Chapter 3: Basic Cryptography

Ace your homework & exams now with Quizwiz!

Alyosha was explaining to a friend the importance of protecting a cryptographic key from cryptoanalysis. He said that the key should not relate in a simple way to the cipher text. Which protection is Alyosha describing? A) diffusion B) confusion C) integrity D) chaos

confusion

A(n) _____ is not decrypted but is only used for comparison purposes. A) key B) digest C) stream D) algorithm

digest

The Hashed Message Authentication Code (HMAC) ___________. A) hashes the DHE key only B) hashes only the key C) hashes only the message D) hashes the key and the message

hashes the key and the message

Proving that a user sent an email message is known as _________. A) integrity B) availability C) repudiation D) non-repudiation

non-repudiation

Public key systems that generate random public keys that are different for each session are called __________. A) perfect forward secrecy B) Public Key Exchange (PKE) C) Elliptic Curve Diffie-Hellman (ECDH) D) Diffie-Hellman (DH)

perfect forward secrecy

What is data called that is to be encrypted by inputting it into a cryptographic algorithm? A) opentext B) cleartext C) plaintext D) ciphertext

plaintext

Which of these is NOT a basic security protection for information that cryptography can provide? A) authenticity B) integrity C) risk loss D) confidentiality

risk loss

Egor wanted to use a digital signature. Which of the following benefits will the digital signature not provide? A) enforce nonrepudiation B) verify the receiver C) verify the sender D) prove the integrity of the message

verify the receiver

What is the latest version of the Secure Hash Algorithm? A) SHA-5 B) SHA-4 C) SHA-2 D) SHA-3

SHA-3

Abram was asked to explain to one of his coworkers the XOR cipher. He showed his coworker an example of adding two bits, 1 and 1. What is the result of this sum? A) 16 B) 0 C) 1 D) 2 **Note: XOR outputs 1 when the inputs do NOT match, and outputs 0 when they DO match.

0

Which of these is the strongest symmetric cryptographic algorithm? A) Advanced Encryption Standard B) RC 1 C) Triple Data Encryption Standard D) Data Encryption Standard

Advanced Encryption Standard

If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message? A) Bob's public key B) Alice's public key C) Bob's private key D) Alice's private key

Alice's public key

Which areas of a file cannot be used by steganography to hide data? (Enter letter for answer) A) in the file header fields that describe the file. B) in the directory structure of the file system. C) in areas that contain the content data itself. D) in data that is used to describe the content or structure of the actual data.

B

At a staff meeting one of the technicians suggested that the enterprise protect its new web server by hiding it and not telling anyone where it is located. Iosif raised his hand and said that security through obscurity was a poor idea. Why did he say that? (Enter letter for answer) A) It is an unproven approach and has never been tested. B) It depends too heavily upon non-repudiation in order for it to succeed. C) It would be essentially impossible to keep its location a secret from everyone. D) It would be too costly to have one isolated server by itself.

C

Which of these is NOT a characteristic of a secure hash algorithm? A) Collisions should be rare. B) A message cannot be produced from a predefined hash. C) The results of a hash function should not be reversed. D) The hash should always be the same fixed size.

Collisions should be rare.

What is a characteristic of the Trusted Platform Module (TPM)? (Enter letter for answer) A) It allows the user to boot a corrupted disk and repair it B) It includes a pseudorandom number generator (PRNG) C) It is available only on Windows computers running BitLocker D) It provides cryptographic services in hardware instead of software

D

Which of the following key exchanges uses the same keys each time? A) Diffie-Hellman (DH) B) Diffie-Hellman-RSA (DHRSA) C) Diffie-Hellman Ephemeral (DHE) D) Elliptic Curve Diffie-Hellman (ECDH)

Diffie-Hellman (DH)

Which of these has an onboard key generator and key storage facility, as well as accelerated symmetric and asymmetric encryption, and can back up sensitive material in encrypted form? A) encrypted hardware-based USB devices B) Trusted Platform Module (TPM) C) Hardware Security Module (HSM) D) self-encrypting hard disk drives (SED)

Hardware Security Module (HSM)

Alexei was given a key to a substitution cipher. The key showed that the entire alphabet was rotated 13 steps. What type of cipher is this? A) ROT13 B) Alphabetic C) XAND13 D) AES

ROT13

Illya was asked to recommend the most secure asymmetric cryptographic algorithm to his supervisor. Which of the following did he choose? A) SHA-2 B) BTC-2 C) ME-312 D) RSA

RSA


Related study sets

Unit 1 Progress Check: MCQ Part B

View Set

Peds Chapter 51-Nursing Care During a Pediatric Emergency

View Set

AQA A Level Biology 4/5/6 mark questions

View Set

AGB 214 Ch: 1, 2, 3, and 4 + Practice tests (Midterm 1)

View Set

BARRIERS TO EFFECTIVE COMMUNICATION

View Set

Professor Messer SY0-601 4.2 Incident Response Lifecycle

View Set

To Kill a Mockingbird Chapters 26-28 Test #4 Review

View Set

INRAT - Air Traffic Services and Separation

View Set

Midterm: Introduction to Government

View Set