Deck 3: Cryptography
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 3: Cryptography
1
____ provides verification that a message was sent by a particular sender and cannot be refuted.
A) Authentication
C) Authorization
B) Nonrepudiation
D) Integrity
A) Authentication
C) Authorization
B) Nonrepudiation
D) Integrity
B
2
Bit stream methods commonly use algorithm functions like ____.
A) the XOR operation
C) transposition
B) substitution
D) permutation
A) the XOR operation
C) transposition
B) substitution
D) permutation
A
3
One of the most widely known symmetric encryption cryptosystems is ____.
A) DES
C) RSA
B) WPA
D) AES
A) DES
C) RSA
B) WPA
D) AES
A
4
Steganography is technically a form of cryptography.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Which cipher uses a stencil or template with holes cut out?
A) Vernam
C) Book
B) Vigenère Square
D) Grille
A) Vernam
C) Book
B) Vigenère Square
D) Grille
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
When it comes to cryptosystems, the security of encrypted data is dependent on keeping the encrypting algorithm secret.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
The most common hybrid cryptography system is based on the ____ key exchange, which is a method for exchanging private keys using public-key encryption.
A) MAC
C) DES
B) RSA
D) Diffie-Hellman
A) MAC
C) DES
B) RSA
D) Diffie-Hellman
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
Hash functions confirm message identity and integrity.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
In modulo 26, what happens if a number is larger than 26?
A) The result is 26.
B) An error occurs and the operation stops.
C) Twenty-six is sequentially subtracted from it until the number is in the proper range.
D) Twenty-six is repeatedly divided into the original number until the remainder is in the proper range.
A) The result is 26.
B) An error occurs and the operation stops.
C) Twenty-six is sequentially subtracted from it until the number is in the proper range.
D) Twenty-six is repeatedly divided into the original number until the remainder is in the proper range.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
Which algorithm was the first asymmetric, or public-key, encryption algorithm developed (in 1977) and published for commercial use?
A) MAC
C) DES
B) RSA
D) AES
A) MAC
C) DES
B) RSA
D) AES
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
Which cipher is made from a table of 26 distinct cipher alphabets?
A) Vernam
C) Caesar
B) Polyalphabetic substitution
D) Vigenère Square
A) Vernam
C) Caesar
B) Polyalphabetic substitution
D) Vigenère Square
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
Which symmetric encryption cryptosystems was developed to replace both DES and 3DES?
A) DES
C) RSA
B) WEP
D) AES
A) DES
C) RSA
B) WEP
D) AES
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
____ is an open-source protocol framework for security development within the TCP/IP family of protocol standards.
A) RSA
C) SSH
B) IPSec
D) SSL
A) RSA
C) SSH
B) IPSec
D) SSL
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
Hash ____ are mathematical functions that create a hash value, also known as a message digest, by converting variable-length messages into a single fixed-length value.
A) digests
C) algorithms
B) keys
D) codes
A) digests
C) algorithms
B) keys
D) codes
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
Which cipher simply rearranges the values within a block to create the ciphertext?
A) Transposition
C) Caesar
B) Substitution
D) Vigenère Square
A) Transposition
C) Caesar
B) Substitution
D) Vigenère Square
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
When deploying ciphers, users have to decide on the ____ of the cryptovariable or key.
A) security
C) size
B) symmetry
D) transportability
A) security
C) size
B) symmetry
D) transportability
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
Digital signatures are encrypted messages that can be mathematically proven authentic.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Public-key encryption is based on a ____.
A) message authentication code (MAC)
C) hash value
B) certificate
D) key
A) message authentication code (MAC)
C) hash value
B) certificate
D) key
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
The XOR encryption method should be used by itself when an organization is transmitting or storing sensitive data.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
Encryption methodologies that require the same secret key to encipher and decipher the message are using ____ encryption or symmetric encryption.
A) public key
C) monoalphabetic
B) private key
D) monolithic
A) public key
C) monoalphabetic
B) private key
D) monolithic
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
Match each item with a statement below.
a.Algorithm
f.Encipher
b.Cryptosystem
g.Steganography
c.Cryptogram
h.Substitution
d.Code
i.Transposition
e.Decipher
To encrypt, encode, or convert plaintext into the equivalent ciphertext
a.Algorithm
f.Encipher
b.Cryptosystem
g.Steganography
c.Cryptogram
h.Substitution
d.Code
i.Transposition
e.Decipher
To encrypt, encode, or convert plaintext into the equivalent ciphertext
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
In a(n) ____________________ attack, the attacker eavesdrops on the victim's session and uses statistical analysis of patterns and inter-keystroke timings to discern sensitive session information.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Match each item with a statement below.
a.Algorithm
f.Encipher
b.Cryptosystem
g.Steganography
c.Cryptogram
h.Substitution
d.Code
i.Transposition
e.Decipher
An encryption method or process encompassing the algorithm, key(s) and/or cryptovariable(s), and procedures used to perform encryption and decryption
a.Algorithm
f.Encipher
b.Cryptosystem
g.Steganography
c.Cryptogram
h.Substitution
d.Code
i.Transposition
e.Decipher
An encryption method or process encompassing the algorithm, key(s) and/or cryptovariable(s), and procedures used to perform encryption and decryption
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Match each item with a statement below.
a.Algorithm
f.Encipher
b.Cryptosystem
g.Steganography
c.Cryptogram
h.Substitution
d.Code
i.Transposition
e.Decipher
To decrypt, decode, or convert ciphertext into the equivalent plaintext
a.Algorithm
f.Encipher
b.Cryptosystem
g.Steganography
c.Cryptogram
h.Substitution
d.Code
i.Transposition
e.Decipher
To decrypt, decode, or convert ciphertext into the equivalent plaintext
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
Match each item with a statement below.
a.Algorithm
f.Encipher
b.Cryptosystem
g.Steganography
c.Cryptogram
h.Substitution
d.Code
i.Transposition
e.Decipher
The encoded message resulting from an encryption
a.Algorithm
f.Encipher
b.Cryptosystem
g.Steganography
c.Cryptogram
h.Substitution
d.Code
i.Transposition
e.Decipher
The encoded message resulting from an encryption
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Match each item with a statement below.
a.Algorithm
f.Encipher
b.Cryptosystem
g.Steganography
c.Cryptogram
h.Substitution
d.Code
i.Transposition
e.Decipher
The process of replacing plaintext values with other values to form ciphertext
a.Algorithm
f.Encipher
b.Cryptosystem
g.Steganography
c.Cryptogram
h.Substitution
d.Code
i.Transposition
e.Decipher
The process of replacing plaintext values with other values to form ciphertext
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
Match each item with a statement below.
a.Algorithm
f.Encipher
b.Cryptosystem
g.Steganography
c.Cryptogram
h.Substitution
d.Code
i.Transposition
e.Decipher
The process of converting components (words or phrases) of an unencrypted message into encrypted components
a.Algorithm
f.Encipher
b.Cryptosystem
g.Steganography
c.Cryptogram
h.Substitution
d.Code
i.Transposition
e.Decipher
The process of converting components (words or phrases) of an unencrypted message into encrypted components
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
The ____ protocol is used for public-key encryption to secure a channel over the Internet.
A) RSA
C) SSH
B) IPSec
D) SSL
A) RSA
C) SSH
B) IPSec
D) SSL
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
Where is information most vulnerable?
A) When it is inside the organization's systems
B) When it is outside the organization's systems
C) When it is being saved on a backup tape inside the organization's systems
D) When it is being saved to a Microsoft product inside the organization's systems
A) When it is inside the organization's systems
B) When it is outside the organization's systems
C) When it is being saved on a backup tape inside the organization's systems
D) When it is being saved to a Microsoft product inside the organization's systems
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
____ builds on the encoding format of the MIME protocol and uses digital signatures based on public-key cryptosystems to secure e-mail.
A) S/MIME
C) SSH
B) PGP
D) SSL
A) S/MIME
C) SSH
B) PGP
D) SSL
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
Match each item with a statement below.
a.Algorithm
f.Encipher
b.Cryptosystem
g.Steganography
c.Cryptogram
h.Substitution
d.Code
i.Transposition
e.Decipher
The hiding of messages in such a way that no one but the sender and intended recipient of the message even knows a message exists
a.Algorithm
f.Encipher
b.Cryptosystem
g.Steganography
c.Cryptogram
h.Substitution
d.Code
i.Transposition
e.Decipher
The hiding of messages in such a way that no one but the sender and intended recipient of the message even knows a message exists
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
The science of encryption, known as ____________________, encompasses both cryptography and cryptanalysis.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
____________________ keys are limited-use symmetric keys for temporary communications; they allow two organizations to conduct quick, efficient, secure communications based on symmetric encryption.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
Match each item with a statement below.
a.Algorithm
f.Encipher
b.Cryptosystem
g.Steganography
c.Cryptogram
h.Substitution
d.Code
i.Transposition
e.Decipher
The programmatic steps used to convert an unencrypted message into an encrypted sequence of bits that represents the message
a.Algorithm
f.Encipher
b.Cryptosystem
g.Steganography
c.Cryptogram
h.Substitution
d.Code
i.Transposition
e.Decipher
The programmatic steps used to convert an unencrypted message into an encrypted sequence of bits that represents the message
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Digital ____ authenticate the cryptographic key that is embedded in the certificate.
A) logs
C) certificates
B) hashes
D) signatures
A) logs
C) certificates
B) hashes
D) signatures
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
An X.509 v3 certificate binds a ____, which uniquely identifies a certificate entity, to a user's public key.
A) signature
C) certificate
B) hash value
D) distinguished name (DN)
A) signature
C) certificate
B) hash value
D) distinguished name (DN)
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
Match each item with a statement below.
a.Algorithm
f.Encipher
b.Cryptosystem
g.Steganography
c.Cryptogram
h.Substitution
d.Code
i.Transposition
e.Decipher
The process of rearranging plaintext values to form ciphertext
a.Algorithm
f.Encipher
b.Cryptosystem
g.Steganography
c.Cryptogram
h.Substitution
d.Code
i.Transposition
e.Decipher
The process of rearranging plaintext values to form ciphertext
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Digital ____________________ are public-key container files that allow computer programs to validate the key and identify to whom it belongs.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
____________________ functions are mathematical algorithms that generate a message summary or digest (sometimes called a fingerprint) that can be used to confirm the identity of a specific message and/or confirm that there have not been any changes to the content.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
What protocol is planned as a replacement for TKIP in WPA?
A) AES
C) SSH
B) RSN
D) RSA
A) AES
C) SSH
B) RSN
D) RSA
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
What is salting and how does it help reduce rainbow attacks?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
Describe the exclusive OR operation (XOR) function and explain where XOR encryption is used.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Describe Public Key Infrastructure (PKI).
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Explain how to perform the Vernam cipher encryption operation.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
What is a mathematical trapdoor and how is it used with encryption?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Why is WEP considered to be too weak for use in most network settings?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Briefly describe the PGP algorithm, including its functionality and two general versions.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Why was WPA2 created?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Why is asymmetric encryption commonly referred to as public-key encryption?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Describe three functions of a certificate authority (CA).
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck