N_S Quiz 3

25 July 2022
4.7 (114 reviews)
50 test answers

Unlock all answers in this set

Unlock answers (46)
question
Hiding an object, such as a diary, to prevent others from finding it is an example of
answer
security through obscurity
question
An algorithm is a type of
answer
Procedure
question
An encryption algorithm that uses the same key for both encryption and decryption is
answer
Symetric
question
The type of cipher that rearranges the text of a message is called
answer
transposition
question
To use symmetric cryptography, the sender and receiver must share
answer
secret key
question
The Enigma was
answer
rotor machine
question
Gilbert Vernam's bit combination operation for encrypting digital teletype transfer is now referred to as
answer
XOR
question
The encryption procedure requires two inputs
answer
plain text, & key
question
The decryption procedure requires two inputs
answer
Cyphertext, & key
question
A one-time pad is said to be
answer
"Impossible to crack"
question
A cryptonet
answer
Two or more people share a key
question
The following are common ways to handle new encryption keys except
answer
Don't share common key, & using instant messaging
question
A file encryption program
answer
truncate
question
An Advanced Encryption Standard (AES) key may not be
answer
16 bits
question
When encrypting a file, a fully punctuated passphrase should have a minimum of ____ characters
answer
20 characters
question
Encrypting an encryption key using a passphrase is called
answer
keywrapping
question
Using the Diffie-Hellman algorithm
answer
public & private key
question
In a Diffie-Hellman calculation using P=g^s mod N, s is
answer
private key
question
Digital signatures are often used to provide
answer
nonrepudiation
question
A public-key certificate generally does not contain
answer
private key certificate
question
You should rekey an encryption key
answer
every 2-3 months, link to unauthorized party, & have large number changed more frequent
question
To avoid problems with reused encryption keys, you can
answer
change internal key used in generating, combine key with a nonce
question
A successful bit-flipping attack requires
answer
stream & knowledge of content of plain text
question
When encrypting a one-way hash or a secret encryption key with RSA, you must encrypt a value that contains more bits than the public key's N value. You can accomplish this by
answer
pad hash value, & have large hash key
question
Strategies for preventing man-in-the-middle attacks include
answer
use public key certificate, restrict distribution of public key, & publish individual keys widely
question
Encryption can help protect volumes in the following situations except
answer
damaged hard disk
question
Access control protects data on a computer against
answer
hostile users
question
File encryption protects data on a computer against the following except
answer
trojan cryptos
question
Volume encryption protects data on a computer against
answer
theft
question
When encrypting data with a block cipher, each repetition is called
answer
a round
question
The following are best practices or proper recommendations for choosing an encryption algorithm except
answer
DES
question
A shortcoming of block ciphers is
answer
block pattern
question
A self-encrypting drive locks data on the hard disk by
answer
erasing encryption on drive
question
The following are properties of persistent key storage except
answer
volatile
question
A volume can be
answer
whole drive partition, usb drive, entire drive
question
You can clean data from a hard drive by
answer
delete files & empty trash, disk wipe, physically damage HDD
question
Stream cipher modes include
answer
(Doesn't include cypher blocking combining)
question
Volume encryption risks include
answer
leaks plain text, untrust worthy encryption
question
A rootkit is
answer
provides back door
question
To launch a distributed denial of service (DDOS) attack, an attacker often uses
answer
a botnet
question
An advantage of packet switching is
answer
parallel transmission
question
Another term for "maximum data rate" is
answer
bandwidth
question
To see a list of MAC addresses on a Windows-based network
answer
ipconfig?
question
In a wireless transmission, a host first sends a
answer
...
question
Primary forms of Ethernet media include the following except
answer
Include wired, optical, & wireless
question
Three strategies for sending data across a network are
answer
Message switching, circuit switching, & packet switching
question
A basic network packet contains
answer
Address of the packet's sender, address of the packet's recipient, & control information to keep the recipient up to date on the status of transmissino
question
A MAC address
answer
(pg. 462, Also called an Ethernet address) Must be unique
question
Cipher block chaining (CBC) is a widely used cipher mode that requires plaintext to be a multiple of the cipher's block size
answer
If shorter, we must add padding.
question
A tweakable cipher includes a third input, a nonce-like value that modifies the encryption without the cost of changing the encryption key
answer
...