question

When Bob needs to send Alice a message with a digital signature, whose private key is used to encrypt the hash?

answer

bob's private key

question

Which standard was approved by NIST in late 2000 as a replacement for DES?

answer

AES

question

Which of the following is a public key system that generates random public keys that are different for each session?

answer

perfect forward secrecy

question

In which type of encryption is the same key used to encrypt and decrypt data?

answer

symmetric

question

What cryptographic method, first proposed in the mid-1980s, makes use of sloping curves instead of large prime numbers?

answer

ECC

question

Which of the following is not one of the functions of a digital signature?

answer

protect the public key

question

What type of cipher takes one character and replaces it with one character, working one character at a time?

answer

stream cipher

question

Which key exchange requires Alice and Bob to each agree upon a large prime number and related integer?

answer

Diffie-Hellman

question

What alternative term can be used to describe asymmetric cryptographic algorithms?

answer

public key cryptography

question

Which of the following are considered to be common asymmetric cryptographic algorithms? (Choose all that apply.)

answer

Elliptic Curve Cyptography
Digital Signature Algorithm

question

In information technology, non-repudiation is the process of proving that a user performed an action.

answer

True

question

Encryption is the practice of transforming information so that it is secure and cannot be accessed by unauthorized parties.

answer

False

question

Ciphertext is the scrambled and unreadable output of encryption.

answer

True

question

Asymmetric cryptographic algorithms are also known as private key cryptography.

answer

False

question

Wireless data networks are particularly susceptible to known ciphertext attacks.

answer

True

question

Obfuscation is making something well known or clear.

answer

False

question

The XOR cipher is based on the binary operation eXclusive OR that compares two bits.

answer

True

question

One of the first popular symmetric cryptography algorithms was RSA.

answer

False

question

A collision attack is an attempt to find two input strings of a hash function that produce the same hash result.

answer

True

question

GNU Privacy Guard a proprietary software that runs on different operating systems.

answer

False