Exam 8: Cryptography
Exam 1: Introduction to Information Security87 Questions
Exam 2: The Need for Security91 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security83 Questions
Exam 4: Planning for Security109 Questions
Exam 5: Risk Management108 Questions
Exam 6: Security Technology: Access Controls, Firewalls, and VPNS106 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools107 Questions
Exam 8: Cryptography109 Questions
Exam 9: Physical Security77 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel77 Questions
Exam 12: Information Security Maintenance116 Questions
Select questions type
Popular cryptosystems use a hybrid combination of symmetric and asymmetric algorithms.
(True/False)
4.9/5
(39)
AES implements a block cipher called the Rijndael Block Cipher. _________________________
(True/False)
4.9/5
(44)
SHA-1 produces a(n) ___________-bit message digest, which can then be used as an input to a digital signature algorithm.
(Multiple Choice)
4.7/5
(42)
The ____________________ operation is a function of Boolean algebra in which two bits are compared, and if the two bits are identical, the result is a binary 0.
(Short Answer)
4.9/5
(36)
When an asymmetric cryptographic process uses the sender's private key to encrypt a message, the sender's public key must be used to decrypt the message.
(True/False)
4.8/5
(45)
As DES became known as being too weak for highly classified communications, Double DES was created to provide a level of security far beyond that of DES. _________________________
(True/False)
4.8/5
(40)
_________ is a hybrid cryptosystem that combines some of the best available cryptographic algorithms and has become the open-source de facto standard for encryption and authentication of e-mail and file storage applications.
(Multiple Choice)
4.8/5
(38)
A __________ is a key-dependent, one-way hash function that allows only specific recipients (symmetric key holders) to access the message digest.
(Multiple Choice)
4.9/5
(40)
__________ is the process of converting an original message into a form that is unreadable to unauthorized individuals.
(Multiple Choice)
4.8/5
(34)
To ____________________ means to encrypt, encode, or convert plaintext into the equivalent ciphertext.
(Short Answer)
4.8/5
(32)
The encapsulating security ____________________ protocol provides secrecy for the contents of network communications as well as system-to-system authentication and data integrity verification.
(Short Answer)
4.8/5
(35)
Internet Protocol Security is designed to protect data integrity, user confidentiality, and authenticity at the IP packet level. _________________________
(True/False)
4.9/5
(35)
A(n) key is the set of steps used to convert an unencrypted message into an encrypted sequence of bits that represent the message; it sometimes refers to the programs that enable the cryptographic processes. _________________________
(True/False)
4.9/5
(34)
A __________ is the information used in conjunction with an algorithm to create the ciphertext from the plaintext or derive the plaintext from the ciphertext.
(Multiple Choice)
5.0/5
(33)
You cannot combine the XOR operation with a block cipher operation.
(True/False)
4.7/5
(38)
3DES was created to offer the same strength as the DES algorithm but ran three times as fast, thus saving time.
(True/False)
4.8/5
(38)
Secure Electronic Transactions was developed by MasterCard and Visa in 1997 to protect against electronic payment fraud.
(True/False)
4.7/5
(39)
__________ is the current federal information processing standard that specifies a cryptographic algorithm used within the U.S. government to protect information in federal agencies that are not a part of the national defense infrastructure.
(Multiple Choice)
4.9/5
(48)
__________ was developed by Phil Zimmermann and uses the IDEA cipher for message encoding.
(Multiple Choice)
4.9/5
(44)
The most common hybrid system is based on the Diffie-Hellman key exchange, which is a method for exchanging private keys using public-key encryption.
(True/False)
4.9/5
(39)
Showing 21 - 40 of 109
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)