Security+ Chapter 5 review questions
b. verify the receiver
A digital signature can provide each of the following benefits EXCEPT _____________. a. prove the integrity of the message b. verify the receiver c. verify the sender d. enforce nonrepudiation
b. digest
A(n) ______________ is not decrypted but is only used for comparison purposes. a. stream b. digest c. algorithm d. key
d. OTP
All of the following can be broken mathematically EXCEPT____________. a. AES b. 3DES c. SHA d. OTP
a. in-band key exchange
Elliptic Curve Diffie-Hellman (ECDH) is an example of ______________. a. in-band key exchange b. out-of-band key exchange c. SHA-1 key management d. AES key certification
b. Alice's public key
If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message? a. Alice's private key b. Alice's public key c. Bob's public key d. Bob's private key
c. non-repudiation
Proving that a user sent an email message is known as ______________. a. repudiation b. integrity c. non-repudiation d. availability
d. perfect forward secrecy
Public key systems that generate random public keys that are different for each session are called __________________. a. Public Key Exchange (PKE) b. Elliptic Curve Diffie-Hellman (ECDH) c. Diffie-Hellman (DH) d. perfect forward secrecy
b. encrypts the key and the message
The Hashed Message Authentication Code (HMAC) __________. a. encrypts only the key b. encrypts the key and the message c. encrypts only the message d. encrypts the DHE key only
d. provides cryptographic services in hardware instead of software.
The Trusted Platform Module (TPM) ____________. a. allows the user to boot a corrupted disk and repair it b. is available only on Windows computers running BitLocker. c. includes a pseudorandom number generator (PRNG) d. provides cryptographic services in hardware instead of software.
b. in the directory structure of the file system
The areas of a file in which steganography can hide data include all of the following EXCEPT_________. a. in data that is used to describe the content or structure of the actual data b. in the directory structure of the file system c. in the file header fields that describe the file d. in areas that contain the content data itself.
a. plaintext
What is data called that is to be encrypted by inputting it into a cryptographic algorithm? a. plaintext b. cleartext c. opentext d. ciphertext
b. SHA-3
What is the latest version of the Secure Hash Algorithm? a. SHA-2 b. SHA-3 c. SHA-4 d. SHA-5
c. RSA
Which asymmetric cryptographic algorithm is the most secure? a. SHA-2 b. BTC-2 c. RSA d. ME-14
d. RSA
Which asymmetric encryption algorithm uses prime numbers? a. EFS b. quantum computing c. ECC d. RSA
b. Diffie-Hellman (DH)
Which of the following key exchanges uses the same keys each time? a. Diffie-Hellman Ephemeral (DHE) b. Diffie-Hellman (DH) c. Diffie-Hellman-RSA (DHRSA) d. Elliptic Curve Diffie-Hellman (ECDH)
d. Hardware Security Module (HSM)
Which of these has an onboard key generator and key storage facility, as well as accelerated symmetric and asymmetric encryption, and can back up sensitive material in encrypted form? a. Trusted Platform Module (TPM) b. self-encrypting hard disk drives (HDDs) c. encrypted hardware-based USB drives d. Hardware Security Module (HSM)
a. risk loss
Which of these is NOT a basic security protection for information that cryptography can provide? a. risk loss b. integrity c. confidentiality d. authenticity
a. Collisions should be rare
Which of these is NOT a characteristic of a secure has algorithm? a. Collisions should be rare b. The results of a hash function should not be reversed. c. The hash should always be the same fixed size d. A message cannot be produced from a predefined hash
a. Advanced Encryption Standard
Which of these is the strongest symmetric cryptographic algorithm? a. Advanced Encryption Standard b. Data Encryption Standard c. Triple Data Encryption Standard d. Rivest Cipher (RC) 1
c. integrity
Which protection is provided by hashing? a. authenticity b. confidentiality c. integrity d. availability