C Danvers
Quiz by , created more than 1 year ago

Ch 3 quiz

1782
0
0
C Danvers
Created by C Danvers about 6 years ago
Close

Ch 3 - Basic Cryptography

Question 1 of 40

1

A collision attack is an attempt to find two input strings of a hash function that produce the same hash result.

Select one of the following:

  • True
  • False

Explanation

Question 2 of 40

1

After the DES cipher was broken and no longer considered secure, what encryption algorithm was made as its successor?

Select one of the following:

  • AES

  • RSA

  • Twofish

  • 3DES

Explanation

Question 3 of 40

1

Asymmetric cryptographic algorithms are also known as private key cryptography.

Select one of the following:

  • True
  • False

Explanation

Question 4 of 40

1

Ciphertext is the scrambled and unreadable output of encryption.

Select one of the following:

  • True
  • False

Explanation

Question 5 of 40

1

Data that is in an unencrypted form is referred to as which of the following?

Select one of the following:

  • plain text

  • crypttext

  • cleartext

  • simpletext

Explanation

Question 6 of 40

1

Encryption is the practice of transforming information so that it is secure and cannot be accessed by unauthorized parties.

Select one of the following:

  • True
  • False

Explanation

Question 7 of 40

1

GNU Privacy Guard a proprietary software that runs on different operating systems.

Select one of the following:

  • True
  • False

Explanation

Question 8 of 40

1

If Bob receives an encrypted reply message from Alice, whose private key is used to decrypt the received message?

Select one of the following:

  • Alice's private key

  • Bob's private key

  • Bob's private key and Alice's public key

  • Bob and Alice's keys

Explanation

Question 9 of 40

1

If using the MD5 hashing algorithm, what is the length to which each message is padded?

Select one of the following:

  • 64 bits

  • 128 bits

  • 32 bits

  • 512 bits

Explanation

Question 10 of 40

1

In cryptography, which of the five basic protections ensures that the information is correct and no unauthorized person or malicious software has altered that data?

Select one of the following:

  • confidentiality

  • encryption

  • availability

  • integrity

Explanation

Question 11 of 40

1

In information technology, non-repudiation is the process of proving that a user performed an action.

Select one of the following:

  • True
  • False

Explanation

Question 12 of 40

1

In which type of encryption is the same key used to encrypt and decrypt data?

Select one of the following:

  • public

  • asymmetric

  • symmetric

  • private

Explanation

Question 13 of 40

1

Obfuscation is making something well known or clear.

Select one of the following:

  • True
  • False

Explanation

Question 14 of 40

1

One of the first popular symmetric cryptography algorithms was RSA.

Select one of the following:

  • True
  • False

Explanation

Question 15 of 40

1

The SHA-1 hashing algorithm creates a digest that is how many bits in length?.

Select one of the following:

  • 192 bits

  • 160 bits

  • 128 bits

  • 96 bits

Explanation

Question 16 of 40

1

The simplest type of stream cipher, one in which one letter or character is exchanged for another, is known as what?

Select one of the following:

  • loop

  • lock

  • substitution

  • shift

Explanation

Question 17 of 40

1

The XOR cipher is based on the binary operation eXclusive OR that compares two bits.

Select one of the following:

  • True
  • False

Explanation

Question 18 of 40

1

What alternative term can be used to describe asymmetric cryptographic algorithms?

Select one of the following:

  • public key cryptography

  • user key cryptography

  • private key cryptography

  • cipher-text cryptography

Explanation

Question 19 of 40

1

What cryptographic method, first proposed in the mid-1980s, makes use of sloping curves instead of large prime numbers?

Select one of the following:

  • RSA

  • ECC

  • FCC

  • IKE

Explanation

Question 20 of 40

1

What is a block cipher algorithm that operates on 64-bit blocks and can have a key length from 32 to 448 bits?

Select one of the following:

  • Blowfish

  • Whirlpool

  • Rijndal

  • Twofish

Explanation

Question 21 of 40

1

What is the U.S. federal government standard for digital signatures?

Select one of the following:

  • Data Encryption Standard

  • Advanced Encryption Standard

  • Digital Signature Algorithm

  • Elliptic Curve Cryptography

Explanation

Question 22 of 40

1

What technology uses a chip on the motherboard of the computer to provide cryptographic services?

Select one of the following:

  • SEDs

  • TPM

  • FDE

  • HSM

Explanation

Question 23 of 40

1

What term best describes when cryptography is applied to entire disks instead of individual files or groups of files?

Select one of the following:

  • full disk encryption

  • system encryption

  • OS encryption

  • disk encryption

Explanation

Question 24 of 40

1

What term describes data actions being performed by endpoint devices, such as printing a report from a desktop computer?

Select one of the following:

  • data-in-transit

  • data-at-rest

  • data-in-use

  • data-in-play

Explanation

Question 25 of 40

1

What type of cipher takes one character and replaces it with one character, working one character at a time?

Select one of the following:

  • block cipher

  • unit cipher

  • single cipher

  • stream cipher

Explanation

Question 26 of 40

1

What type of cryptographic algorithm creates a unique digital fingerprint of a set of data?

Select one of the following:

  • hash

  • block

  • digest

  • key

Explanation

Question 27 of 40

1

What type of cryptography uses two keys instead of just one, generating both a private and a public key?

Select one of the following:

  • shared

  • asymmetric

  • symmetric

  • open

Explanation

Question 28 of 40

1

What type of message authentication code uses hashing to authenticate the sender by using both a hash function and a secret cryptographic key?

Select one of the following:

  • RIPEMD

  • HMAC

  • SHA-384

  • MD5

Explanation

Question 29 of 40

1

What widely used commercial asymmetric cryptography software can be used for encrypting files and email messages?

Select one of the following:

  • PGP

  • GPG

  • EFS

  • GNUPG

Explanation

Question 30 of 40

1

When Bob needs to send Alice a message with a digital signature, whose private key is used to encrypt the hash?

Select one of the following:

  • Bob's private key

  • Bob and Alice's keys

  • Alice's private key

  • Bob's private key and Alice's public key

Explanation

Question 31 of 40

1

Which hash algorithm's primary design feature is two different and independent parallel chains of computation, the results of which are then combined at the end of the process?

Select one of the following:

  • HMAC

  • RIPEMD

  • SHA-384

  • MD5

Explanation

Question 32 of 40

1

Which key exchange requires Alice and Bob to each agree upon a large prime number and related integer?

Select one of the following:

  • Prime-Curve

  • Quantum Prime

  • Elliptic Curve Diffie-Hellman

  • Diffie-Hellman

Explanation

Question 33 of 40

1

Which of the following are considered to be common asymmetric cryptographic algorithms? (Choose all that apply.)

Select one or more of the following:

  • Digital Signature Algorithm

  • Elliptic Curve Cryptography

  • Data Encryption Standard

  • Advanced Encryption Standard

Explanation

Question 34 of 40

1

Which of the following asymmetric cryptography algorithms is most commonly used?

Select one of the following:

  • AES

  • Blowfish

  • RSA

  • Twofish

Explanation

Question 35 of 40

1

Which of the following is a public key system that generates random public keys that are different for each session?

Select one of the following:

  • public secrecy

  • ephemeral-secrecy

  • random-key exchange

  • perfect forward secrecy

Explanation

Question 36 of 40

1

Which of the following is more secure than software encryption?

Select one of the following:

  • hardware encryption

  • full disk encryption

  • private encryption

  • application encryption

Explanation

Question 37 of 40

1

Which of the following is not one of the functions of a digital signature?

Select one of the following:

  • verification of the sender

  • protect the public key

  • prove the integrity of the message

  • prevention of the sender from disowning the message

Explanation

Question 38 of 40

1

Which standard was approved by NIST in late 2000 as a replacement for DES?

Select one of the following:

  • AES

  • Twofish

  • RSA

  • 3DES

Explanation

Question 39 of 40

1

Which type of cryptographic algorithm takes an input string of any length, and returns a string of any requested variable length?

Select one of the following:

  • sponge

  • block

  • substitution

  • loop

Explanation

Question 40 of 40

1

Wireless data networks are particularly susceptible to known ciphertext attacks.

Select one of the following:

  • True
  • False

Explanation