Module 6 Basic Cyrptography REVIEW

Ace your homework & exams now with Quizwiz!

Wilson has requested your help to suggest an encryption method that will provide the highest security against attacks. Which encryption process should you suggest? AES RC4 Blowfish 3DES

AES

Which of these is the strongest symmetric cryptographic algorithm? Data Encryption Standard Advanced Encryption Standard Triple Data Encryption Standard RC1

Advanced Encryption Standard

If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message? Alice's private key Alice's public key Bob's public key Bob's private key

Alice's public key

Deo has been asked to explain RSA to his colleague. After his explanation, Deo is asked what, if any, weaknesses RSA has. How would Deo respond? RSA has no known weaknesses. Correct! As computers become more powerful, the ability to compute factoring has increased. RSA weaknesses are based on ECC. The digest produced by the RSA algorithm is too short to be secure.

As computers become more powerful, the ability to compute factoring has increased.

Which of these is NOT a characteristic of a secure hash algorithm? The results of a hash function should not be reversed. Collisions should occur no more than 15 percent of the time. A message cannot be produced from a predefined hash. The hash should always be the same fixed size.

Collisions should occur no more than 15 percent of the time.

Blockchain relies on which cryptographic algorithm to make it computationally infeasible to try to replace a block or insert a new block of information without the approval of all entities involved? Cryptographic hash algorithm Symmetric cryptographic algorithm RSA algorithm asymmetric cryptographic algorithm

Cryptographic hash algorithm

Which of the following is not to be decrypted but is only used for comparison purposes? Digest Key Stream Algorithm

Digest

Basil was reading about a new attack that forces the system to abandon a higher cryptographic security mode of operation and instead fall back to an older and less secure mode. What type of attack is this? Deprecation attack Pullback attack Downgrade attack Obfuscation attack

Downgrade attack

Which of these provides cryptographic services and is external to the device? Trusted Platform Module (TPM) Hardware Security Module (HSM) Correct. self-encrypting hard disk drives (SED) encrypted hardware-based USB devices

Hardware Security Module (HSM)

Which of the following is FALSE about "security through obscurity"? It attempts to hide the existence from outsiders. It can only provide limited security. Proprietary cryptographic algorithms are an example. it is essentially impossible

It can only provide limited security.

Cryptography can prevent an individual from fraudulently reneging on an action. What is this known as? Repudiation Nonrepudiation Obfuscation Integrity

Nonrepudiation

Which characteristic of cryptography makes information obscure or unclear, and by which the original information becomes impossible to be determined? Obfuscation nonrepudiation authentication Integrity

Obfuscation

Which of the following is used to create a sequence of numbers whose output is close to a random number? GnuPG RSA DSA PRNG

PRNG

What is data called that is to be encrypted by inputting it into a cryptographic algorithm? Plaintext Ciphertext Byte-text Cleartext

Plaintext

Brielle is researching substitution ciphers. She came across a cipher in which the entire alphabet was rotated 13 steps. What type of cipher is this? XOR XAND13 ROT13 Alphabetic

ROT13

Which of these is NOT a basic security protection for information that cryptography can provide? integrity Authenticity Risk Confidentiality

Risk

Which of the following is NOT a symmetric cryptographic algorithm? DES SHA Blowfish 3DES

SHA

Which of the following hides the existence of information? Encryption Decryption Steganography Ciphering

Steganography

What is low latency? A low-power source requirement of a sensor. The time between when a byte is input into a cryptographic cipher and when the output is obtained The requirements for an IoT device that is using a specific network. The delay between when a substitution cipher decrypts the first block and when it finishes with the last block.

The time between when a byte is input into a cryptographic cipher and when the output is obtained.

What is a collision? Two files produce the same digest. Correct. When two files have the same digest, this is known as a collision. A collision attack is an attempt to find two input strings of a hash function that produce the same hash result. Two ciphertexts have the same length. Two algorithms have the same key. Two keys are the same length.

Two files produce the same digest.

Egor wanted to use a digital signature. Which of the following benefits will the digital signature NOT provide? Verify the sender Verify the receiver Prove the integrity of the message Enforce nonrepudiation

Verify the receiver

Which of the following is NOT a characteristic of the Trusted Platform Module (TPM)? It provides cryptographic services in hardware instead of software. It can generate asymmetric cryptographic public and private keys. It can easily be transported to another computer. It includes a pseudorandom number generator (PRNG).

can easily be transported to another computer.

A manager working in ABC Consulting shared a list of employees from his team who were eligible for an extra week off. Later, he claimed that he has never shared this list. Which principle or functionality of a secured communication can be used to substantiate or verify the manager's claim? obfuscation nonrepudiation steganography hashing

nonrepudiation

Which of the following uses hardware encryption technology to secure stored data and ensures the inseparability of SEDs among vendors? pad key opal qubits

opal

What are public key systems that generate different random public keys for each session? Public Key Exchange (PKE) perfect forward secrecy Elliptic Curve Diffie-Hellman (ECDH) Diffie-Hellman (DH)

perfect forward secrecy

Which algorithm encrypts and decrypts data using the same key? Hash algorithm symmetric cryptographic agolrithm Rivest-Shamir-Adleman algorithm Asymmetric cryptographic algorithm

symmetric cryptographic agolrithm

Cicero is researching hash algorithms. Which algorithm would produce the longest and most secure digest? SHA-256 MD5 SHA3-512 SHA6-6

SHA3-512


Related study sets

Quiz 6: JavaScript 3 and the DOM

View Set

AP Lang Rhetorical Devices (Satire to Zeugma)

View Set

Human Growth and Development module 8

View Set

Marketing Midterm Practice Questions

View Set

Adjective suffixes - ive, -y, -ous, -ful,- less, -able, -ible, -al

View Set

Chapter 14 Risk of Infectious and Communicable Diseases

View Set