Chapter 3 Flashcards

Combo: Quiz 3 plus Book End of Chapter Questions

1
Q

The Hashed Message Authentication code (HMAC) __________.

a. encrypts only the message
b. encrypts only the key
c. encrypts the key and the message
d. encrypts the DHE key only

A

c. encrypts the key and the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the latest version of the Secure Hash Algorithm?

a. SHA-2
b. SHA-3
c. SHA-4
d. SHA-5

A

b. SHA-3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Alexel was given a key to a substitution cipher. The key showed that the entire alphabet was rotated 13 steps. What type of cipher is this?

a. AES
b. XANDA13
c. ROT13
d. Alphabetic

A

c. ROT13

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Abram was asked to explain to one of his coworkers the XOR cipher. he showed his coworkers and example of adding two bits, 1 and 1. What is the result of this sum?

a. 2
b. 1
c. 0
d. 16

A

c. 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following key exchanges uses the same keys each time?

a. Diffe-Hellman-RSA (DHRSA)
b. Diffe-Hellman Ephemeral (DHE)
c. Diffe-Hellman (DH)
d. Ellipic-Curve Diffe-Hellman (ECDH)

A

c. Diffe-Hellman (DH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Public key systems that are different for each session are called __________.

a. Public Key Exchange (PKE)
b. perfect forward secrecy
c. Elliptic Curve Diffe-Hellman (ECDH)
d. Diffe-Hellman (DH)

A

b. perfect forward secrecy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is data called that is to be encrypted by imputing it into a cryptographic algorithm?

a. Opentext
b. Plaintext
c. Cleartext
d. Ciphertext

A

b. Plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of these is NOT a basic security protection for information that cryptography can provide/

a. Authenticity
b. Risk Loss
c. Integrity
d. Ciphertext

A

b. Risk Loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which areas of a file CANNOT be used by steganography to hide data?

a. In areas that contain the content data itself
b. In the file header fields that describes the file
c. In data that is used to describe the content or structure of the actual data
d. In the directory structure of the file system

A

d. In the directory structure of the file system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Proving that a user sent an email message is known as ___________.

a. Non-repudiation
b. Repudiation
c. Integrity
d. Availability

A

a. Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A(n) __________ is not decrypted but is only used for comparison purposes.

a. Key
b. Stream
c. Digest
d. Algorithm

A

c. Digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of these is NOT a characteristic of a secure hash algorithm?

a. Collision should be rare.
b. A message cannot be produced from a predefined hash.
c. The results of a hash function should not be reversed.
d. The hash should always be the same fixed size.

A

a. Collision should be rare.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Alyosha was explaining to a friend the importance of protecting a cryptographic key from cryptoanalysis. He said that the key should not relate in a simple way to the cipher text. Which protection is Alyosha describing?

a. Diffusion
b. Confusion
c. Integrity
d. Chaos

A

b. Confusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the these is the strongest symmetric cryptographic algorithm?

a. Data Encryption Standard
b. Triple Data Encryption Standard
c. Advanced Encryption Standard
d. RC1

A

c. Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

If Bob wants to send a secure message to Alice using a asymmetric algorithm, which key does he use to encrypt the message?

a. Alice’s private key
b. Bob’s public key
c. Alice’s public key
d. Bob’s private key

A

c. Alice’s public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Egor wanted to use a digital signature. Which of the following benefits will the digital signature not provide?

a. Verify the sender
b. Prove the integrity of the message
c. Verify the receiver
d. Enforce nonrepudiation

A

c. Verify the receiver

17
Q

Illya was asked to recommend the most secure asymmetric cryptographic algorithm to his supervisor. Which of the following did he choose?

a. SHA-2
b. ME-312
c. BTC-2
d. RSA

A

d. RSA

18
Q

At a staff meeting one of the technicians suggested that the enterprise protect its new web server by hiding it and not telling anyone where it is located. Iosif raised his hand and said that security through obscurity was a poor idea. Why sis he say that?

a. It is an unproven approach and has never been tested.
b. It would be too closely to have one isolated server by itself.
c. It would be essential impossible to keep its location a secret from everyone.
d. It depends too heavily upon non-repudiation in order for it to succeed.

A

c. It would be essential impossible to keep its location a secret from everyone.

19
Q

What is a characteristic of the Trusted Platform Module (TPM)?

a. It provides cryptographic services in hardware instead of software
b. It allows the user to boot a corrupted disk and repair it.
c. It is available only on Windows computers running BitLocker.
d. It includes a pseudorandom number generator (PRNG).

A

a. It provides cryptographic services in hardware instead of software

20
Q

Which of these has an onboard key generator and key storage facility, as well as accelerated symmetric and asymmetric encryption, and can back up sensitive material in encrypted form?

a. Trusted Platform Module (TPM)
b. Hardware Security Module (HSM)
c. Self-encrypting hard disk drives (SED)
d. Encrypted hardware-based USB devices

A

b. Hardware Security Module (HSM)

21
Q

GNU privacy guard a proprietary software that runs on different operating systems.

(T/F)

A

False

22
Q

Ciphertext is teh scrambled and unreadable output of encrytion.

(T/F)

A

True

23
Q

How does asymmetric encryption work?

A

This encryption system employes two keys. One key is a public key that anyone can see and use. The second key is considered a private key. When a message is sent, the public key is used to encrypt the message. The receiver of the message then uses their private key to decrypt it.

24
Q

Data that is in an unencrypted form is referred to as which of the following?

a) simpletext
b) crypttext
c) plain text
d) cleartext

A

d) cleartext

25
Q

Which of the following are considered to be common asymmetric cryptographic alogrithms? (Choose all that apply)

a) data encrytpion standard
b) advanced encryption standard
c) digital signature algorithm
d) elliptic curve cryptography

A

c) digital signature algorithm
d) elliptic curve cryptography

26
Q

What cryptographic method, first propsed in teh mid-1980s, makes uss of sloping curves instead of large prime numbers?

a) IKE
b) FCC
c) RSA
d) ECC

A

d) ECC

27
Q

The XOR cipher is based on the binary operation eXclusive OR that compares two bits

(T/F)

A

True