Deck 2: Cryptography and Security: Part A
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/24
Play
Full screen (f)
Deck 2: Cryptography and Security: Part A
1
The is a polygraphic substitution cipher based on linear algebra.
A)hill cipher
B)playfair cipher
C)affine cipher
D)none of these
A)hill cipher
B)playfair cipher
C)affine cipher
D)none of these
hill cipher
2
______________is the practice of concealing a message within another message,image or file.
A)steganography
B)cryptography
C)cipher
D)receiver
A)steganography
B)cryptography
C)cipher
D)receiver
steganography
3
In asymmetric key cryptography, the private key is kept by ______________
A)sender
B)receiver
C)sender and receiver
D)none of these
A)sender
B)receiver
C)sender and receiver
D)none of these
receiver
4
What is data encryption standard (DES)?
A)block cipher
B)stream cipher
C)bit cipher
D)byte cipher
A)block cipher
B)stream cipher
C)bit cipher
D)byte cipher
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
5
In cryptography the original message before being transform is called
A)simple text
B)plain text
C)empty text
D)filled text
A)simple text
B)plain text
C)empty text
D)filled text
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
6
An asymmetric-key (or public-key) cipher uses
A)1 key
B)2 key
C)3 key
D)4 key
A)1 key
B)2 key
C)3 key
D)4 key
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
7
In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is
A)short
B)flat
C)long
D)thin
A)short
B)flat
C)long
D)thin
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
8
The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two parties are not
A)authenticated
B)joined
C)submit
D)separate
A)authenticated
B)joined
C)submit
D)separate
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
9
In Asymmetric-Key Cryptography, the two keys, e and d, have a special relationship to
A)other
B)data
C)keys
D)each other
A)other
B)data
C)keys
D)each other
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
10
For RSA to work, the value of P must be less than the value of
A)p
B)q
C)n
D)r
A)p
B)q
C)n
D)r
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
11
In RSA, ?(n) = in terms of p and q.
A)(p)/(q)
B)(p)(q)
C)(p-1)(q-1)
D)(p+1)(q+1)
A)(p)/(q)
B)(p)(q)
C)(p-1)(q-1)
D)(p+1)(q+1)
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
12
In RSA, we select a value 'e' such that it lies between 0 and ?(n) and it is relatively prime to ?(n).
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
13
RSA is also a stream cipher like Merkel-Hellman.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
14
USENET falls under which category of public key sharing?
A)public announcement
B)publicly available directory
C)public key authority
D)public key certificate
A)public announcement
B)publicly available directory
C)public key authority
D)public key certificate
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
15
PGP makes use of which cryptographic algorithm?
A)rsa
B)aes
C)des
D)robin
A)rsa
B)aes
C)des
D)robin
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
16
Public key cryptography also called as__________________________________________
A)asymmetric key cryptography
B)symmetric key cryptography
C)both a and b
D)none of the above
A)asymmetric key cryptography
B)symmetric key cryptography
C)both a and b
D)none of the above
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
17
ECC stands for
A)elliptic curve cryptography
B)elliptic cryptography curve
C)error correcting code
D)none of the above
A)elliptic curve cryptography
B)elliptic cryptography curve
C)error correcting code
D)none of the above
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
18
Diffie-Hellman algorithm is widely known as__________________________________________
A)key exchange algorithm
B)key agreement algorithm
C)only a
D)both a and b
A)key exchange algorithm
B)key agreement algorithm
C)only a
D)both a and b
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
19
Hash function is used for__________________________________________
A)message authentication
B)digital signature
C)both a and b
D)only a
A)message authentication
B)digital signature
C)both a and b
D)only a
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
20
RSA algorithm is best example of____________________________
A)asymmetric key cryptography
B)symmetric key cryptography
C)elliptic curve cryptography
D)all of the above
A)asymmetric key cryptography
B)symmetric key cryptography
C)elliptic curve cryptography
D)all of the above
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
21
IPSec is designed to provide security at the __________________________________________
A)transport layer
B)network layer
C)application layer
D)session layer
A)transport layer
B)network layer
C)application layer
D)session layer
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
22
In tunnel mode, IPSec protects the ____________________________
A)entire ip packet
B)ip header
C)ip payload
D)ip trailer
A)entire ip packet
B)ip header
C)ip payload
D)ip trailer
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
23
An attempt to make a computer resource unavailable to its intended users is called ____________________________
A)denial-of-service attack
B)virus attack
C)worms attack
D)botnet process
A)denial-of-service attack
B)virus attack
C)worms attack
D)botnet process
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
24
SSL primarily focuses on ____________________________ Pretty good privacy (PGP) is used in
A)integrity and authenticity
B)integrity and non- repudiation
C)authenticity and privacy
D)confidentiality and integrity
A)integrity and authenticity
B)integrity and non- repudiation
C)authenticity and privacy
D)confidentiality and integrity
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck