Exam 8: Cryptography
Exam 1: Introduction to Information Security87 Questions
Exam 2: The Need for Security91 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security83 Questions
Exam 4: Planning for Security109 Questions
Exam 5: Risk Management108 Questions
Exam 6: Security Technology: Access Controls, Firewalls, and VPNS106 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools107 Questions
Exam 8: Cryptography109 Questions
Exam 9: Physical Security77 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel77 Questions
Exam 12: Information Security Maintenance116 Questions
Select questions type
An X.509 v3 certificate binds a ___________, which uniquely identifies a certificate entity, to a user's public key.
(Multiple Choice)
4.8/5
(33)
Also known as the one-time pad, the ____________________ cipher, which was developed at AT&T, uses a set of characters only one time for each encryption process.
(Short Answer)
4.8/5
(42)
One of the most widely known cryptographic algorithms is the ____________________, which was developed by IBM and is based on the company's Lucifer algorithm.
(Short Answer)
4.9/5
(44)
One encryption method made popular by spy movies involves using the text in a book as the key to decrypt a message.
(True/False)
4.9/5
(36)
Adopted by NIST in 1976 as a federal standard, DES uses a 64-bit block size and key.
(True/False)
4.8/5
(42)
In transport mode the entire IP packet is encrypted and is then placed as the content portion of another IP packet. _________________________
(True/False)
4.8/5
(37)
__________ are encrypted message components that can be mathematically proven to be authentic.
(Multiple Choice)
4.8/5
(37)
In PKI, the CA periodically distributes a(n) _________ to all users that identifies all revoked certificates.
(Multiple Choice)
4.7/5
(37)
The Secure ____________________ Standard issued by the National Institute of Standards and Technology specifies secure algorithms, such as SHA-1, for computing a condensed representation of a message or data file.
(Short Answer)
4.9/5
(33)
SSL builds on the encoding format of the Multipurpose Internet Mail Extensions protocol and uses digital signatures based on public-key cryptosystems to secure e-mail.
(True/False)
4.8/5
(33)
Asymmetric encryption systems use a single key to both encrypt and decrypt a message.
(True/False)
4.8/5
(35)
The encapsulating security payload protocol provides secrecy for the contents of network communications as well as system-to-system authentication and data integrity verification.
(True/False)
4.8/5
(32)
The __________ is responsible for the fragmentation, compression, encryption, and attachment of an SSL header to the cleartext prior to transmission.
(Multiple Choice)
5.0/5
(36)
__________ functions are mathematical algorithms that generate a message summary or digest to confirm the identity of a specific message and to confirm that there have not been any changes to the content.
(Multiple Choice)
4.9/5
(31)
Encryption methodologies that require the same secret key to encipher and decipher the message are using what is called public-key encryption. _________________________
(True/False)
4.8/5
(45)
The __________ protocol provides system-to-system authentication and data integrity verification, but does not provide secrecy for the content of a network communication.
(Multiple Choice)
4.7/5
(37)
Digital ____________________ are public-key container files that allow computer programs to validate the key and identify to whom it belongs.
(Short Answer)
4.9/5
(35)
Privacy Enhanced Mail was proposed by the Internet Engineering Task Force and is a standard that uses 3DES symmetric key encryption and RSA for key exchanges and digital signatures. _________________________
(True/False)
4.9/5
(45)
__________ is the amount of effort (usually in hours) required to perform cryptanalysis to decode an encrypted message when the key or algorithm (or both) are unknown.
(Multiple Choice)
4.8/5
(43)
Showing 61 - 80 of 109
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)