Exam 3: Cryptography

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

________ thwart replay attacks by ensuring "freshness" using cutoff values.

(Multiple Choice)
4.7/5
(40)

A ________ is a random string of 40 to 4,000 bits (ones and zeros) used to encrypt messages.

(Multiple Choice)
4.7/5
(36)

Which of the following statements accurately describes RC4?

(Multiple Choice)
4.9/5
(33)

The hash size in MD-5 is 160 bits.

(True/False)
4.7/5
(33)

________ occurs when companies believe they have good security because they are using proprietary ciphers that hackers do not know.

(Multiple Choice)
4.9/5
(32)

Cryptanalysts have found weaknesses in ________.

(Multiple Choice)
4.8/5
(30)

To be strong, ________ keys need to be longer than ________ keys.

(Multiple Choice)
4.8/5
(30)

Which encryption method does MS-CHAP use?

(Multiple Choice)
4.9/5
(32)

The most popular public key cipher is RSA.

(True/False)
4.9/5
(39)

IPsec operates at the ________ layer.

(Multiple Choice)
4.8/5
(27)

When Joshua sends a message to Larry, Joshua will use ________ to encrypt the message.

(Multiple Choice)
4.8/5
(39)

Digital signatures provide ________.

(Multiple Choice)
5.0/5
(37)

A DES key is ________ bits long.

(Multiple Choice)
4.7/5
(40)

A DES key is 40 bits long.

(True/False)
4.9/5
(36)

SSL/TLS protection is transparent to applications.

(True/False)
4.9/5
(33)

In cryptographic systems, keying takes place during the second handshaking stage.

(True/False)
4.9/5
(34)

The 56-bit key size ________.

(Multiple Choice)
4.8/5
(37)

When both parties prove their identities to the other, this is called ________.

(Multiple Choice)
4.9/5
(32)

When a hashing algorithm is applied, the hash will ALWAYS have a fixed length.

(True/False)
4.8/5
(35)

To test the digital signature, the verifier will use sender's public key.

(True/False)
4.8/5
(41)
Showing 21 - 40 of 122
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)