Quiz 8 Coms System Security
What mathematical problem forms the basis of most modern cryptographic algorithms?
Factoring large primes
When Patricia receives a message from Gary, she wants to be able to demonstrate to Sue that the message actually came from Gary. What goal of cryptography is Patricia attempting to achieve?
Nonrepudiation
What standard is NOT secure and should never be used on modern wireless networks?
Wired Equivalent Privacy (WEP)
Which information security objective allows trusted entities to endorse information?
Certification
A digitized signature is a combination of a strong hash of a message and a secret key.
False
Alice would like to send a message to Bob using a digital signature. What cryptographic key does Alice use to create the digital signature?
Alice's private key
Gary is sending a message to Patricia. He wants to ensure that nobody tampers with the message while it is in transit. What goal of cryptography is Gary attempting to achieve?
Integrity
Which approach to cryptography provides the strongest theoretical protection?
Quantum cryptography
What is NOT a symmetric encryption algorithm?
Rivest-Shamir-Adelman (RSA)
What is NOT an effective key distribution method for plaintext encryption keys?
Unencrypted email