Module 06 Basic Cryptography

Ace your homework & exams now with Quizwiz!

Which of these provide cryptographic services and is external to the device? A. Encrypted hardware based USB devices B. Hardware security module C. Trusted platform module D. Self - encrypting hard disk drives

Hardware security module

Which of these is the strongest symmetric cryptographic algorithm? A. RC1 B. Advanced encryption standard C. Data encryption standard D. Triple data encryption standard

Advanced encryption standard

If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message? A. Bob's public key B. Bob's private key C. Alice's private key D. Alice's public key

Alice's public key

Basil was reading about a new attack that forces the system to abandon a higher cryptographic security mode of operation and instead fall back to an older and less secure mode. What type of attack is this? A. Pullback attack B. Obfuscation attack C. Downgrade attack D. Depreciation attack

Downgrade attack

Which of the following is FALSE about "security through obscurity"? A. It attempts to hide the existence from outside B. It is essentially impossible C. Proprietary cryptographic algorithms are an example D. It can only provide limited security

It can only provide limited security

Which of these is not a basic security protection for information that cryptography can provide? A. Confidentiality B. Authenticity C. Risk D. Integrity

Risk

Which of the following is not a symmetric cryptographic algorithm? A. 3DES B. Blowfish C. DES D. SHA

SHA

Cicero is researching hash algorithms. Which algorithm would produce the longest and most secure digest? A. SHA3-512 B. SHA6-6 C. MD5 D. SHA-256

SHA3-512

Which of the following hides the existence of information? A. Decryption B. Ciphering C. Encryption D. Steganography

Steganography

Deo has been asked to explain RSA to his colleague. After his explanation, Deo is asked what, if any, weaknesses RSA has. How would deo respond? A. The Digest produced by the RSA algorithm is too short to be secure B. RSA weaknesses are based on ECC C. As computers become more powerful, the ability to compute factoring has increased D. RSA has no known weaknesses

As computers become more powerful, the ability to compute factoring has increased

Which of these is not a characteristic of a secure hash algorithm? A. Collisions should occur no more than 15% of the time B. A message cannot be produced from a predefined hash C. The result of a hash function should not be reversed D. The hash should always be the same fixed size

Collisions should occur no more than 15% of the time

Which of the following is not to be decrypted but is only used for comparison purposes? A. Algorithm B. Stream C. Digest D. Key

Digest

Which of the following is not a characteristic of the trusted platform module (PTM)? A. It provides cryptographic services in hardware instead of software B. It can generate a symmetric cryptographic public and private keys C. It includes a pseudo random number generator (PRNG) D. It can easily be transported to another computer

It includes a pseudo random number generator (PRNG)

Cryptography can prevent an individual from fraudulently reneging on an action. What is this known as? A. Repudiation B. Integrity C. Nonrepudiation D. Obfuscation

Nonrepudiation

What are public key systems that generate different random public keys for each session? A. Perfect forward secrecy B. Public key exchange (PKE) C. Elliptic curve Diffie - Hellman (ECDH) D. Diffie - Hellman (DH)

Perfect forward secrecy

What is data called that is to be encrypted by inputting it into a cryptographic algorithm? A. Byte - text B. Clear text C. Cipher text D. Plain text

Plain text

Brielle is researching substitution ciphers. She came across a cipher in which the entire alphabet was rotated 13 steps. What type of cipher is this? A. XAND13 B. ROT13 C. Alphabetic D. XOR

ROT13

What Is low latency? A. The time between when a bite is input into a cryptographic cipher And when the output is obtained B. The requirements for an IOT device that is using a specific network C. The delay between when a substitution cipher decrips the 1st block And when it finishes with the last block D. A low-power source requirement of a sensor

The time between when a byte is input into a cryptographic cipher and when the output is obtained

What is collision? A. Two keys are the same length B. Twonciphertexts have the same length C. Two algorithms have the same key D. Two files produced the same digest

Two files produce the same digest

Egor wanted to use a digital signature. Which of the following benefits will the digital signature not provide? A. Prove the integrity of the message B. Verify the sender C. Enforce non repudiation D. Verify the receiver

Verify the receiver


Related study sets

Chapters 1,2,3,4,5,6 (Midterm Marketing 320)

View Set

Social Media Certification Final

View Set

Chapter 2: The Chemistry Of Life

View Set