GBA 6780 - Chapter 9 Quiz

Ace your homework & exams now with Quizwiz!

Alice would like to send a message to Bob using a digital signature. What cryptographic key does Alice use to create the digital signature? -Alice's public key -Alice's private key -Bob's public key -Bob's private key

Alice's private key

Bob received a message from Alice that contains a digital signature. What cryptographic key does Bob use to verify the digital signature? -Alice's public key -Alice's private key -Bob's public key -Bob's private key

Alice's public key

Alice would like to send a message to Bob securely and wishes to encrypt the contents of message. What key does she use to encrypt this message? -Alice's public key -Alice's private key -Bob's public key -Bob's private key

Bob's public key

Which information security objective allows trusted entities to endorse information? -Validation -Authorization -Certification -Witnessing

Certification

Which cryptographic attack offers cryptanalysts the most information about how an encryption algorithm works? -Chosen plaintext -Ciphertext only -Known plaintext -Chosen ciphertext

Chosen plaintext

Betty receives a cipher text message from her colleague Tim. What type of function does Betty need to use to read the plaintext message? -Encryption -Hashing -Decryption -Validation

Decryption

Alice and Bob would like to communicate with each other using a session key but they do not already have a shared secret key. Which algorithm can they use to exchange a secret key? -Rivest, Shamir, Adelman (RSA) -Message digest algorithm (MDF) -Blowfish -Diffie-Hellman

Diffie-Hellman

What mathematical problem forms the basis of most modern cryptographic algorithms? -Factoring large primes -Traveling salesman problem -Quantum mechanics -Birthday problem

Factoring large primes

T/F: A digitized signature is a combination of a strong hash of a message and a secret key.

False

T/F: A physical courier delivering an asymmetric key is an example of in-band key exchange.

False

T/F: You must always use the same algorithm to encrypt information and decrypt the same information.

False

Gary is sending a message to Patricia. He wants to ensure that nobody tampers with the message while it is in transit. What goal of cryptography is Gary attempting to achieve? -Confidentiality -Integrity -Authentication -Nonrepudiation

Integrity

When Patricia receives a message from Gary, she wants to be able to demonstrate to Sue that the message actually came from Gary. What goal of cryptography is Patricia attempting to achieve? -Confidentiality -Integrity -Authentication -Nonrepudiation

Nonrepudiation

Which of the following allows a certificate authority (CA) to revoke a compromised digital certificate in real time? -Certificate revocation list (CRL) -International Data Encryption Algorithm (IDEA) -Transport Layer Security (TLS) -Online Certificate Status Protocol (OCSP)

Online Certificate Status Protocol (OCSP)

Which approach to cryptography provides the strongest theoretical protection? -Quantum cryptography -Asymmetric cryptography -Elliptic curve cryptography -Classic cryptography

Quantum cryptography

Which set of characteristics describes the Caesar cipher accurately? -Asymmetric, block, substitution -Asymmetric, stream, transposition -Symmetric, stream, substitution -Symmetric, block, transposition

Symmetric, stream, substitution

Which type of cipher works by rearranging the characters in a message? -Substitution -Steganographic -Transposition -Asymmetric

Transposition

What is the only unbreakable cipher when it is used properly? -Rivest-Shamir-Adelman (RSA) -Vernam -Elliptic Curve Diffle-Hellman in Ephemeral mode (ECDHE) -Blowfish

Vernam

What type of function generates the unique value that corresponds to the contents of a message and is used to create a digital signature? -Elliptic curve -Decryption -Encryption -Hash

Hash

T/F: A keyword mixed alphabet cipher uses a cipher alphabet that consists of a keyword, minus duplicates, followed by the remaining letters of the alphabet.

True


Related study sets

Electronic Configuration and the Periodic Table readingAssignment

View Set

Ch. 4 - Comparative Anatomy, Form/Function

View Set

Chapter 17 - Prioritization, Delegation, and Assignment

View Set

Identifying Isometric Transformations

View Set

Chapter 55: Management of Patients With Urinary Disorders

View Set

Chapter 6: values, ethics, and advocacy PrepU questions

View Set