Chapter 5

24 July 2022
4.7 (114 reviews)
30 test answers

Unlock all answers in this set

Unlock answers (26)
question
Which of these is the strongest symmetric cryptographic algorithm? A) Advanced Encryption Standard B) Data Encryption Standard C) Triple Data Encryption Standard D) Rivest Cipher (RC) 1
answer
Advanced Encryption Standard
question
Elliptic Curve Diffie-Hellman (ECDH) is an example of _____. A) in-band key exchange B) out-of-band key exchange C) SHA-1 key management D) AES key certification
answer
in-band key exchange
question
Public key systems that generate random public keys that are different for each session are called _____. A) Public Key Exchange (PKE) B) Elliptic Curve Diffie-Hellman (ECDH) C) Diffie-Hellman (DH) D) perfect forward secrecy
answer
perfect forward secrecy
question
Which protection is provided by hashing? A) authenticity B) confidentiality C) integrity D) availability
answer
integrity
question
Which of the following key exchanges uses the same keys each time? A) Diffie-Hellman Ephemeral (DHE) B) Diffie-Hellman (DH) C) Diffie-Hellman-RSA (DHRSA) D) Elliptic Curve Diffie-Hellman (ECDH)
answer
Diffie-Hellman (DH)
question
All of the following can be broken mathematically EXCEPT _____. A) AES B) 3DES C) SHA D) OTP
answer
OTP
question
Which of these is NOT a characteristic of a secure hash algorithm? A) Collisions should be rare. B) The results of a hash function should not be reversed. C) The hash should always be the same fixed size. D) A message cannot be produced from a predefined hash.
answer
Collisions should be rare.
question
What is data called that is to be encrypted by inputting it into an cryptographic algorithm? A) plaintext B) cleartext C) opentext D) ciphertext
answer
plaintext
question
A digital signature can provide each of the following benefits EXCEPT _____. A) prove the integrity of the message B) verify the receiver C) verify the sender D) enforce nonrepudiation
answer
verify the receiver
question
Which of these is NOT a basic security protection for information that cryptography can provide? A) risk loss B) integrity C) confidentiality D) authenticity
answer
risk loss
question
A(n) _____ is not decrypted but is only used for comparison purposes. A) stream B) digest C) algorithm D) key
answer
digest
question
The Hashed Message Authentication Code (HMAC) _____. A) encrypts only the key B) encrypts the key and the message C) encrypts only the message D) encrypts the DHE key only
answer
encrypts the key and the message
question
What are the latest versions of the Secure Hash Algorithm? (pick two) A) SHA-2 B) SHA-3 C) SHA-4 D) SHA-5
answer
SHA-2 & SHA-3
question
Which asymmetric encryption algorithm uses prime numbers? A) EFS B) quantum computing C) ECC D) RSA
answer
RSA
question
The Trusted Platform Module (TPM) _____. A) allows the user to boot a corrupted disk and repair it B) is available only on Windows computers running BitLocker C) includes a pseudorandom number generator (PRNG) D) provides cryptographic services in hardware instead of software
answer
provides cryptographic services in hardware instead of software
question
Which of these has an onboard key generator and key storage facility, as well as accelerated symmetric and asymmetric encryption, and can back up sensitive material in encrypted form? A) Trusted Platform Module (TPM) B) self-encrypting hard disk drives (HDDs) C) encrypted hardware-based USB devices D) Hardware Security Module (HSM)
answer
Hardware Security Module (HSM)
question
Proving that a user sent an email message is known as _____. A) repudiation B) integrity C) non-repudiation D) availability
answer
non-repudiation
question
The areas of a file in which steganography can hide data include all of the following EXCEPT _____. A) in data that is used to describe the content or structure of the actual data B) in the directory structure of the file system C) in the file header fields that describe the file D) in areas that contain the content data itself
answer
in the directory structure of the file system
question
Which asymmetric cryptographic algorithm is the most secure? A) SHA-2 B) BTC-2 C) RSA D) ME-14
answer
RSA
question
If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message? A) Alice's private key B) Alice's public key C) Bob's public key D) Bob's private key
answer
Alice's public key
question
What is the name of the cryptographic hash function that has international recognition and has been adopted by standards organizations such as the ISO, that creates a digest of 512 bits and will not be subject to patents? A) Twofish B) Blowfish C) Whirlpool D) Rijndal
answer
Whirlpool
question
After the DES cipher was broken and no longer considered secure, what encryption algorithm was made as its successor? A) AES B) Twofish C) 3DES D) RSA
answer
3DES
question
In cryptography, which of the five basic protections ensures that the information is correct and no unauthorized person or malicious software has altered that data? A) Confidentiality B) Availability C) Encryption D) Integrity
answer
Integrity
question
Why is a homoalphabetic substitution considered a stream cipher? A) It has the ability to make use of block cipher or stream cipher B) It encrypts multiple plaintext character into a single hexadecimal character C) It substitutes multiple characters at once, but the character length is not fixed D) It encrypts one plaintext character at a time
answer
It encrypts one plaintext character at a time
question
Which type of cryptographic algorithm takes an input string of any length, and returns a string of any requested variable length? A) Substitution B) Block C) Loop D) Sponge
answer
Sponge
question
The asymmetric cryptography algorithm most commonly used is: A) AES B) RSA C) Twofish D) Blowfish
answer
RSA
question
Which of the following is NOT a benefit of USB device encryption? A) Administrators can initiate a self-destruct command to eliminate data B) Administrators can lock a user out of the device during the next connection C) Files moved to the USB are automatically encrypted D) The USB device can encrypt the hard drive of an attacker when they attempt to access data
answer
The USB device can encrypt the hard drive of an attacker when they attempt to access data
question
How does SHA-1 differ from the MD4 algorithm? A) MD4 can process 64 bits at a time B) Generally, SHA is considered a more secure hash than MD C) MD4 creates a digest length of 128 bit whereas SHA-1's digest length is 160 bits D) Flaws have not yet been discovered in the MD4 algorithm
answer
MD4 creates a digest length of 128 bit whereas SHA-1's digest length is 160 bits
question
A key that is generated by a symmetric cryptographic algorithm is said to be a: A) private key B) public key C) symmetric key D) shared key
answer
private key
question
Using asymmetric cryptography practices, Alex wants to send Jessica an encrypted message that he received from Joel. Additionally, Jessica wants to verify the message came from Alex by viewing his digital signature. Whose keys would be used for what in this scenario? A) Joel's public key would encrypt the message, Joel's private key would decrypt the message, Alex's private key would be used to encrypt the digest, and Alex's public key would be used by Jessica to decrypt the digest. B) Alex's public key will encrypt the message, Alex's private key would be used by Jessica to view the message, Jessica's public key would be used to encrypt the digest, and Jessica's private key would be used to decrypt the digest. C) Joel's public key would encrypt the message, Joel's private key would decrypt the message, Alex's public key would be used to encrypt the digest, and Alex's private key would be used by Jessica to decrypt the digest. D) Jessica's public key will encrypt the message, Jessica's private key would be used to view the message, Alex's private key would be used to encrypt the digest, and Alex's public key would be used by Jessica to decrypt the digest.
answer
Jessica's public key will encrypt the message, Jessica's private key would be used to view the message, Alex's private key would be used to encrypt the digest, and Alex's public key would be used by Jessica to decrypt the digest.