Lab 8 Assessment Quiz

24 July 2022
4.7 (114 reviews)
40 test answers

Unlock all answers in this set

Unlock answers (36)
question
Betty receives a cipher text message from her colleague Tim. What type of function does Betty need to use to read the plaintext message?
answer
Decryption
question
Alice and Bob would like to communicate with each other using a session key but they do not already have a shared secret key. Which algorithm can they use to exchange a secret key?
answer
Diffie-Hellman
question
Gary is sending a message to Patricia. He wants to ensure that nobody tampers with the message while it is in transit. What goal of cryptography is Gary attempting to achieve?
answer
Integrity
question
When Patricia receives a message from Gary, she wants to be able to demonstrate to Sue that the message actually came from Gary. What goal of cryptography is Patricia attempting to achieve?
answer
Non Repudiation
question
Which information security objective allows trusted entities to endorse information?
answer
Certification
question
Which approach to cryptography provides the strongest theoretical protection?
answer
Quantum cryptography
question
Which type of cipher works by rearranging the characters in a message?
answer
Transposition
question
Which set of characteristics describes the Caesar cipher accurately?
answer
Symmetric, stream, substitution
question
What is the only unbreakable cipher when it is used properly?
answer
Vernam
question
Which cryptographic attack offers cryptanalysts the most information about how an encryption algorithm works?
answer
Chosen plaintext
question
What mathematical problem forms the basis of most modern cryptographic algorithms?
answer
Factoring large primes
question
What is NOT an effective key distribution method for plaintext encryption keys?
answer
Unencrypted email
question
What type of function generates the unique value that corresponds to the contents of a message and is used to create a digital signature?
answer
Hash
question
Alice would like to send a message to Bob using a digital signature. What cryptographic key does Alice use to create the digital signature?
answer
Alice's private key
question
Bob received a message from Alice that contains a digital signature. What cryptographic key does Bob use to verify the digital signature?
answer
Alice's public key
question
What is NOT a symmetric encryption algorithm?
answer
Rivest-Shamir-Adelman (RSA)
question
What is NOT a valid encryption key length for use with the Blowfish algorithm?
answer
512 bits
question
What standard is NOT secure and should never be used on modern wireless networks?
answer
Wired Equivalent Privacy (WEP)
question
Which of the following allows a certificate authority (CA) to revoke a compromised digital certificate in real time?
answer
Online Certificate Status Protocol (OCSP)
question
Alice would like to send a message to Bob securely and wishes to encrypt the contents of the message. What key does she use to encrypt this message?
answer
Bobs public key
question
You must always use the same algorithm to encrypt information and decrypt the same information.
answer
False
question
An algorithm is a repeatable process that produces the same result when it receives the same input.
answer
True
question
A private key cipher is also called an asymmetric key cipher.
answer
False
question
The Diffie-Hellman (DHE) algorithm is the basis for several common key exchange protocols, including Diffie-Hellman in Ephemeral mode (DHE) and Elliptic Curve DHE (ECDHE).
answer
True
question
A physical courier delivering an asymmetric key is an example of in-band key exchange.
answer
True
question
Message authentication confirms the identity of the person who started a correspondence.
answer
False
question
A person demonstrates anonymity when posting information to a web discussion site without authorities knowing who he or she is.
answer
True
question
A substitution cipher replaces bits, characters, or blocks of information with other bits, characters, or blocks.
answer
True
question
A keyword mixed alphabet cipher uses a cipher alphabet that consists of a keyword, minus duplicates, followed by the remaining letters of the alphabet.
answer
True
question
Integrity-checking tools use cryptographic methods to make sure nothing and no one has modified the software.
answer
True
question
In a known-plaintext attack (KPA), the cryptanalyst has access only to a segment of encrypted data, and has no choice as to what that data might be.
answer
False
question
In a chosen-ciphertext attack, cryptanalysts submit data coded with the same cipher and key they are trying to break to the decryption device to see either the plaintext output or the effect the decrypted message has on some system.
answer
True
question
Digital signatures require asymmetric key cryptography.
answer
True
question
Cryptographic key distribution is typically done by phone.
answer
False
question
A salt value is a set of random characters you can combine with an actual input key to create the encryption key.
answer
True
question
The term certificate authority (CA) refers to a trusted repository of all public keys.
answer
False
question
Product cipher is an encryption algorithm that has no corresponding decryption algorithm.
answer
False
question
A digitized signature is a combination of a strong hash of a message and a secret key.
answer
False
question
The hash message authentication code (HMAC) is a hash function that uses a key to create a hash, or message digest.
answer
True
question
The financial industry created the ANSI X9.17 standard to define key management procedures.
answer
True