Ch. 6 Flashcards

(10 cards)

1
Q
John recently received an email message from Bill. What cryptographic goal would need to be met to convince John that Bill was actually the sender of the message?
A. nonrepudiation
B. confidentiality
C. availability
D. integrity
A

A. Nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
What type of cipher relies on changing the location of characters within a message to achieve confidentiality?
A. Stream cipher
B. Transposition Cipher
C. Block Cipher
D. Substitution Cipher
A

B. Transposition Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Which one of the following cannot be achieved by a secret key cryptosystem?
A. Nonrepudiation
B. Confidentiality
C. Authentication
D. Key Distribution
A

A. Nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
When correctly implemented, what is the only cryptosystem known to be unbreakable?
A. Transposition Cipher
B. Substitution Cipher
C. Advanced Encryption Standard
D. One-time pad
A

D. One-time pad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Which one of the following cipher types operates on large pieces of a message rather than individual characters or bits of a message?
A. Stream Cipher
B. Ceaser Cipher
C. Block Cipher
D. ROT3 Cipher
A

C. Block Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which statement is true of symmetric cryptography?
A. Symmetric cryptography is faster than asymmetric cryptography.
B. Symmetric cryptography uses different keys to encrypt and decrypt messages
C. Symmetric cryptography does not require a secure mechanism to properly deliver keys.
D. Symmetric cryptography provides better security compared to asymmetric cryptography

A

A. Symmetric Cryptography is faster than asymmetric cryptography.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You are preparing for management about the value of using cryptography to protect your network. Which statement is true of cryptography?
A. The keys in cryptography can be made public
B. Cryptography is used to detect fraudulent disclosures
C. Availability is a primary concern of cryptography
D. Key management is a primary concern of cryptography.

A

D. Key management is a primary concern of cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Which cipher type replaces the original text in a message with a different text?
A. Block cipher
B. Stream cipher
C. Substitution Cipher
D. Transposition Cipher
A

C. Substitution Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
You need to decrypt a file that is encrypted using asymmetric encryption. What should be used to decrypt the file?
A. Message digest
B. Plaintext
C. Private Key
D. Public Key
A

C. Private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
How many keys are required to fully implement a symmetric algorithm with 10 participants?
A. 10
B. 20
C. 45
D. 100
A

45

How well did you know this?
1
Not at all
2
3
4
5
Perfectly