Exam 8: Cryptography

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

An X.509 v3 certificate binds a ___________, which uniquely identifies a certificate entity, to a user's public key.

(Multiple Choice)
4.8/5
(33)

Also known as the one-time pad, the ____________________ cipher, which was developed at AT&T, uses a set of characters only one time for each encryption process.

(Short Answer)
4.8/5
(42)

One of the most widely known cryptographic algorithms is the ____________________, which was developed by IBM and is based on the company's Lucifer algorithm.

(Short Answer)
4.9/5
(44)

One encryption method made popular by spy movies involves using the text in a book as the key to decrypt a message.

(True/False)
4.9/5
(36)

Adopted by NIST in 1976 as a federal standard, DES uses a 64-bit block size and key.

(True/False)
4.8/5
(42)

In transport mode the entire IP packet is encrypted and is then placed as the content portion of another IP packet. _________________________

(True/False)
4.8/5
(37)

__________ are encrypted message components that can be mathematically proven to be authentic.

(Multiple Choice)
4.8/5
(37)

In PKI, the CA periodically distributes a(n) _________ to all users that identifies all revoked certificates.

(Multiple Choice)
4.7/5
(37)

The Secure ____________________ Standard issued by the National Institute of Standards and Technology specifies secure algorithms, such as SHA-1, for computing a condensed representation of a message or data file.

(Short Answer)
4.9/5
(33)

SSL builds on the encoding format of the Multipurpose Internet Mail Extensions protocol and uses digital signatures based on public-key cryptosystems to secure e-mail.

(True/False)
4.8/5
(33)

Asymmetric encryption systems use a single key to both encrypt and decrypt a message.

(True/False)
4.8/5
(35)

The encapsulating security payload protocol provides secrecy for the contents of network communications as well as system-to-system authentication and data integrity verification.

(True/False)
4.8/5
(32)

Describe how hash functions work and what they are used for.

(Essay)
4.8/5
(30)

The __________ is responsible for the fragmentation, compression, encryption, and attachment of an SSL header to the cleartext prior to transmission.

(Multiple Choice)
5.0/5
(36)

__________ functions are mathematical algorithms that generate a message summary or digest to confirm the identity of a specific message and to confirm that there have not been any changes to the content.

(Multiple Choice)
4.9/5
(31)

Encryption methodologies that require the same secret key to encipher and decipher the message are using what is called public-key encryption. _________________________

(True/False)
4.8/5
(45)

The __________ protocol provides system-to-system authentication and data integrity verification, but does not provide secrecy for the content of a network communication.

(Multiple Choice)
4.7/5
(37)

Digital ____________________ are public-key container files that allow computer programs to validate the key and identify to whom it belongs.

(Short Answer)
4.9/5
(35)

Privacy Enhanced Mail was proposed by the Internet Engineering Task Force and is a standard that uses 3DES symmetric key encryption and RSA for key exchanges and digital signatures. _________________________

(True/False)
4.9/5
(45)

__________ is the amount of effort (usually in hours) required to perform cryptanalysis to decode an encrypted message when the key or algorithm (or both) are unknown.

(Multiple Choice)
4.8/5
(43)
Showing 61 - 80 of 109
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)