Practice Test: Module 06 Basic Cryptography

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What is the attack by which attackers use strong algorithms and capture large sets of ciphertexts to analyze and then inject their own frames?

Ciphertext attack

In which attack does an attacker force the system to abandon the current higher-security mode of operation and instead "fall back" to implementing an older, less secure mode?

Downgrade attack

Which of the following encryption methods is external to the device and provides cryptographic services?

HSM

Ramesh is looking for an external device solution where software-based malware won't compromise data. Ramesh has shortlisted a device that meets the criteria and includes an onboard random number generator and key storage facility while backing up sensitive material in encrypted form. Which of the following has Ramesh selected for his solution?

Hardware security module (HSM)

Which method combines plaintext with a random key to produce the ciphertext?

OTP

Alice is looking for means of generating random public keys that are different for each session and ensuring that even if the secret key is compromised, it cannot reveal the contents of more than one message. Which of the following is the appropriate solution for Alice?

Perfect forward secrecy

John needs to identify public key systems that generate different, random public keys for each session and, even if a key gets stolen, should not reveal more than one message. Which public key system should John suggest?

Perfect forward secrecy

Mary deals with confidential data that needs to be communicated to clients. How should Mary ensure that confidential data is hidden within other data, the hidden data is difficult to identify, and the encrypted data is confidential?

Steganography

Which of the following processes can conceal a file, message, image, or a video within another file, message, image, or a video?

Steganography

Wilson is consulting with Abram to buy a new external storage device for Wilson's enterprise. Wilson gives Abram the following requirements for the device: Allows administrators to remotely prohibit accessing the data on a device if the user is not verified Locks the user out completely the next time the device connects Can instruct the drive to initiate a self-destruct sequence to destroy all data What should Abram suggest to Wilson?

USB device encryption


Set pelajaran terkait

MGT 499 Assessing the Internal Environment of the Firm SB

View Set

Economics: Inventory Method: LIFO

View Set

Module 13: Resp. Failure & ARDS NCLEX Questions

View Set

Exam 4 (chap 17 and hypoth test portions of 18, 20)

View Set

Chapter 14 Nursing management during labor and birth Intrapartum,

View Set

1.4.1 Binary addition and subtraction

View Set

SHRM-CP - COMPENSATION & BENEFITS EXAM

View Set

Līgumu veidi Līgumu noslēgšana Līgumu klasifikācija

View Set

Lab quiz 5- post 9-11 & pre 12/13

View Set