Module 3 Fundamentals of Cryptography
If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message?
Alice's public key
Which of the following is a weakness of RSA?
As computers become more powerful, the ability to compute factoring has increased
Which of the following is NOT a form of obfuscation?
Ciphering
Which of these is NOT a characteristic of a secure hash algorithm?
Collisions may occur but they should be rare
Layla has encrypted a document so that it can only be viewed by those who have been provided the key. What protection has she given to this document?
Confidentiality
Which of the following is NOT to be decrypted but is only used for comparison purposes?
Digest
Which type of encryption would protect all data on a hard drive, including the installed OS?
FDE
Farah needs to encrypt only a few files and does not want the entire disk contents to be encrypted. What type of encryption would she use?
File-level encryption
Which of the following is NOT correct about "security through obscurity"?
It should only be used as a general information security protection in extreme circumstances
Which of these is NOT true about ECC?
It uses both sloping curves and prime numbers
Zeinab has been asked by her supervisor to speak with an angry customer who claims that they never received notification of a change in the terms of service agreement. Zeinab learned that an automated "read receipt" was received, showing that the customer opened the email with the new terms of service outlined. What action will Zeinab now take regarding this customer?
Nonrepudiation
Which type of blockchain can anyone join?
Public blackchain
Aaliyah wants to send a message to a friend, but she does not want anyone else to know that she is communicating with them. Which technique would she use?
Steganography
Which algorithm uses the same key to both encrypt and decrypt data?
Symmetric cryptographic algorithm
Nahla has been asked to make a recommendation about the most secure TEE. Which of the following would she choose?
TPM
What is a collision?
Two files that produce the same digest
Karyme needs to select a hash algorithm that will produce the longest and most secure digest. Which would she choose?
Whirlpool
Which of the following is NOT correct about a one-time pad (OTP)?
it requires a cipher disk
What is data called that is to be encrypted by inputting it into a cryptographic algorithm?
plaintext
Which of the following creates the most secure ciphertext?
sponge function