Ch 3 - Basic Cryptography

Beschreibung

Ch 3 quiz
C Danvers
Quiz von C Danvers, aktualisiert more than 1 year ago
C Danvers
Erstellt von C Danvers vor mehr als 6 Jahre
1785
0

Zusammenfassung der Ressource

Frage 1

Frage
A collision attack is an attempt to find two input strings of a hash function that produce the same hash result.
Antworten
  • True
  • False

Frage 2

Frage
After the DES cipher was broken and no longer considered secure, what encryption algorithm was made as its successor?
Antworten
  • AES
  • RSA
  • Twofish
  • 3DES

Frage 3

Frage
Asymmetric cryptographic algorithms are also known as private key cryptography.
Antworten
  • True
  • False

Frage 4

Frage
Ciphertext is the scrambled and unreadable output of encryption.
Antworten
  • True
  • False

Frage 5

Frage
Data that is in an unencrypted form is referred to as which of the following?
Antworten
  • plain text
  • crypttext
  • cleartext
  • simpletext

Frage 6

Frage
Encryption is the practice of transforming information so that it is secure and cannot be accessed by unauthorized parties.
Antworten
  • True
  • False

Frage 7

Frage
GNU Privacy Guard a proprietary software that runs on different operating systems.
Antworten
  • True
  • False

Frage 8

Frage
If Bob receives an encrypted reply message from Alice, whose private key is used to decrypt the received message?
Antworten
  • Alice's private key
  • Bob's private key
  • Bob's private key and Alice's public key
  • Bob and Alice's keys

Frage 9

Frage
If using the MD5 hashing algorithm, what is the length to which each message is padded?
Antworten
  • 64 bits
  • 128 bits
  • 32 bits
  • 512 bits

Frage 10

Frage
In cryptography, which of the five basic protections ensures that the information is correct and no unauthorized person or malicious software has altered that data?
Antworten
  • confidentiality
  • encryption
  • availability
  • integrity

Frage 11

Frage
In information technology, non-repudiation is the process of proving that a user performed an action.
Antworten
  • True
  • False

Frage 12

Frage
In which type of encryption is the same key used to encrypt and decrypt data?
Antworten
  • public
  • asymmetric
  • symmetric
  • private

Frage 13

Frage
Obfuscation is making something well known or clear.
Antworten
  • True
  • False

Frage 14

Frage
One of the first popular symmetric cryptography algorithms was RSA.
Antworten
  • True
  • False

Frage 15

Frage
The SHA-1 hashing algorithm creates a digest that is how many bits in length?.
Antworten
  • 192 bits
  • 160 bits
  • 128 bits
  • 96 bits

Frage 16

Frage
The simplest type of stream cipher, one in which one letter or character is exchanged for another, is known as what?
Antworten
  • loop
  • lock
  • substitution
  • shift

Frage 17

Frage
The XOR cipher is based on the binary operation eXclusive OR that compares two bits.
Antworten
  • True
  • False

Frage 18

Frage
What alternative term can be used to describe asymmetric cryptographic algorithms?
Antworten
  • public key cryptography
  • user key cryptography
  • private key cryptography
  • cipher-text cryptography

Frage 19

Frage
What cryptographic method, first proposed in the mid-1980s, makes use of sloping curves instead of large prime numbers?
Antworten
  • RSA
  • ECC
  • FCC
  • IKE

Frage 20

Frage
What is a block cipher algorithm that operates on 64-bit blocks and can have a key length from 32 to 448 bits?
Antworten
  • Blowfish
  • Whirlpool
  • Rijndal
  • Twofish

Frage 21

Frage
What is the U.S. federal government standard for digital signatures?
Antworten
  • Data Encryption Standard
  • Advanced Encryption Standard
  • Digital Signature Algorithm
  • Elliptic Curve Cryptography

Frage 22

Frage
What technology uses a chip on the motherboard of the computer to provide cryptographic services?
Antworten
  • SEDs
  • TPM
  • FDE
  • HSM

Frage 23

Frage
What term best describes when cryptography is applied to entire disks instead of individual files or groups of files?
Antworten
  • full disk encryption
  • system encryption
  • OS encryption
  • disk encryption

Frage 24

Frage
What term describes data actions being performed by endpoint devices, such as printing a report from a desktop computer?
Antworten
  • data-in-transit
  • data-at-rest
  • data-in-use
  • data-in-play

Frage 25

Frage
What type of cipher takes one character and replaces it with one character, working one character at a time?
Antworten
  • block cipher
  • unit cipher
  • single cipher
  • stream cipher

Frage 26

Frage
What type of cryptographic algorithm creates a unique digital fingerprint of a set of data?
Antworten
  • hash
  • block
  • digest
  • key

Frage 27

Frage
What type of cryptography uses two keys instead of just one, generating both a private and a public key?
Antworten
  • shared
  • asymmetric
  • symmetric
  • open

Frage 28

Frage
What type of message authentication code uses hashing to authenticate the sender by using both a hash function and a secret cryptographic key?
Antworten
  • RIPEMD
  • HMAC
  • SHA-384
  • MD5

Frage 29

Frage
What widely used commercial asymmetric cryptography software can be used for encrypting files and email messages?
Antworten
  • PGP
  • GPG
  • EFS
  • GNUPG

Frage 30

Frage
When Bob needs to send Alice a message with a digital signature, whose private key is used to encrypt the hash?
Antworten
  • Bob's private key
  • Bob and Alice's keys
  • Alice's private key
  • Bob's private key and Alice's public key

Frage 31

Frage
Which hash algorithm's primary design feature is two different and independent parallel chains of computation, the results of which are then combined at the end of the process?
Antworten
  • HMAC
  • RIPEMD
  • SHA-384
  • MD5

Frage 32

Frage
Which key exchange requires Alice and Bob to each agree upon a large prime number and related integer?
Antworten
  • Prime-Curve
  • Quantum Prime
  • Elliptic Curve Diffie-Hellman
  • Diffie-Hellman

Frage 33

Frage
Which of the following are considered to be common asymmetric cryptographic algorithms? (Choose all that apply.)
Antworten
  • Digital Signature Algorithm
  • Elliptic Curve Cryptography
  • Data Encryption Standard
  • Advanced Encryption Standard

Frage 34

Frage
Which of the following asymmetric cryptography algorithms is most commonly used?
Antworten
  • AES
  • Blowfish
  • RSA
  • Twofish

Frage 35

Frage
Which of the following is a public key system that generates random public keys that are different for each session?
Antworten
  • public secrecy
  • ephemeral-secrecy
  • random-key exchange
  • perfect forward secrecy

Frage 36

Frage
Which of the following is more secure than software encryption?
Antworten
  • hardware encryption
  • full disk encryption
  • private encryption
  • application encryption

Frage 37

Frage
Which of the following is not one of the functions of a digital signature?
Antworten
  • verification of the sender
  • protect the public key
  • prove the integrity of the message
  • prevention of the sender from disowning the message

Frage 38

Frage
Which standard was approved by NIST in late 2000 as a replacement for DES?
Antworten
  • AES
  • Twofish
  • RSA
  • 3DES

Frage 39

Frage
Which type of cryptographic algorithm takes an input string of any length, and returns a string of any requested variable length?
Antworten
  • sponge
  • block
  • substitution
  • loop

Frage 40

Frage
Wireless data networks are particularly susceptible to known ciphertext attacks.
Antworten
  • True
  • False
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

CCNA Security 210-260 IINS - Exam 3
Mike M
Application of technology in learning
Jeff Wall
Innovative Uses of Technology
John Marttila
Ch1 - The nature of IT Projects
mauricio5509
The Internet
Gee_0599
SQL Quiz
R M
CCNA Answers – CCNA Exam
Abdul Demir
Professional, Legal, and Ethical Issues in Information Security
mfundo.falteni
System Analysis
R A
Flash Cards Networks
JJ Pro Wrestler
EDUC260- Multimodal Literacies for a Digital Age
angelwoo2002