Comp Sec Chapter 7

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The SHA-1 hashing algorithm creates a digest that is how many bits in length?

160 bits

After the DES cipher was broken and no longer considered secure what encryption algorithm was made as its successor?

3DES

What length SSL and TLS keys are generally considered to be strong?

4096

If using the MD5 hashing algorithm what is the length to which each message is padded?

512 bits

Which standard was approved by NIST in late 2000 as a replacement for DES?

AES

What is a block cipher algorithm that operates on 64-bit blocks and can have a key length from 32 to 448 bits?

Blowfish

When Bob needs to send Alice a message with a digital signature whose private key is used to encrypt the hash?

Bob's private key

If Bob receives an encrypted reply message from Alice whose private key is used to decrypt the received message?

Bob's private key.

A document that describes in detail how a CA uses and manages certificates as well as how end users register for a digital certificate is known as?

Certificate practice statement (CPS)

Select the term that is used to describe a trusted third-party agency that is responsible for issuing digital certificates:

Certification Authority

Which key exchange requires Alice and Bob to each agree upon a large prime number and related integer?

Diffie-Hellman

What is the U.S. federal government standard for digital signatures?

Digital Signature Algorithm

What cryptographic method first proposed in the mid-1980s makes use of sloping curves instead of large prime numbers?

ECC

What block cipher mode of operation uses the most basic approach where the plaintext is divided into blocks and each block is then encrypted separately?

Electronic Code Book

Which of the following are considered to be common asymmetric cryptographic algorithms? (Choose all that apply.)

Elliptic Curve Cryptography, Digital Signature Algorithm

Which of the following is an enhanced type of domain digital certificate?

Extended Validation

A digital certificate is a technology used to associate a user's identity to a private key.

False

Asymmetric cryptographic algorithms are also known as private key cryptography.

False

Digital certificates should last forever.

False

Encryption is the practice of transforming information so that it is secure and cannot be accessed by unauthorized parties.

False

GNU Privacy Guard a proprietary software that runs on different operating systems.

False

Obfuscation is making something well known or clear.

False

One of the first popular symmetric cryptography algorithms was RSA.

False

Root digital certificates are should never be self-signed.

False

Stream ciphers work on multiple characters at a time.

False

What block cipher mode of operation encrypts plaintext and computes a message authentication code to ensure that the message was created by the sender and that it was not tampered with during transmission?

Galois/Counter

What type of message authentication code uses hashing to authenticate the sender by using both a hash function and a secret cryptographic key?

HMAC

The Authentication Header (AH) protocol is a part of what encryption protocol suite below?

IPSec

What protocol below supports two encryption modes: transport and tunnel?

IPSec

Why is IPsec considered to be a transparent security protocol?

IPsec is designed to not require modifications of programs, or additional training, or additional client setup.

What common method is used to ensure the security and integrity of a root CA?

Keep it in an offline state from the network.

Which of the following is a valid way to check the status of a certificate? (Choose all that apply.)

Online Certificate Status Protocol, Certificate Revocation List

What widely used commercial asymmetric cryptography software can be used for encrypting files and email messages?

PGP

Which hash algorithm's primary design feature is two different and independent parallel chains of computation the results of which are then combined at the end of the process?

RIPEMD

Which of the following asymmetric cryptography algorithms is most commonly used?

RSA

Select the secure alternative to the telnet protocol:

SSH

What protocol developed by Netscape in 1994 is designed to create an encrypted data path between a client and server that could be used on any platform or operating system?

SSL

What cryptographic transport algorithm is considered to be significantly more secure than SSL?

TLS

What technology uses a chip on the motherboard of the computer to provide cryptographic services?

TPM

A Subject Alternative Name (SAN) digital certificate is also known as a Unified Communications Certificate (UCC).

True

A certificate repository (CR) is a publicly accessible centralized directory of digital certificates.

True

A collision attack is an attempt to find two input strings of a hash function that produce the same hash result.

True

A user electronically signs a Certificate Signing Request (CSR) by affixing their public key and then sending it to an intermediate certificate authority.

True

Ciphertext is the scrambled and unreadable output of encryption.

True

In information technology non-repudiation is the process of proving that a user performed an action.

True

SSL v3.0 served as the basis for TLS v1.0.

True

Some CAs issue only entry-level certificates that provide domain-only validation.

True

Some cryptographic algorithms require that in addition to a key another value can or must be input.

True

The XOR cipher is based on the binary operation eXclusive OR that compares two bits.

True

Wireless data networks are particularly susceptible to known ciphertext attacks.

True

What type of cryptography uses two keys instead of just one generating both a private and a public key?

asymmetric

What type of trust model has a single CA that acts as a facilitator to interconnect all other CAs?

bridge trust

What process links several certificates together to establish trust between all the certificates involved?

certificate chaining

Data that is in an unencrypted form is referred to as which of the following?

cleartext

What allows an application to implement an encryption algorithm for execution?

crypto service providers

What term describes data actions being performed by endpoint devices such as printing a report from a desktop computer?

data-in-use

What process will remove all private and public keys along with the user's identification information in the CA?

destruction

What type of trust model is used as the basis for most digital certificates used on the Internet?

distributed trust

Which of the following certificates verifies the identity of the entity that has control over the domain name?

domain validation digital certificate

At what stage can a certificate no longer be used for any type of authentication?

expiration

What term best describes when cryptography is applied to entire disks instead of individual files or groups of files?

full disk encryption

Which of the following is more secure than software encryption?

hardware encryption

What type of cryptographic algorithm creates a unique digital fingerprint of a set of data?

hash

In cryptography which of the five basic protections ensures that the information is correct and no unauthorized person or malicious software has altered that data?

integrity

The process by which keys are managed by a third party such as a trusted CA is known as?

key escrow

What term best represents the resiliency of a cryptographic key to attacks?

key strength

What is used to create session keys?

master secret

Which of the following is an input value that must be unique within some specified scope such as for a given period or an entire session?

nonce

Which of the following is a public key system that generates random public keys that are different for each session?

perfect forward secrecy

Which of the following is not one of the functions of a digital signature?

protect the public key

What alternative term can be used to describe asymmetric cryptographic algorithms?

public key cryptography

A framework for all of the entities involved in digital certificates for digital certificate management is known as:

public key infrastructure

Which of the following certificates are self-signed?

root digital certificates

What is a value that can be used to ensure that plaintext when hashed will not consistently result in the same digest?

salt

Which type of cryptographic algorithm takes an input string of any length and returns a string of any requested variable length?

sponge

What type of cipher takes one character and replaces it with one character working one character at a time?

stream cipher

The simplest type of stream cipher one in which one letter or character is exchanged for another is known as what?

substitution

In which type of encryption is the same key used to encrypt and decrypt data?

symmetric

When two individuals trust each other because of the trust that exists between the individuals and a separate entity what type of trust has been established?

third-party

What kind of digital certificate is typically used to ensure the authenticity of a web server to a client?

web server


Set pelajaran terkait

Anatomy Ch. 4: Integumentary System

View Set

Ch. 9 Therapeutic & Communication

View Set

NCLEX book CHAPTER 53- Gastrointestinal Medications

View Set

Social Studies final exam review #3

View Set

Ch 22 Neuro and Mental Status Assessment PrepU

View Set