices, such as printing a report from a desktop computer?

Data in use Notes: -Data in-use. Data-in-use is data actions being performed by "endpoint devices," such as printing a report from a desktop computer. - Data in-transit. Actions that transmit the data across a network, like an email sent across the Internet, are called data-in-transit. - Data at-rest. Data-at-rest is data that is stored on electronic media.

Which key exchange requires Alice and Bob to each agree upon a large prime number and related integer?

Diffie-Hellman

What is the U.S. federal government standard for digital signatures?

Digital Signature Algorithm

What cryptographic method, first proposed in the mid-1980s, makes use of sloping curves instead of large prime numbers?

ECC

Which of the following are considered to be common asymmetric cryptographic algorithms? (Choose all that apply.)

Elliptic Curve Cryptography Digital Signature Algorithm

GNU Privacy Guard a proprietary software that runs on different operating systems.

False

One of the first popular symmetric cryptography algorithms was RSA.

False

Encryption is the practice of transforming information so that it is secure and cannot be accessed by unauthorized parties.

False Notes: - Cryptography (from Greek words meaning hidden writing) is the practice of transforming information so that it is secure and cannot be accessed by unauthorized parties. - The process of changing the original text into a scrambled message is known as encryption (the reverse process is decryption, or changing the message back to its original form).

Obfuscation is making something well known or clear.

False Notes: -Obfuscation. Obfuscation is making something obscure or unclear.

The SHA-1 hashing algorithm creates a digest that is how many bits in length?

160 bits

After the DES cipher was broken and no longer considered secure, what encryption algorithm was made as its successor?

3DES

If using the MD5 hashing algorithm, what is the length to which each message is padded?

512 bits

Which standard was approved by NIST in late 2000 as a replacement for DES?

AES

Asymmetric cryptographic algorithms are also known as private key cryptography.

False Notes: There are three broad categories of cryptographic algorithms. 1. hash algorithms: creates a unique "digital fingerprint" of a set of data. This process is called hashing, and the resulting fingerprint is a digest (sometimes called a message digest or hash) that represents the contents. Hashing is used primarily for comparison purposes. 2. symmetric cryptographic algorithms 3. asymmetric cryptographic algorithms.

What term best describes when cryptography is applied to entire disks instead of individual files or groups of files?

Full Disk Encryption

What type of message authentication code uses hashing to authenticate the sender by using both a hash function and a secret cryptographic key?

HMAC

Which of the following is more secure than software encryption?

Hardware encryption

What type of cryptographic algorithm creates a unique digital fingerprint of a set of data?

Hash

A collision attack is an attempt to find two input strings of a hash function that produce the same hash result.

True

Ciphertext is the scrambled and unreadable output of encryption.

True

In information technology, non-repudiation is the process of proving that a user performed an action.

True

The XOR cipher is based on the binary operation eXclusive OR that compares two bits.

True

Wireless data networks are particularly susceptible to known ciphertext attacks.

True

Data that is in an unencrypted form is referred to as which of the following?

cleartext -Plaintext. Unencrypted data that is input for encryption or is the output of decryption is called plaintext. - Ciphertext. Ciphertext is the scrambled and unreadable output of encryption. - Cleartext. Readable (unencrypted) data that is transmitted or stored in "the clear" and is not intended to be encrypted is called cleartext.

What technology uses a chip on the motherboard of the computer to provide cryptographic services?

TPM

In cryptography, which of the five basic protections ensures that the information is correct and no unauthorized person or malicious software has altered that data?

Integrity

What widely used commercial asymmetric cryptography software can be used for encrypting files and email messages?

PGP

Which hash algorithm's primary design feature is two different and independent parallel chains of computation, the results of which are then combined at the end of the process?

RIPEMD Notes: - RIPEMD stands for RACE Integrity Primitives Evaluation Message Digest , which was designed after MD4.

Which of the following asymmetric cryptography algorithms is most commonly used?

RSA

What type of cryptography uses two keys instead of just one, generating both a private and a public key?

asymmetric

Which of the following is a public key system that generates random public keys that are different for each session?

perfect forward secrecy

Which of the following is not one of the functions of a digital signature?

protect the public key

What alternative term can be used to describe asymmetric cryptographic algorithms?

public key cryptography

Which type of cryptographic algorithm takes an input string of any length, and returns a string of any requested variable length?

sponge

What type of cipher takes one character and replaces it with one character, working one character at a time?

stream cipher

The simplest type of stream cipher, one in which one letter or character is exchanged for another, is known as what?

substitution

In which type of encryption is the same key used to encrypt and decrypt data?

symmetric


संबंधित स्टडी सेट्स

Principles of Management 11: Motivation

View Set

MRI in Practice chapter 4 Gradient echo pulse sequences.

View Set

mat peds chp 22-27 practice quiz

View Set

Stress Management Unit 12: Time Management

View Set

Chapter 4 - The Components of the System Unit Vocabulary

View Set

Chapter 8: Internal Control Systems

View Set