Module 3 - Review Questions

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Farah needs to encrypt only a few files and does not want the entire disk contents to be encrypted. What type of encryption would she use? A.) File-level encryption B.) Byte-level encryption C.) Folder-level encryption D.) Device-level encryption

A

Layla has encrypted a document so that it can only be viewed by those who have been provided the key. What protection has she given to this document? A.) Confidentiality B.) Integrity C.) Authentication D.) Obfuscation

A

What is a collision? A.) Two files that produce the same digest. B. )Two ciphertexts that have the same length. C.) Two algorithms that have the same key. D.) Two keys that are the same length.

A

What is data called that is to be encrypted by inputting it into a cryptographic algorithm? A.) Plaintext B.) Byte-text C.) Cleartext D.) Ciphertext

A

Which of the following is NOT to be decrypted but is only used for comparison purposes? A.) Digest B.) Key C.) Stream D.) Algorithm

A

Which of these is NOT a characteristic of a secure hash algorithm? A.) Collisions may occur, but they are rare. B.) A message cannot be produced from a predefined hash. C.) The hash should always be the same fixed size. D.) The results of a hash function should not be reversed.

A

Nahla has been asked to make a recommendation about the most secure TEE. Which of the following would she choose? A.) SED B.) HSM C.) TPM D.) ARC

C

Which of the following creates the most secure ciphertext? A.) Redundant function B.) Stream cipher C.) Block cipher D.) Sponge function

D

Which of the following is NOT correct about "security through obscurity"? A.) It attempts to hide its existence from outsiders. B.) Proprietary cryptographic algorithms are a common example. C.) It is essentially impossible to achieve. D.) It should only be used as a general information security protection in extreme circumstances.

D

Which of the following is NOT correct about an OTP? A.) It combines plaintext with a random key. B.) The recipient must have a copy of the pad to decrypt the message. C.) It was used during the Cold War. D.) It requires a cipher disk.

D

Which of these is NOT true about ECC? A.) ECC has gained wide popularity. B.) All modern OSs and web browsers use ECC. C.) ECC security is comparable to other asymmetric cryptography but has smaller key sizes. D.) It uses both sloping curves and prime numbers.

D

Which type of blockchain can anyone join? A.) Federated blockchain B.) Private blockchain C.) Hybrid blockchain D.) Public blockchain

D

Zeinab has been asked by her supervisor to speak with an angry customer who claims that they never received notification of a change in the terms of service agreement. Zeinab learned that an automated "read receipt" was received, showing that the customer opened the email with the new terms of service outlined. What action will Zeinab now take regarding this customer? A.) Repudiation B.) Obfuscation C.) Integrity D.) Nonrepudiation

D

Which type of encryption would protect all data on a hard drive, including the installed OS? A.) FDE B.) SSED C.) TXPM D.) HRHS

A

Aaliyah wants to send a message to a friend, but she does not want anyone else to know that she is communicating with them. Which technique would she use? A.) Cryptography B.) Steganography C.) Encryption D.) Ciphering

B

If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message? A.) Alice's private key B.) Alice's public key C.) Bob's public key D.) Bob's private key

B

Which of the following is NOT a form of obfuscation? A.) Tokenization B.) Ciphering C.) Steganography D.) Data masking

B

Which of the following is a weakness of RSA? A.) RSA weaknesses are based on ECC. B.) RSA has no known weaknesses. C.) As computers become more powerful, the ability to compute factoring has increased. D.)The digest produced by the RSA algorithm is too short to be secure.

C

Karyme needs to select a hash algorithm that will produce the longest and most secure digest. Which would she choose? A.) RipeMD160 B.) SHA-256 C.) SHA3-512 D.) Whirlpool

D

Which algorithm uses the same key to both encrypt and decrypt data? A.) Asymmetric cryptographic algorithm B.) Hashing algorithm C.) Pairwise keypair algorithm D.) Symmetric cryptographic algorithm

D


Set pelajaran terkait

Chapter 28: Preventing and Managing Aggressive Behavior

View Set

fahmy wiklikis - Russian- English

View Set

Marketing Research & Decision Making

View Set

Nevada statutes and codes common to life and health insurance only Quiz Questions Chapter Eleven

View Set

Microbio CHAPTER 1 If David's lesion is indeed being caused by a pathogenic organism, which of the following terms would be used to describe the relationship between David and the microbe?

View Set

Computer Science Mid term study guide-- Questions

View Set