ITM-350 chapter 7 study for quiz

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

true or false: symmetric key cryptography is a technique that uses two keys. one to decrypt and one to encrypt

False

what types of keys does cryptography uses?

- symmetric - asymmetric

Alice would like to send a message to Bob using a digital signature. What cryptographic key does Alice use to create the digital signature?

Alice's private key

What standard is NOT secure and should never be used on modern wireless networks? A. Wired Equivalent Privacy (WEP) B. Wi-Fi Protected Access version 2 (WPA2) C. Wi-Fi-protected access (WPA) D. 802.11ac

Wired equivalent privacy (WEP)

Which cryptographic attack is relevant in only asymmetric key systems and hash functions?

chosen ciphertext

Which cryptographic attack offers cryptanalysts the most information about how an encryption algorithm works? A. Chosen plaintext B. Ciphertext only C. Known plaintext D. Chosen ciphertext

chosen plaintext

what key is private?

symmetric

what is a substitution cipher where each plain text character is encrypted using its own key?

Vernam cipher

Juan is a wireless security professional. He is selecting a standard for wireless encryption protocols for access points and devices for his agency. For the highest security, which protocol should Juan choose?

Wi-Fi- protected access version 3 (WPA3)

which publication covers digital signatures standards (DSS)? a. NIST 800-53 b. FIPS 186-5 c. NIST 800-20 d. ISP 27001

b. FIPS 186-5

What is not a symmetric encryption algorithm? a. International Data Encryption Algorithm (IDEA) b. Data Encryption Standard (DES) c. Diffie-Hellman d. Carlisle Adams Stafford Tavares (CAST)

c. Diffie-Hellman

True or False? A digitized signature is a combination of a strong hash of a message and a secret key.

false

True or False? A private key cipher is also called an asymmetric key cipher.

false

True or False? A product cipher is an encryption algorithm that has no corresponding decryption algorithm.

false

True or False? In a known-plaintext attack (KPA), the cryptanalyst has access only to a segment of encrypted data and has no choice as to what that data might be.

false

True or false: private keys are also known as asymmetric keys

false

When Alice receives a message from Bob, she wants to be able to demonstrate to Miriam that the message actually came from Bob. What goal of cryptography is Alice attempting to achieve?

nonrepudiation

what proves a party did indeed originate a message? A. Nonrepudiation B. Authentication C. Integrity D. Confidentiality

nonrepudiation

what is AES?

Advanced Encryption Standard - a symmetric block cipher chosen by the U.S. government to protect classified information

Betty receives a ciphertext message from her colleague tim. what type of function does Betty need to use to read the plaintext message? A. Encryption B. Hashing C. Decryption D. Validation

C. Decryption

which of the following allows a certificate authority (CA) to revoke a compromised digital certificate in real time? A. Certificate revocation list (CRL) B. International Data Encryption Algorithm (IDEA) C. Transport Layer Security (TLS) D. Online Certificate Status Protocol (OCSP)

D. Online Certificate Status Protocol (OCSP)

true or false: according to NIST, there are only two approved algorithms for block cipher

True

true or false: AES is an approved block cipher algorithm according to NIST

True

which is not an effective key distribution method for plaintext encryption keys? A. paper B. unencrypted email C. CD D. smart card

Unencrypted email

what is the name of the attack where a person possesses certain pieces of information before and after encryption? a. birthday attack b. known-plaintext attack c. smurf attack d. hash attack

b. known-plaintext attack

True are false: the has message authentication code is a hash function that uses a key to create a has, or message digest.

true

Which information security objective verifies the action to create an object or verifies an object's existence by an entity other than the creator?

witnessing

what is the original, unencrypted message?

plaintext

true or false: fields theory is a branch of mathematics that involves multiplicative inverse that asymmetric key cryptography cipher s

true

What is the only unbreakable cipher when it is used properly? A. Rivest-Shamir-Adelman (RSA) B. Vernam C. Elliptic Curve Diffie-Hellman in Ephemeral mode (ECDHE) D. Blowfish

vernam

which type of cipher works by rearranging the characters in a message? A. substitution B. Steganographic C. Transposition D. Asymmetric

Transposition

Bob received a message from Alice that contains a digital signature. What cryptographic key does Bob use to verify the digital signature?

alice's public key

what proves the identify of the sender? A. Nonrepudiation B. Authentication C. Integrity D. Confidentiality

authentication

Which of the following is not true of hash functions? a. Hash functions help detect forgeries by computing a checksum of a message and then combining it with a cryptographic function so that the result is tamperproof. b. The hashes produced by a specific hash function may vary in size. c. The output from the message digest algorithm (MD5) or the Secure Hash Algorithm (SHA) hash provides input for an asymmetric key algorithm that uses a private key as input. d. A hash is a checksum designed so that no one can forge a message in a way that will result in the same hash as a legitimate message.

b. The hashes produced by a specific hash function may vary in size.

which approach to cartography provides the strongest theoretical protection? A. Quantum cryptography B. Asymmetric cryptography C. Elliptic curve cryptography D. classic Cryptography

Quantum Cryptography

what are the 4 goals of encryption?

1. confidentiality 2. integrity 3. authentication 4. nonrepudiation

which information security objective allows trusted entities to endorse information? A. Validation B. Authorization C. Certification D. Witnessing

certification

Maria receives a ciphertext message from her colleague Wen. What type of function does Maria need to use to read the plaintext message?

decryption

what are 3. symmetric encryption algorithms?

1. Data Encryption standard ( DES) International data 2. Encryption algorithm (IDEA) 3. Carlisle Adams Stafford Tavares (CAST)

what three techniques does federal information processing standard 186-5 use to generate and verified for digital signatures.

1. Rivest Shamir Adleman (RSA) algorithm 2. elliptic curve digital signature algorithm (ECDSA) 3. Edwards curve digital signature algorithm (EdDSA)

What mathematical problem forms the basis of most modern cryptographic algorithms? A. Factoring large primes B. Traveling salesman problem C. Quantum mechanics D. Birthday problem

A. Factoring large primes

Alice would like to send a message to Bob securely and wishes to use asymmetric encryption to encrypt the contents of the message. What key does she use to encrypt this message? A. Alice's public key B. Alice's private key C. Bob's public key D. Bob's private key

C. Bob's public key

which type of function generates the unique value that corresponds to the contents of a message and is used to create a digital signature? A. Elliptic curve B. Decryption C. Encryption D. Hash

Hash

what ensures no one changed the information after transmitting it? A. Nonrepudiation B. Authentication C. Integrity D. Confidentiality

Integrity

True or false: Digital signatures require asymmetric key cryptography

True

True or false: the Diffie-Hellman (DHE) algorithm is the basis for several common key exchange protocols, including Diffie-Hellman in Ephemeral mode (DHE) and Elliptic Curve DHE (ECDHE)

True

Alice and Bob would like to communicate with each other using a session key, but they do not already have a shared secret key. Which algorithm can they use to exchange a secret key?

diffie-Hellman

Which of the following is not an objective of cryptanalysis, the process of breaking codes? a. Encrypt the plaintext of a targeted message. b. Solve the general mathematical problem underlying cryptography. c. Determine the key used to encrypt a targeted message. d. Derive the algorithm used by a particular cipher.

a. Encrypt the plaintext of a target message.

what is mathematical process

algorithms

what is an encryption algorithm used to covert plaintexts to cyphertexts and vice versa

cipher

what is an encrypted plaintext ?

ciphertext

Bob is sending a message to Alice. He wants to ensure that nobody can read the content of the message while it is in transit. What goal of cryptography is Bob attempting to achieve?

confidentiality

encrypting a message meant that the sender made sure it was secure as long as an opponent did not have the _________? A. Nonrepudiation B. Authentication C. Integrity D. Confidentiality

confidentiality

Security objectives add value to relationships between businesses or between businesses and their customers. Which objective binds a message or data to a specific entity?

digital signature

True or False: A block cipher encrypts one byte (or bit) at a time, whereas a stream cipher encrypts an entire block of data at a time.

false

True or False? You must always use the same algorithm to encrypt information and decrypt the same information.

false

true or false: asymmetric keys cannot secure correspondence until after the two parties exchange keys

false

Some ciphers, regardless of type, rely on the difficulty of solving certain mathematical problems, which is the basis for asymmetric key cryptography. Which of the following is a branch of mathematics that involves multiplicative inverses that these ciphers use?

field theory

Bob is sending a message to Alice. He wants to ensure that nobody tampers with the message while it is in transit. What goal of cryptography is Bob attempting to achieve?

integrity

Which approach to cryptography uses highly parallel algorithms that could solve problems in a fraction of the time needed by conventional computers?

quantum cryptography

what key is block and stream cycles?

symmetric key

Which set of characteristics describes the Caesar cipher accurately? A. Asymmetric, block, substitution B. Asymmetric, stream, transposition C. Symmetric, stream, substitution D. Symmetric, block, transposition

symmetric, stream, substitution

Which type of cipher works by rearranging the characters in a message?

transposition

True or False? A keyword mixed alphabet cipher uses a cipher alphabet that consists of a keyword, minus duplicates, followed by the remaining letters of the alphabet.

true

True or False? A salt value is a set of random characters you can combine with an input key to create an encryption key.

true

True or False? An algorithm is a repeatable process that produces the same result when it receives the same input.

true

True or False? Digital signatures require asymmetric key cryptography.

true

True or False? Elliptic curve cryptography (ECC) relies on algebraic structures of elliptic curves over finite fields.

true

True or False? In cryptography, a keyspace is the number of possible keys to a cipher.

true

True or False? Revocation is a security measure that stops authorization for access to data.

true

True or False? Symmetric key ciphers require that both parties first exchange keys to be able to securely communicate.

true

True or False? With asymmetric key ciphers, it is computationally infeasible to derive the second algorithm from the first algorithm.

true

True or False? You can break a cipher by analyzing the ciphertext to find the plaintext or key or by analyzing the ciphertext and its associated plaintext to find the key.

true

public key cryptography is also known as asymmetric key cryptography

true

true or false: 3DES is an approved block cipher algorithm according to NIST

true

true or false: Diffie Hellman introduced the concept of asymmetric key cryptography

true

true or false: according to the Wi-Fi alliance, WPA3 is now the standard for Wi-Fi security

true

true or false: asymmetric keys are also known as public keys

true


Set pelajaran terkait

AP Statistics - Unit 1 Progress Check: MCQ Part B

View Set

MedSurg: Prioritization Ch 15 Comprehensive Ex

View Set