quiz 12 Flashcards

1
Q

Cryptography is the practice of hiding information.

A

True—The general definition for cryptography is the practice of hiding information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Encryption is a type of cipher

A

False—Encryption is the process of changing information using a cipher or algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A key is an essential piece of information that determines the output of a cipher

A

True—The key is indispensable, without it there would be no result to the cipher computation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Public keys are known only to specific users who keep the key secret.

A

False—Public keys are known to all parties involved in the encrypted transaction. Private keys are known only to a specific user or users who keep their keys secret.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Symmetric key algorithms are a type of cipher that uses identical or closely related keys.

A

True—The symmetric key algorithm is a class of cipher that uses identical or closely related keys for encryption and decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

. A stream cipher is a type of algorithm that encrypts a group of bits collectively as blocks.

A

False—A stream cipher is a type of algorithm that encrypts each byte in a message one at a time. Block ciphers encrypt a group of bits collectively as blocks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Symmetric key algorithms require a secure initial exchange of one or more secret keys

A

True—Symmetric key algorithms need to secure initial exchange of one or more secret keys between the sender and the receiver to work effectively

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Public key cryptography uses asymmetric keys alone or in addition to symmetric keys.

A

True—Public key cryptography doesn’t need to secure exchange of secret keys and generally uses asymmetric keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Steganography uses a certificate authority to manage keys

A

False—Steganography is the science of writing hidden messages; it is a form of security through obscurity and does not deal with keys or certificate authorities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DES is a commonly used block cipher.

A

False—DES is an older type of block cipher considered deprecated and has been replaced by other standards such as AES.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Which of the following is a common standard used today and relies on a 256-bit block size? 
A. AES 
B. DES 
C. Triple DES 
D. RC4
A

A. AES, the advanced encryption standard is a commonly used encryption type that can work with 128-, 192-, 256-bit block sizes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Which of the following is a stream cipher? 
A. DES 
B. RC 4 
C. AES 
D. RC 6
A

B. RC4 uses a stream cipher and is known for speed and simplicity. The rest of the answers use block ciphers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
Which of the following are asymmetric encryption algorithms? (Select the two best answers.) 
A. RSA 
B. RC6 
C. Diffie-Hellman 
D. AES
A

A and C. RSA and Diffie-Hellman are asymmetric encryption algorithms. RC6 and AES are symmetric encryption algorithms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Which of the following encryption algorithms is based on the structure of an elliptic curve? 
A. RSA 
B. ECC 
C. RC4 
D. One-time pad
A

B. Elliptic curve cryptography (ECC) is a type of public key cryptography based on the structure of an elliptic curve.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Which of the following types of encryption can encrypt plaintext with a secret random key that is the same length as the plaintext? 
A. PGP 
B. ECC 
C. One-time pad 
D. RSA
A

C. A one-time pad can be computed by hand with pencil and paper; it encrypts plaintext with a secret random key that is the same size as the plaintext to be encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
A summary of a file or message best describes which of the following? 
A. Hash function 
B. MD5 
C. Hash 
D. LANMAN
A

C. A hash is a summary of a file or message; hashes are used in digital signatures and file and message authentication.

17
Q
Which of the following employs a 160-bit hash? 
A. MD5 
B. SHA-1 
C. SHA-2 
D. NTLM
A

B. SHA-1 employs a 160-bit hash. MD5 is 128 bit. SHA-2 can be 256 bit or 512 bit.

18
Q
Within the birthday paradox, what is the probability that 2 people have the same birth date within a group of 23 people? 
A. 99% 
B. 100% 
C. 50% 
D. 23%
A

C. Within a group of 23 people, the birthday paradox states that there will be a 50% probability that 2 of those people will have the same birth date.

19
Q
Which of the following is the newest and strongest Windows hash? 
A. LANMAN 
B. NTLM 
C. NTLM2 
D. NTLM3
A

C. NTLM2 is the newest and strongest Windows hash. LANMAN and NTLM are deprecated, and there is no NTLM3 as of the writing of this manual.

20
Q
Which of the following is based off of the MD5 hash? 
A. LANMAN 
B. NTLM 
C. NTLM2 
D. SHA-1
A

C. NTLM2 is based off of the MD5 hash. NTLM uses the RC4 hash.