A collision attack is an attempt to find two input strings of a hash function that produce the same hash result.
After the DES cipher was broken and no longer considered secure, what encryption algorithm was made as its successor?
AES
RSA
Twofish
3DES
Asymmetric cryptographic algorithms are also known as private key cryptography.
Ciphertext is the scrambled and unreadable output of encryption.
Data that is in an unencrypted form is referred to as which of the following?
plain text
crypttext
cleartext
simpletext
Encryption is the practice of transforming information so that it is secure and cannot be accessed by unauthorized parties.
GNU Privacy Guard a proprietary software that runs on different operating systems.
If Bob receives an encrypted reply message from Alice, whose private key is used to decrypt the received message?
Alice's private key
Bob's private key
Bob's private key and Alice's public key
Bob and Alice's keys
If using the MD5 hashing algorithm, what is the length to which each message is padded?
64 bits
128 bits
32 bits
512 bits
In cryptography, which of the five basic protections ensures that the information is correct and no unauthorized person or malicious software has altered that data?
confidentiality
encryption
availability
integrity
In information technology, non-repudiation is the process of proving that a user performed an action.
In which type of encryption is the same key used to encrypt and decrypt data?
public
asymmetric
symmetric
private
Obfuscation is making something well known or clear.
One of the first popular symmetric cryptography algorithms was RSA.
The SHA-1 hashing algorithm creates a digest that is how many bits in length?.
192 bits
160 bits
96 bits
The simplest type of stream cipher, one in which one letter or character is exchanged for another, is known as what?
loop
lock
substitution
shift
The XOR cipher is based on the binary operation eXclusive OR that compares two bits.
What alternative term can be used to describe asymmetric cryptographic algorithms?
public key cryptography
user key cryptography
private key cryptography
cipher-text cryptography
What cryptographic method, first proposed in the mid-1980s, makes use of sloping curves instead of large prime numbers?
ECC
FCC
IKE
What is a block cipher algorithm that operates on 64-bit blocks and can have a key length from 32 to 448 bits?
Blowfish
Whirlpool
Rijndal
What is the U.S. federal government standard for digital signatures?
Data Encryption Standard
Advanced Encryption Standard
Digital Signature Algorithm
Elliptic Curve Cryptography
What technology uses a chip on the motherboard of the computer to provide cryptographic services?
SEDs
TPM
FDE
HSM
What term best describes when cryptography is applied to entire disks instead of individual files or groups of files?
full disk encryption
system encryption
OS encryption
disk encryption
What term describes data actions being performed by endpoint devices, such as printing a report from a desktop computer?
data-in-transit
data-at-rest
data-in-use
data-in-play
What type of cipher takes one character and replaces it with one character, working one character at a time?
block cipher
unit cipher
single cipher
stream cipher
What type of cryptographic algorithm creates a unique digital fingerprint of a set of data?
hash
block
digest
key
What type of cryptography uses two keys instead of just one, generating both a private and a public key?
shared
open
What type of message authentication code uses hashing to authenticate the sender by using both a hash function and a secret cryptographic key?
RIPEMD
HMAC
SHA-384
MD5
What widely used commercial asymmetric cryptography software can be used for encrypting files and email messages?
PGP
GPG
EFS
GNUPG
When Bob needs to send Alice a message with a digital signature, whose private key is used to encrypt the hash?
Which hash algorithm's primary design feature is two different and independent parallel chains of computation, the results of which are then combined at the end of the process?
Which key exchange requires Alice and Bob to each agree upon a large prime number and related integer?
Prime-Curve
Quantum Prime
Elliptic Curve Diffie-Hellman
Diffie-Hellman
Which of the following are considered to be common asymmetric cryptographic algorithms? (Choose all that apply.)
Which of the following asymmetric cryptography algorithms is most commonly used?
Which of the following is a public key system that generates random public keys that are different for each session?
public secrecy
ephemeral-secrecy
random-key exchange
perfect forward secrecy
Which of the following is more secure than software encryption?
hardware encryption
private encryption
application encryption
Which of the following is not one of the functions of a digital signature?
verification of the sender
protect the public key
prove the integrity of the message
prevention of the sender from disowning the message
Which standard was approved by NIST in late 2000 as a replacement for DES?
Which type of cryptographic algorithm takes an input string of any length, and returns a string of any requested variable length?
sponge
Wireless data networks are particularly susceptible to known ciphertext attacks.