Chp 3 Information Security
data-in-use
What term describes data actions being performed by endpoint devices, such as printing a report from a desktop computer? 1. data-in-transit 2. data-in-play 3. data-at-rest 4. data-in-use
stream cipher
What type of cipher takes one character and replaces it with one character, working one character at a time? 1. block cipher 2. single cipher 3. unit cipher 4. stream cipher
PGP
What widely used commercial asymmetric cryptography software can be used for encrypting files and email messages? 1. PGP 2. GPG 3. EFS 4. GNUPG
Diffie-Hellman
Which key exchange requires Alice and Bob to each agree upon a large prime number and related integer? Quantum Prime Prime-Curve Diffie-Hellman Elliptic Curve Diffie-Hellman
Elliptic Curve Cryptography (ECC), Digital Signature Algorithm
Which of the following are considered to be common asymmetric cryptographic algorithms? (Choose all that apply.) 1. Data Encryption Standard 2. Elliptic Curve Cryptography 3. Advanced Encryption Standard 4. Digital Signature Algorithm
RSA
Which of the following asymmetric cryptography algorithms is most commonly used? 1. AES 2. RSA 3. Twofish 4. Blowfish
perfect forward secrecy
Which of the following is a public key system that generates random public keys that are different for each session? ephemeral-secrecy perfect forward secrecy public secrecy random-key exchange
protect the public key
Which of the following is not one of the functions of a digital signature? 1. verification of the sender 2. prevention of the sender from disowning the message 3. prove the integrity of the message 4. protect the public key
sponge
Which type of cryptographic algorithm takes an input string of any length, and returns a string of any requested variable length? 1. substitution 2. block 3. loop 4. sponge
512 bits
If using the MD5 hashing algorithm, what is the length to which each message is padded? 1. 32 bits 2. 64 bits 3. 128 bits 4. 512 bits
True
In information technology, non-repudiation is the process of proving that a user performed an action. (T/F)
160 bits
The SHA-1 hashing algorithm creates a digest that is how many bits in length? 1. 96 bits 2. 128 bits 3. 160 bits 4. 192 bits
True
The XOR cipher is based on the binary operation eXclusive OR that compares two bits. (T/F)
public key cryptography
What alternative term can be used to describe asymmetric cryptographic algorithms? 1. user key cryptography 2. public key cryptography 3. private key cryptography 4. cipher-text cryptography
Cryptography can support confidentiality, integrity, authentication, and non-repudiation.
What four basic protections can cryptography support?
Security through obscurity, or the notion that virtually any system can be made secure so long as outsiders are unaware of it or how it functions. However, this is a flawed approach since it is essentially impossible to keep "secrets" from everyone.
What is meant by the phrase "security through obscurity," and why is this concept not accurate?
True
A collision attack is an attempt to find two input strings of a hash function that produce the same hash result. (T/F)
3DES
After the DES cipher was broken and no longer considered secure, what encryption algorithm was made as its successor? 1. AES 2. Twofish 3. 3DES 4. RSA
True
Ciphertext is the scrambled and unreadable output of encryption. (T/F)
False
Obfuscation is making something well known or clear. (T/F)