Ch 3 - Basic Cryptography

Descripción

Ch 3 quiz
C Danvers
Test por C Danvers, actualizado hace más de 1 año
C Danvers
Creado por C Danvers hace más de 6 años
1788
0

Resumen del Recurso

Pregunta 1

Pregunta
A collision attack is an attempt to find two input strings of a hash function that produce the same hash result.
Respuesta
  • True
  • False

Pregunta 2

Pregunta
After the DES cipher was broken and no longer considered secure, what encryption algorithm was made as its successor?
Respuesta
  • AES
  • RSA
  • Twofish
  • 3DES

Pregunta 3

Pregunta
Asymmetric cryptographic algorithms are also known as private key cryptography.
Respuesta
  • True
  • False

Pregunta 4

Pregunta
Ciphertext is the scrambled and unreadable output of encryption.
Respuesta
  • True
  • False

Pregunta 5

Pregunta
Data that is in an unencrypted form is referred to as which of the following?
Respuesta
  • plain text
  • crypttext
  • cleartext
  • simpletext

Pregunta 6

Pregunta
Encryption is the practice of transforming information so that it is secure and cannot be accessed by unauthorized parties.
Respuesta
  • True
  • False

Pregunta 7

Pregunta
GNU Privacy Guard a proprietary software that runs on different operating systems.
Respuesta
  • True
  • False

Pregunta 8

Pregunta
If Bob receives an encrypted reply message from Alice, whose private key is used to decrypt the received message?
Respuesta
  • Alice's private key
  • Bob's private key
  • Bob's private key and Alice's public key
  • Bob and Alice's keys

Pregunta 9

Pregunta
If using the MD5 hashing algorithm, what is the length to which each message is padded?
Respuesta
  • 64 bits
  • 128 bits
  • 32 bits
  • 512 bits

Pregunta 10

Pregunta
In cryptography, which of the five basic protections ensures that the information is correct and no unauthorized person or malicious software has altered that data?
Respuesta
  • confidentiality
  • encryption
  • availability
  • integrity

Pregunta 11

Pregunta
In information technology, non-repudiation is the process of proving that a user performed an action.
Respuesta
  • True
  • False

Pregunta 12

Pregunta
In which type of encryption is the same key used to encrypt and decrypt data?
Respuesta
  • public
  • asymmetric
  • symmetric
  • private

Pregunta 13

Pregunta
Obfuscation is making something well known or clear.
Respuesta
  • True
  • False

Pregunta 14

Pregunta
One of the first popular symmetric cryptography algorithms was RSA.
Respuesta
  • True
  • False

Pregunta 15

Pregunta
The SHA-1 hashing algorithm creates a digest that is how many bits in length?.
Respuesta
  • 192 bits
  • 160 bits
  • 128 bits
  • 96 bits

Pregunta 16

Pregunta
The simplest type of stream cipher, one in which one letter or character is exchanged for another, is known as what?
Respuesta
  • loop
  • lock
  • substitution
  • shift

Pregunta 17

Pregunta
The XOR cipher is based on the binary operation eXclusive OR that compares two bits.
Respuesta
  • True
  • False

Pregunta 18

Pregunta
What alternative term can be used to describe asymmetric cryptographic algorithms?
Respuesta
  • public key cryptography
  • user key cryptography
  • private key cryptography
  • cipher-text cryptography

Pregunta 19

Pregunta
What cryptographic method, first proposed in the mid-1980s, makes use of sloping curves instead of large prime numbers?
Respuesta
  • RSA
  • ECC
  • FCC
  • IKE

Pregunta 20

Pregunta
What is a block cipher algorithm that operates on 64-bit blocks and can have a key length from 32 to 448 bits?
Respuesta
  • Blowfish
  • Whirlpool
  • Rijndal
  • Twofish

Pregunta 21

Pregunta
What is the U.S. federal government standard for digital signatures?
Respuesta
  • Data Encryption Standard
  • Advanced Encryption Standard
  • Digital Signature Algorithm
  • Elliptic Curve Cryptography

Pregunta 22

Pregunta
What technology uses a chip on the motherboard of the computer to provide cryptographic services?
Respuesta
  • SEDs
  • TPM
  • FDE
  • HSM

Pregunta 23

Pregunta
What term best describes when cryptography is applied to entire disks instead of individual files or groups of files?
Respuesta
  • full disk encryption
  • system encryption
  • OS encryption
  • disk encryption

Pregunta 24

Pregunta
What term describes data actions being performed by endpoint devices, such as printing a report from a desktop computer?
Respuesta
  • data-in-transit
  • data-at-rest
  • data-in-use
  • data-in-play

Pregunta 25

Pregunta
What type of cipher takes one character and replaces it with one character, working one character at a time?
Respuesta
  • block cipher
  • unit cipher
  • single cipher
  • stream cipher

Pregunta 26

Pregunta
What type of cryptographic algorithm creates a unique digital fingerprint of a set of data?
Respuesta
  • hash
  • block
  • digest
  • key

Pregunta 27

Pregunta
What type of cryptography uses two keys instead of just one, generating both a private and a public key?
Respuesta
  • shared
  • asymmetric
  • symmetric
  • open

Pregunta 28

Pregunta
What type of message authentication code uses hashing to authenticate the sender by using both a hash function and a secret cryptographic key?
Respuesta
  • RIPEMD
  • HMAC
  • SHA-384
  • MD5

Pregunta 29

Pregunta
What widely used commercial asymmetric cryptography software can be used for encrypting files and email messages?
Respuesta
  • PGP
  • GPG
  • EFS
  • GNUPG

Pregunta 30

Pregunta
When Bob needs to send Alice a message with a digital signature, whose private key is used to encrypt the hash?
Respuesta
  • Bob's private key
  • Bob and Alice's keys
  • Alice's private key
  • Bob's private key and Alice's public key

Pregunta 31

Pregunta
Which hash algorithm's primary design feature is two different and independent parallel chains of computation, the results of which are then combined at the end of the process?
Respuesta
  • HMAC
  • RIPEMD
  • SHA-384
  • MD5

Pregunta 32

Pregunta
Which key exchange requires Alice and Bob to each agree upon a large prime number and related integer?
Respuesta
  • Prime-Curve
  • Quantum Prime
  • Elliptic Curve Diffie-Hellman
  • Diffie-Hellman

Pregunta 33

Pregunta
Which of the following are considered to be common asymmetric cryptographic algorithms? (Choose all that apply.)
Respuesta
  • Digital Signature Algorithm
  • Elliptic Curve Cryptography
  • Data Encryption Standard
  • Advanced Encryption Standard

Pregunta 34

Pregunta
Which of the following asymmetric cryptography algorithms is most commonly used?
Respuesta
  • AES
  • Blowfish
  • RSA
  • Twofish

Pregunta 35

Pregunta
Which of the following is a public key system that generates random public keys that are different for each session?
Respuesta
  • public secrecy
  • ephemeral-secrecy
  • random-key exchange
  • perfect forward secrecy

Pregunta 36

Pregunta
Which of the following is more secure than software encryption?
Respuesta
  • hardware encryption
  • full disk encryption
  • private encryption
  • application encryption

Pregunta 37

Pregunta
Which of the following is not one of the functions of a digital signature?
Respuesta
  • verification of the sender
  • protect the public key
  • prove the integrity of the message
  • prevention of the sender from disowning the message

Pregunta 38

Pregunta
Which standard was approved by NIST in late 2000 as a replacement for DES?
Respuesta
  • AES
  • Twofish
  • RSA
  • 3DES

Pregunta 39

Pregunta
Which type of cryptographic algorithm takes an input string of any length, and returns a string of any requested variable length?
Respuesta
  • sponge
  • block
  • substitution
  • loop

Pregunta 40

Pregunta
Wireless data networks are particularly susceptible to known ciphertext attacks.
Respuesta
  • True
  • False
Mostrar resumen completo Ocultar resumen completo

Similar

CCNA Security 210-260 IINS - Exam 3
Mike M
Application of technology in learning
Jeff Wall
Innovative Uses of Technology
John Marttila
Ch1 - The nature of IT Projects
mauricio5509
The Internet
Gee_0599
SQL Quiz
R M
CCNA Answers – CCNA Exam
Abdul Demir
Professional, Legal, and Ethical Issues in Information Security
mfundo.falteni
System Analysis
R A
Flash Cards Networks
JJ Pro Wrestler
EDUC260- Multimodal Literacies for a Digital Age
angelwoo2002