Basic Cryptography Exam

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Abram was asked to explain to one of his coworkers the XOR cipher. He showed his coworker an example of adding two bits, 1 and 1. What is the result of this sum? 16 2 1 0

0

Which of these is the strongest symmetric cryptographic algorithm? Advanced Encryption Standard Data Encryption Standard RC 1 Triple Data Encryption Standard

Advanced Encryption Standard

If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message? Bob's private key Bob's public key Alice's public key Alice's private key

Alice's public key

Which of these is NOT a characteristic of a secure hash algorithm? The hash should always be the same fixed size. A message cannot be produced from a predefined hash. Collisions should be rare. The results of a hash function should not be reversed.

Collisions should be rare.

Which of the following key exchanges uses the same keys each time? Diffie-Hellman-RSA (DHRSA) Diffie-Hellman Ephemeral (DHE) Elliptic Curve Diffie-Hellman (ECDH) Diffie-Hellman (DH)

Diffie-Hellman (DH)

Which of these has an onboard key generator and key storage facility, as well as accelerated symmetric and asymmetric encryption, and can back up sensitive material in encrypted form? Trusted Platform Module (TPM) self-encrypting hard disk drives (SED) encrypted hardware-based USB devices Hardware Security Module (HSM)

Hardware Security Module (HSM)

What is a characteristic of the Trusted Platform Module (TPM)? It is available only on Windows computers running BitLocker It includes a pseudorandom number generator (PRNG) It provides cryptographic services in hardware instead of software It allows the user to boot a corrupted disk and repair it

It provides cryptographic services in hardware instead of software

At a staff meeting one of the technicians suggested that the enterprise protect its new web server by hiding it and not telling anyone where it is located. Iosif raised his hand and said that security through obscurity was a poor idea. Why did he say that? It is an unproven approach and has never been tested. It would be essentially impossible to keep its location a secret from everyone. It depends too heavily upon non-repudiation in order for it to succeed. It would be too costly to have one isolated server by itself.

It would be essentially impossible to keep its location a secret from everyone.

Alexei was given a key to a substitution cipher. The key showed that the entire alphabet was rotated 13 steps. What type of cipher is this? ROT13 AES Alphabetic XAND13

ROT13

Illya was asked to recommend the most secure asymmetric cryptographic algorithm to his supervisor. Which of the following did he choose? ME-312 BTC-2 RSA SHA-2

RSA

What is the latest version of the Secure Hash Algorithm? SHA-5 SHA-2 SHA-4 SHA-3

SHA-3

Alyosha was explaining to a friend the importance of protecting a cryptographic key from cryptoanalysis. He said that the key should not relate in a simple way to the cipher text. Which protection is Alyosha describing? integrity confusion chaos diffusion

confusion

A(n) _____ is not decrypted but is only used for comparison purposes. stream algorithm digest key

digest

The Hashed Message Authentication Code (HMAC) _____. hashes only the message hashes the DHE key only hashes the key and the message hashes only the key

hashes the key and the message

Which areas of a file cannot be used by steganography to hide data? in data that is used to describe the content or structure of the actual data in areas that contain the content data itself in the file header fields that describe the file in the directory structure of the file system

in the directory structure of the file system

Proving that a user sent an email message is known as _____. non-repudiation availability integrity repudiation

non-repudiation

Public key systems that generate random public keys that are different for each session are called _____. Elliptic Curve Diffie-Hellman (ECDH) perfect forward secrecy Diffie-Hellman (DH) Public Key Exchange (PKE)

perfect forward secrecy

What is data called that is to be encrypted by inputting it into a cryptographic algorithm? ciphertext plaintext opentext cleartext

plaintext

Which of these is NOT a basic security protection for information that cryptography can provide? integrity confidentiality risk loss authenticity

risk loss

Egor wanted to use a digital signature. Which of the following benefits will the digital signature not provide? prove the integrity of the message verify the sender verify the receiver enforce nonrepudiation

verify the receiver


Set pelajaran terkait

CIS 2050 exam 2, ISMN 3140 Exam 2 Practice Questions, CIS 2050 Exam 2 (Ch. 5-8), MIS 320 (Ch. 7), MIS Chapter 5-8

View Set

Unit 6- QBank Quiz Questions Review

View Set

6.11: Static Local Variables & 6.12: Default Arguments

View Set

Leadership Exam 2 practice questions

View Set

(March 2024) AI-900 Practice Questions

View Set

Chapter 14 - Speciation and Punctuated Equilibrium

View Set

Biological Psychology Chapter 5: Vision

View Set

Org Man Exam 2 Conflict and Negotiations Chapter 10

View Set

Chapter 17- employee and proprietors

View Set