Info Sec Chapter 8 Cryptography

Ace your homework & exams now with Quizwiz!

The CA periodically distributes a(n) _________ to all users that identifies all revoked certificates. A) CRL B) RA C) MAC D) RDL

A) CRL [certificate revocation list]

The __________ algorithm, developed in 1977, was the first public key encryption algorithm published for commercial use. A) DES B) RSA C) MAC D) AES

B) RSA

SHA-1 produces a(n) ___________-bit message digest, which can then be used as an input to a digital signature algorithm. A) 48 B) 56 C) 160 D) 256

B)56

A __________ is a key-dependent, one-way hash function that allows only specific recipients (symmetric key holders) to access the message digest. A) signature B) MAC C) fingerprint D) digest

B)MAC

Using a database of precomputed hashes from sequentially calculated passwords called a(n) __________, an attacker can simply look up a hashed password and read out the text version. A) timing matrix B) agile scrum C) rainbow table D) smurf list

C) rainbow table

The __________ is responsible for the fragmentation, compression, encryption, and attachment of an SSL header to the cleartext prior to transmission. A) Standard HTTP B) SFTP C) S-HTTP D) SSL Record Protocol

D) SSL Record Protocol

Steganography is a data hiding method that involves embedding information within other files, such as digital pictures or other images. A) True B) False

a) false

__________ is a protocol that can be used to secure communications across any IP-based network such as LANs, WANs, and the Internet. A) PEM B) SSH C) IPSec D) SET

c)IPSec

More advanced substitution ciphers use two or more alphabets, and are referred to as __________ substitutions. A) multialphabetic B) monoalphabetic C) polyalphabetic D) polynomic

c)polyalphabetic

__________ is the amount of effort (usually in hours) required to perform cryptanalysis to decode an encrypted message when the key or algorithm (or both) are unknown. A) Code B) Algorithm C) Key D) Work factor

d)work factor

The AES algorithm was the first public key encryption algorithm to use a 256 bit key length. A) True B) False

false

Standard-HTTP (S-HTTP) is an extended version of the Hypertext Transfer Protocol that provides for the encryption of individual messages transmitted via the Internet between a client and server. A) True B) False

false [Secure HTTP]

S-HTTP An extended version of Hypertext Transfer Protocol that provides for the encryption of protected e-mail transmitted via the Internet between a client and server.. _________________________ A) True B) False

false [provides encryption of messages between client and server]

Diffie-Hellman key exchange uses asymmetric encryption to exchange session keys. _________________________ A) True B) False

true

Internet Protocol Security (IPSec) is an open-source protocol framework for security development within the TCP/IP family of protocol. A) True B) False

true

One encryption method made popular by spy movies involves using the text in a book as the key to decrypt a message. A) True B) False

true

Privacy Enhanced Mail was proposed by the Internet Engineering Task Force and is a standard that uses 3DES symmetric key encryption and RSA for key exchanges and digital signatures. _________________________ A) True B) False

true

Secure Electronic Transactions was developed by MasterCard and VISA in 1997 to protect against electronic payment fraud. A) True B) False

true

Secure Multipurpose Internet Mail Extensions builds on the encoding format of the MIME protocol and uses digital signatures based on public key cryptosystems to secure e-mail. _________________________ A) True B) False

true

The most common hybrid system is based on the Diffie-Hellman key exchange, which is a method for exchanging private keys using public key encryption. A) True B) False

true


Related study sets

Tableau Certified Associate Architect Exam

View Set

Case 1, 2, and 3 student questions

View Set

Nervous system and sensory systems

View Set

Automation, Network Virtualization, Troubleshooting IP Connectivtity

View Set

nutrition ch 7 smartbook questions

View Set