Chapter 3 Flashcards
Combo: Quiz 3 plus Book End of Chapter Questions
The Hashed Message Authentication code (HMAC) __________.
a. encrypts only the message
b. encrypts only the key
c. encrypts the key and the message
d. encrypts the DHE key only
c. encrypts the key and the message
What is the latest version of the Secure Hash Algorithm?
a. SHA-2
b. SHA-3
c. SHA-4
d. SHA-5
b. SHA-3
Alexel was given a key to a substitution cipher. The key showed that the entire alphabet was rotated 13 steps. What type of cipher is this?
a. AES
b. XANDA13
c. ROT13
d. Alphabetic
c. ROT13
Abram was asked to explain to one of his coworkers the XOR cipher. he showed his coworkers and example of adding two bits, 1 and 1. What is the result of this sum?
a. 2
b. 1
c. 0
d. 16
c. 0
Which of the following key exchanges uses the same keys each time?
a. Diffe-Hellman-RSA (DHRSA)
b. Diffe-Hellman Ephemeral (DHE)
c. Diffe-Hellman (DH)
d. Ellipic-Curve Diffe-Hellman (ECDH)
c. Diffe-Hellman (DH)
Public key systems that are different for each session are called __________.
a. Public Key Exchange (PKE)
b. perfect forward secrecy
c. Elliptic Curve Diffe-Hellman (ECDH)
d. Diffe-Hellman (DH)
b. perfect forward secrecy
What is data called that is to be encrypted by imputing it into a cryptographic algorithm?
a. Opentext
b. Plaintext
c. Cleartext
d. Ciphertext
b. Plaintext
Which of these is NOT a basic security protection for information that cryptography can provide/
a. Authenticity
b. Risk Loss
c. Integrity
d. Ciphertext
b. Risk Loss
Which areas of a file CANNOT be used by steganography to hide data?
a. In areas that contain the content data itself
b. In the file header fields that describes the file
c. In data that is used to describe the content or structure of the actual data
d. In the directory structure of the file system
d. In the directory structure of the file system
Proving that a user sent an email message is known as ___________.
a. Non-repudiation
b. Repudiation
c. Integrity
d. Availability
a. Non-repudiation
A(n) __________ is not decrypted but is only used for comparison purposes.
a. Key
b. Stream
c. Digest
d. Algorithm
c. Digest
Which of these is NOT a characteristic of a secure hash algorithm?
a. Collision should be rare.
b. A message cannot be produced from a predefined hash.
c. The results of a hash function should not be reversed.
d. The hash should always be the same fixed size.
a. Collision should be rare.
Alyosha was explaining to a friend the importance of protecting a cryptographic key from cryptoanalysis. He said that the key should not relate in a simple way to the cipher text. Which protection is Alyosha describing?
a. Diffusion
b. Confusion
c. Integrity
d. Chaos
b. Confusion
Which of the these is the strongest symmetric cryptographic algorithm?
a. Data Encryption Standard
b. Triple Data Encryption Standard
c. Advanced Encryption Standard
d. RC1
c. Advanced Encryption Standard
If Bob wants to send a secure message to Alice using a asymmetric algorithm, which key does he use to encrypt the message?
a. Alice’s private key
b. Bob’s public key
c. Alice’s public key
d. Bob’s private key
c. Alice’s public key