Ch 3

24 July 2022
4.7 (114 reviews)
20 test answers

Unlock all answers in this set

Unlock answers (16)
question
When Bob needs to send Alice a message with a digital signature, whose private key is used to encrypt the hash?
answer
bob's private key
question
Which standard was approved by NIST in late 2000 as a replacement for DES?
answer
AES
question
Which of the following is a public key system that generates random public keys that are different for each session?
answer
perfect forward secrecy
question
In which type of encryption is the same key used to encrypt and decrypt data?
answer
symmetric
question
What cryptographic method, first proposed in the mid-1980s, makes use of sloping curves instead of large prime numbers?
answer
ECC
question
Which of the following is not one of the functions of a digital signature?
answer
protect the public key
question
What type of cipher takes one character and replaces it with one character, working one character at a time?
answer
stream cipher
question
Which key exchange requires Alice and Bob to each agree upon a large prime number and related integer?
answer
Diffie-Hellman
question
What alternative term can be used to describe asymmetric cryptographic algorithms?
answer
public key cryptography
question
Which of the following are considered to be common asymmetric cryptographic algorithms? (Choose all that apply.)
answer
Elliptic Curve Cyptography Digital Signature Algorithm
question
In information technology, non-repudiation is the process of proving that a user performed an action.
answer
True
question
Encryption is the practice of transforming information so that it is secure and cannot be accessed by unauthorized parties.
answer
False
question
Ciphertext is the scrambled and unreadable output of encryption.
answer
True
question
Asymmetric cryptographic algorithms are also known as private key cryptography.
answer
False
question
Wireless data networks are particularly susceptible to known ciphertext attacks.
answer
True
question
Obfuscation is making something well known or clear.
answer
False
question
The XOR cipher is based on the binary operation eXclusive OR that compares two bits.
answer
True
question
One of the first popular symmetric cryptography algorithms was RSA.
answer
False
question
A collision attack is an attempt to find two input strings of a hash function that produce the same hash result.
answer
True
question
GNU Privacy Guard a proprietary software that runs on different operating systems.
answer
False