Module 6 Textbook & Quiz | ITE-249-02 Basic Cryptography

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

19. Which of the following is NOT a characteristic of the Trusted Platform Module (TPM)? a. It provides cryptographic services in hardware instead of software. b. It can easily be transported to another computer. c. It can generate asymmetric cryptographic public and private keys. d. It includes a pseudorandom number generator (PRNG).

d. It includes a pseudorandom number generator (PRNG).

3. Brielle is researching substitution ciphers. She came across a cipher in which the entire alphabet was rotated 13 steps. What type of cipher is this? a. XAND13 b. XOR c. Alphabetic d. ROT13

d. ROT13

2. Cryptography can prevent an individual from fraudulently reneging on an action. What is this known as? a. Nonrepudiation b. Obfuscation c. Repudiation d. Integrity

a. Nonrepudiation

4. Choose which statement is wrong by applying your knowledge from the reading. a. Opal is a standard for FEDs. b. Modern OSs provide encryption support natively. c. An HSM is external while a TMP is internal.

a. Opal is a standard for FEDs.

8. Which of these is NOT a basic security protection for information that cryptography can provide? a. Risk b. Confidentiality c. Authenticity d. Integrity

a. Risk

10. Which of the following is NOT a symmetric cryptographic algorithm? a. SHA b. 3DES c. Blowfish d. DES

a. SHA

2. Choose which statement is wrong by applying your knowledge from the reading. a. SHA-1 is considered a secure hash algorithm. b. Asymmetric cryptography keys can work in both directions. c. A digest of a short set of data should produce the same size as a digest of a long set of data.

a. SHA-1 is considered a secure hash algorithm.

11. Which of the following is not to be decrypted but is only used for comparison purposes? a. Stream b. Algorithm c. Digest d. Key

c. Digest

1. Which of the following hides the existence of information? a. Encryption b. Ciphering c. Steganography d. Decryption

c. Steganography

3. Choose which statement is wrong by applying your knowledge from the reading. a. Post-quantum cryptography is comprised of algorithms that are secure against an attack by a quantum computer. b. In a downgrade attack, an attacker forces the system to abandon the current higher security mode of operation and instead "fall back" to implementing an older and less secure mode. c. The basis of a quantum computer is a bit.

c. The basis of a quantum computer is a bit. The basis of a quantum computer is a qubit.

12. Which of these is NOT a characteristic of a secure hash algorithm? a. Collisions should occur no more than 15 percent of the time. b. The results of a hash function should not be reversed. c. A message cannot be produced from a predefined hash. d. The hash should always be the same fixed size.

a. Collisions should occur no more than 15 percent of the time.

9. Cicero is researching hash algorithms. Which algorithm would produce the longest and most secure digest? a. SHA3-512 b. SHA-256 c. SHA6-6 d. MD5

a. SHA3-512

5. What is low latency? a. The time between when a byte is input into a cryptographic cipher and when the output is obtained. b. A low-power source requirement of a sensor. c. The delay between when a substitution cipher decrypts the first block and when it finishes with the last block. d. The requirements for an IoT device that is using a specific network.

a. The time between when a byte is input into a cryptographic cipher and when the output is obtained.

1. Choose which statement is wrong by applying your knowledge from the reading. a. Entropy is the measure of randomness of a data-generating function. b. Unencrypted data that is input for encryption or is the output of decryption is called cleartext. c. Steganography hides the existence of information.

b. Unencrypted data that is input for encryption or is the output of decryption is called cleartext. Not cleartext, plaintext.

14. Which of these is the strongest symmetric cryptographic algorithm? a. Data Encryption Standard b. Triple Data Encryption Standard c. Advanced Encryption Standard d. RC1

c. Advanced Encryption Standard

6. What are public key systems that generate different random public keys for each session? a. Elliptic Curve Diffie-Hellman (ECDH) b. Diffie-Hellman (DH) c. Public Key Exchange (PKE) d. perfect forward secrecy

d. perfect forward secrecy

16. Egor wanted to use a digital signature. Which of the following benefits will the digital signature NOT provide? a. Verify the receiver b. Verify the sender c. Prove the integrity of the message d. Enforce nonrepudiation

a. Verify the receiver

17. Basil was reading about a new attack that forces the system to abandon a higher cryptographic security mode of operation and instead fall back to an older and less secure mode. What type of attack is this? a. Deprecation attack b. Downgrade attack c. Obfuscation attack d. Pullback attack

b. Downgrade attack

7. What is data called that is to be encrypted by inputting it into a cryptographic algorithm? a. Byte-text b. Plaintext c. Cleartext d. Ciphertext

b. Plaintext

18. What is a collision? a. Two algorithms have the same key. b. Two ciphertexts have the same length. c. Two files produce the same digest. d. Two keys are the same length.

c. Two files produce the same digest.

15. If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message? a. Alice's private key b. Alice's public key c. Bob's private key d. Bob's public key

b. Alice's public key

13. Deo has been asked to explain RSA to his colleague. After his explanation, Deo is asked what, if any, weaknesses RSA has. How would Deo respond? a. RSA weaknesses are based on ECC. b. As computers become more powerful, the ability to compute factoring has increased. c. The digest produced by the RSA algorithm is too short to be secure. d. RSA has no known weaknesses.

b. As computers become more powerful, the ability to compute factoring has increased.

20. Which of these provides cryptographic services and is external to the device? a. encrypted hardware-based USB devices b. Hardware Security Module (HSM) c. Trusted Platform Module (TPM) d. self-encrypting hard disk drives (SED)

b. Hardware Security Module (HSM)

4. Which of the following is FALSE about "security through obscurity"? a. It is essentially impossible. b. It can only provide limited security. c. Proprietary cryptographic algorithms are an example. d. It attempts to hide the existence from outsiders.

b. It can only provide limited security.


Set pelajaran terkait

Supply Chain FINAL - chapter 7-9

View Set

Philosophy of Science (phil 150)

View Set

Mission of Jesus Chapter 3 Questions

View Set

Novice Parliamentary Procedure Questions

View Set

Intrapartal Period: Fetal Heart Rate Assessment > Level- 3: Competent

View Set

Hemodialysis & Peritoneal Dialysis (Simple Nursing)

View Set

Examples on Geometrical and Structural isomers

View Set

Lecture 5: Climate variability (ENSO)

View Set