Chapter 3

Ace your homework & exams now with Quizwiz!

Abram was asked to explain to one of his coworkers the XOR cipher. He showed his coworker an example of adding two bits, 1 and 1. What is the result of this sum?

0

Which of these is NOT a characteristic of a secure hash algorithm?

Collisions should be rare.

What alternative term can be used to describe asymmetric cryptographic algorithms?

public key cryptography

Which of these is NOT a basic security protection for information that cryptography can provide?

risk loss

Egor wanted to use a digital signature. Which of the following benefits will the digital signature not provide?

verify the receiver

Which of these is the strongest symmetric cryptographic algorithm?

Advanced Encryption Standard

If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message?

Alice's public key

What is a block cipher algorithm that operates on 64-bit blocks and can have a key length from 32 to 448 bits?

Blowfish

Alyosha was explaining to a friend the importance of protecting a cryptographic key from cryptoanalysis. He said that the key should not relate in a simple way to the cipher text. Which protection is Alyosha describing?

Confusion

Which of the following key exchanges uses the same keys each time?

Diffie-Hellman (DH)

A(n)___ is not decrypted but is only used for comparison purposes.

Digest

Asymmetric cryptographic algorithms are also known as private key cryptography.

False

Encryption is the practice of transforming information so that it is secure and cannot be accessed by unauthorized parties.

False

GNU Privacy Guard a proprietary software that runs on different operating systems.

False

Obfuscation is making something well known or clear.

False

Which of these has an onboard key generator and key storage facility, as well as accelerated symmetric and asymmetric encryption, and can back up sensitive material in encrypted form?

Hardware Security Module (HSM)

What type of cryptographic algorithm creates a unique digital fingerprint of a set of data?

Hash

In cryptography, which of the five basic protections ensures that the information is correct and no unauthorized person or malicious software has altered that data?

Integrity

Alexei was given a key to a substitution cipher. The key showed that the entire alphabet was rotated 13 steps. What type of cipher is this?

ROT13

Illya was asked to recommend the most secure asymmetric cryptographic algorithm to his supervisor. Which of the following did he choose?

RSA

What is the latest version of the Secure Hash Algorithm?

SHA-3

A collision attack is an attempt to find two input strings of a hash function that produce the same hash result.

True

The XOR cipher is based on the binary operation eXclusive OR that compares two bits.

True

Wireless data networks are particularly susceptible to known ciphertext attacks.

True

Data that is in an unencrypted form is referred to as which of the following?

cleartext

The Hashed Message Authentication Code (HMAC)___.

encrypts the key and the message

Which areas of a file cannot be used by steganography to hide data?

in the directory structure of the file system

Proving that a user sent an email message is known as _____.

non-repudiation

Public key systems that generate random public keys that are different for each session are called _____.

perfect forward secrecy

What is data called that is to be encrypted by inputting it into a cryptographic algorithm?

plaintext

Which of the following is not one of the functions of a digital signature?

protect the public key

What is a characteristic of the Trusted Platform Module (TPM)?

It provides cryptographic services in hardware instead of software

At a staff meeting one of the technicians suggested that the enterprise protect its new web server by hiding it and not telling anyone where it is located. Iosif raised his hand and said that security through obscurity was a poor idea. Why did he say that?

It would be essentially impossible to keep its location a secret from everyone.

What technology uses a chip on the motherboard of the computer to provide cryptographic services?

TPM


Related study sets

ATI Nursing Care of Children Practice 2019 A

View Set

Chapter 24: Digestive System Questions

View Set

Macroeconomics MyEconLab Ch.4 Homework, Macroeconomics MyEconLab Ch.5 Homework, ECON Final, Econ Exam 1 Review, Exam 2 Macroeconomics, ECON Chap 1 Pearson, ECON-2301 Chapter 2

View Set

World History Patterns of Interaction study guide semester 2 final

View Set