Ch. 6 Flashcards
(10 cards)
John recently received an email message from Bill. What cryptographic goal would need to be met to convince John that Bill was actually the sender of the message? A. nonrepudiation B. confidentiality C. availability D. integrity
A. Nonrepudiation
What type of cipher relies on changing the location of characters within a message to achieve confidentiality? A. Stream cipher B. Transposition Cipher C. Block Cipher D. Substitution Cipher
B. Transposition Cipher
Which one of the following cannot be achieved by a secret key cryptosystem? A. Nonrepudiation B. Confidentiality C. Authentication D. Key Distribution
A. Nonrepudiation
When correctly implemented, what is the only cryptosystem known to be unbreakable? A. Transposition Cipher B. Substitution Cipher C. Advanced Encryption Standard D. One-time pad
D. One-time pad
Which one of the following cipher types operates on large pieces of a message rather than individual characters or bits of a message? A. Stream Cipher B. Ceaser Cipher C. Block Cipher D. ROT3 Cipher
C. Block Cipher
Which statement is true of symmetric cryptography?
A. Symmetric cryptography is faster than asymmetric cryptography.
B. Symmetric cryptography uses different keys to encrypt and decrypt messages
C. Symmetric cryptography does not require a secure mechanism to properly deliver keys.
D. Symmetric cryptography provides better security compared to asymmetric cryptography
A. Symmetric Cryptography is faster than asymmetric cryptography.
You are preparing for management about the value of using cryptography to protect your network. Which statement is true of cryptography?
A. The keys in cryptography can be made public
B. Cryptography is used to detect fraudulent disclosures
C. Availability is a primary concern of cryptography
D. Key management is a primary concern of cryptography.
D. Key management is a primary concern of cryptography
Which cipher type replaces the original text in a message with a different text? A. Block cipher B. Stream cipher C. Substitution Cipher D. Transposition Cipher
C. Substitution Cipher
You need to decrypt a file that is encrypted using asymmetric encryption. What should be used to decrypt the file? A. Message digest B. Plaintext C. Private Key D. Public Key
C. Private key
How many keys are required to fully implement a symmetric algorithm with 10 participants? A. 10 B. 20 C. 45 D. 100
45