Exam 5: Basic Cryptography

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

On what principle did Julius Caesar's cryptographic messages function?

(Multiple Choice)
4.7/5
(46)

Which type of cryptographic algorithm takes an input string of any length, and returns a string of any requested variable length?

(Multiple Choice)
4.7/5
(34)

Discuss how HMAC works.

(Essay)
4.9/5
(37)

What type of cryptography uses two keys instead of just one, generating both a private and a public key?

(Multiple Choice)
4.9/5
(29)

If using the MD5 hashing algorithm, what is the length to which each message is padded?

(Multiple Choice)
4.8/5
(37)

Match the following terms to the appropriate definitions -​A symmetric cipher that was approved by the NIST in late 2000 as a replacement for DES

(Multiple Choice)
4.9/5
(33)

Which of the following is not one of the functions of a digital signature?

(Multiple Choice)
4.8/5
(35)

Match the following terms to the appropriate definitions -A temporary key that is used only once before it is discarded.​

(Multiple Choice)
4.9/5
(29)

A key that is generated by a symmetric cryptographic algorithm is said to be a:

(Multiple Choice)
4.9/5
(41)

Match the following terms to the appropriate definitions -Data that has been encrypted.​

(Multiple Choice)
4.8/5
(33)

The asymmetric cryptography algorithm most commonly used is:

(Multiple Choice)
4.9/5
(31)

A(n) ____________________ is a method used by operating systems to store, retrieve, and organize files.

(Short Answer)
4.7/5
(39)

What cryptographic method, first proposed in the mid-1980s, makes use of sloping curves instead of large prime numbers?

(Multiple Choice)
4.9/5
(31)

In information technology, ____________________ is the process of proving that a user performed an action, such as sending an e-mail message or a specific document. ​Match the following terms to the appropriate definitions.​

(Short Answer)
4.8/5
(36)

The SHA-1 hashing algorithm creates a digest that is how many bits in length?

(Multiple Choice)
4.8/5
(28)

After the DES cipher was broken and no longer considered secure, what encryption algorithm was made as its successor?

(Multiple Choice)
4.8/5
(36)

Describe how Message Digest2 (MD2) works.

(Essay)
4.9/5
(32)

Describe the RIPEMD hash.

(Essay)
4.9/5
(35)

Explain hashing.

(Essay)
4.9/5
(41)

Match the following terms to the appropriate definitions -​A symmetric block cipher that uses a 56-bit key and encrypts data in 64-bit blocks

(Multiple Choice)
4.9/5
(40)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)