Chapter 11

Ace your homework & exams now with Quizwiz!

20. The Microsoft Windows LAN Manager hash ______.

A. is weaker than NTLMv2

12. Which of the following is the strongest symmetric cryptographic algorithm?

A. Advanced Encryption Standard

17. _____ uses lattice-based cryptography and may be more resistant to quantum computing attacks.

A. NTRUEncrypt

1. What is data called that is to be encrypted by inputting into an encryption algorithm?

A. Plaintext

7. Each of the following is a characteristic of a secure hash algorithm except _______.

A. collisions should be rare

5. Symmetric cryptographic algorithms are also called ______.

A. private key cryptography

13. If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, the key he uses to encrypt the message is _______.

B. Alice's public key

15. Which of the following asymmetric cryptographic algorithms is the most secure?

B. RSA

2. Which of the following is not a basic security protection over information that cryptography can provide?

B. Stop loss

8. Hashing would not be used in which of the following examples?

B. encrypting and decrypting e-mail attachments

6. A(n) _____ is not decrypted but is only used for comparison purposes.

B. hash

3. The areas of a file in which steganography can hide data include all of the following except ______.

B. in the directory structure of the file system

14. A digital signature can provide each of the following benefits except ______.

B. verify the receiver

10. Which of the following is a protection provided by hashing?

C. Integrity

4. Proving that a user sent an e-mail message is known as ______.

C. non-repudiation

19. Which of the following has an onboard key generator and key storage facility, accelerated symmetric and asymmetric encryption, and can back up sensitive material in encrypted form?

D. Hardware Security Module (HSM)

9. _____ encrypts a hash with a shared secret key.

D. Hashed Message Authentication Code (HMAC)

11. _____ is a hash that uses two different and independent parallel chains of computation, the result of which are then combined at the end of the process.

D. RIPEMD

16. Which of the following asymmetric encryption algorithms uses prime numbers?

D. RSA

18. The Trusted Platform Module (TPM) _____.

D. provides cryptographic services in hardware instead of software


Related study sets

The Canterbury Tales: Study Guide

View Set

Test 2: Chapter 6 Analyzing the Audience

View Set