GBA 6780 - Chapter 9 Quiz
Alice would like to send a message to Bob using a digital signature. What cryptographic key does Alice use to create the digital signature? -Alice's public key -Alice's private key -Bob's public key -Bob's private key
Alice's private key
Bob received a message from Alice that contains a digital signature. What cryptographic key does Bob use to verify the digital signature? -Alice's public key -Alice's private key -Bob's public key -Bob's private key
Alice's public key
Alice would like to send a message to Bob securely and wishes to encrypt the contents of message. What key does she use to encrypt this message? -Alice's public key -Alice's private key -Bob's public key -Bob's private key
Bob's public key
Which information security objective allows trusted entities to endorse information? -Validation -Authorization -Certification -Witnessing
Certification
Which cryptographic attack offers cryptanalysts the most information about how an encryption algorithm works? -Chosen plaintext -Ciphertext only -Known plaintext -Chosen ciphertext
Chosen plaintext
Betty receives a cipher text message from her colleague Tim. What type of function does Betty need to use to read the plaintext message? -Encryption -Hashing -Decryption -Validation
Decryption
Alice and Bob would like to communicate with each other using a session key but they do not already have a shared secret key. Which algorithm can they use to exchange a secret key? -Rivest, Shamir, Adelman (RSA) -Message digest algorithm (MDF) -Blowfish -Diffie-Hellman
Diffie-Hellman
What mathematical problem forms the basis of most modern cryptographic algorithms? -Factoring large primes -Traveling salesman problem -Quantum mechanics -Birthday problem
Factoring large primes
T/F: A digitized signature is a combination of a strong hash of a message and a secret key.
False
T/F: A physical courier delivering an asymmetric key is an example of in-band key exchange.
False
T/F: You must always use the same algorithm to encrypt information and decrypt the same information.
False
Gary is sending a message to Patricia. He wants to ensure that nobody tampers with the message while it is in transit. What goal of cryptography is Gary attempting to achieve? -Confidentiality -Integrity -Authentication -Nonrepudiation
Integrity
When Patricia receives a message from Gary, she wants to be able to demonstrate to Sue that the message actually came from Gary. What goal of cryptography is Patricia attempting to achieve? -Confidentiality -Integrity -Authentication -Nonrepudiation
Nonrepudiation
Which of the following allows a certificate authority (CA) to revoke a compromised digital certificate in real time? -Certificate revocation list (CRL) -International Data Encryption Algorithm (IDEA) -Transport Layer Security (TLS) -Online Certificate Status Protocol (OCSP)
Online Certificate Status Protocol (OCSP)
Which approach to cryptography provides the strongest theoretical protection? -Quantum cryptography -Asymmetric cryptography -Elliptic curve cryptography -Classic cryptography
Quantum cryptography
Which set of characteristics describes the Caesar cipher accurately? -Asymmetric, block, substitution -Asymmetric, stream, transposition -Symmetric, stream, substitution -Symmetric, block, transposition
Symmetric, stream, substitution
Which type of cipher works by rearranging the characters in a message? -Substitution -Steganographic -Transposition -Asymmetric
Transposition
What is the only unbreakable cipher when it is used properly? -Rivest-Shamir-Adelman (RSA) -Vernam -Elliptic Curve Diffle-Hellman in Ephemeral mode (ECDHE) -Blowfish
Vernam
What type of function generates the unique value that corresponds to the contents of a message and is used to create a digital signature? -Elliptic curve -Decryption -Encryption -Hash
Hash
T/F: A keyword mixed alphabet cipher uses a cipher alphabet that consists of a keyword, minus duplicates, followed by the remaining letters of the alphabet.
True