Deck 3: Cryptography
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/101
Play
Full screen (f)
Deck 3: Cryptography
1
Any original message is called ________.
A) plaintext
B) ciphertext
C) message digest
D) the hash
A) plaintext
B) ciphertext
C) message digest
D) the hash
plaintext
2
________ is a cryptographic process that changes plaintext into a seemingly random stream of bits.
A) Encryption
B) Brute-force key cracking
C) Cryptography
D) Ciphertext
A) Encryption
B) Brute-force key cracking
C) Cryptography
D) Ciphertext
Encryption
3
What does encryption and decryption require?
A) Plaintext and ciphertext
B) A cipher and a key
C) A message and a key
D) DES and 3DES
A) Plaintext and ciphertext
B) A cipher and a key
C) A message and a key
D) DES and 3DES
A cipher and a key
4
Auguste Kerckhoffs proved that as long as the ________, the two parties will still have confidentiality.
A) both the key and the cipher code are kept secret
B) the key is made available and the cipher is kept secret
C) the key is kept secret
D) the cipher is kept secret
A) both the key and the cipher code are kept secret
B) the key is made available and the cipher is kept secret
C) the key is kept secret
D) the cipher is kept secret
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
5
________ ciphertext is to turn it back into its original plaintext.
A) Decrypting
B) Coding
C) Encrypting
D) Keying
A) Decrypting
B) Coding
C) Encrypting
D) Keying
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
6
What does Kerckhoffs' Law say is the recipe for secure encryption?
A) Keeping keys secret
B) Keeping ciphers secret
C) Keeping keys available to only two users
D) Keeping ciphers available to only two users
A) Keeping keys secret
B) Keeping ciphers secret
C) Keeping keys available to only two users
D) Keeping ciphers available to only two users
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following is simply the act of trying all possible keys until the right key is discovered?
A) Encryption
B) Brute-force key cracking
C) Mutual authentication
D) Keying
A) Encryption
B) Brute-force key cracking
C) Mutual authentication
D) Keying
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
8
What happens in substitution ciphers?
A) The order of the two characters is reversed.
B) One character is substituted for the other, and then the order of the two is switched.
C) One character is substituted for another, but the order of characters is not changed.
D) Both characters are kept secret, but the key is revealed.
A) The order of the two characters is reversed.
B) One character is substituted for the other, and then the order of the two is switched.
C) One character is substituted for another, but the order of characters is not changed.
D) Both characters are kept secret, but the key is revealed.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
9
In ________, the letters are moved around within a message, based on their initial positions in the message.
A) brute-force key cracking
B) mutual authentication
C) substitution ciphers
D) transposition ciphers
A) brute-force key cracking
B) mutual authentication
C) substitution ciphers
D) transposition ciphers
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following is FALSE in regard to symmetric key encryption?
A) Symmetric key encryption is very fast.
B) All but a tiny fraction of encryptions for confidentiality uses symmetric key encryption.
C) Very few personal computers or handheld devices have sufficient processing power to encrypt with symmetric key encryption.
D) Symmetric key encryption places only a small processing burden on computers.
A) Symmetric key encryption is very fast.
B) All but a tiny fraction of encryptions for confidentiality uses symmetric key encryption.
C) Very few personal computers or handheld devices have sufficient processing power to encrypt with symmetric key encryption.
D) Symmetric key encryption places only a small processing burden on computers.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is describes keys that are prohibitively time-consuming to crack?
A) Strong symmetric keys
B) 40-bit keys
C) 56-bit keys
D) 112-bit 3DESs
A) Strong symmetric keys
B) 40-bit keys
C) 56-bit keys
D) 112-bit 3DESs
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
12
Information security is a fairly recent issue-primarily in just the last 80-100 years.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
13
Encryption for confidentiality was the original purpose of cryptography.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
14
All ciphers operate the same.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
15
A key is a random strong of 40 to 4,000 bits.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
16
Almost all computer information is encoded as a set of bytes and characters.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
17
A cryptanalyst is someone who cracks encryption.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
18
In transposition ciphers, letters are changed but their position is not.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
19
A cipher is a general way to encrypt information, while codes are limited.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
20
Doubling the key length increases the number of possible keys by approximately double.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
21
The weakest cipher in common use today is ________.
A) DES
B) RC4
C) 3DES
D) AES
A) DES
B) RC4
C) 3DES
D) AES
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
22
________ is 56 bits long.
A) The DES key
B) An RSA key
C) A symmetric key
D) A hash
A) The DES key
B) An RSA key
C) A symmetric key
D) A hash
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following is FALSE about 3DES?
A) It is very slow.
B) It is expensive in regard to processing cost.
C) 3DES gives strong symmetric key encryption.
D) 3DES has a key length of 56.
A) It is very slow.
B) It is expensive in regard to processing cost.
C) 3DES gives strong symmetric key encryption.
D) 3DES has a key length of 56.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
24
Which of the following is efficient in regard to processing power and RAM requirements to be used on many different types of devices?
A) 3DES
B) DES
C) Triple DES
D) AES
A) 3DES
B) DES
C) Triple DES
D) AES
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
25
AES offers four different alternative key lengths.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
26
Creating a vulnerability-free encryption cipher is extremely difficult.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
27
A cryptographic system is ________.
A) a system where letters are moved around within a message, based on their initial positions in the message
B) a packaged set of cryptographic countermeasures for protecting dialogues
C) a specific set of options in SSL/TLS
D) when both parties authenticate themselves
A) a system where letters are moved around within a message, based on their initial positions in the message
B) a packaged set of cryptographic countermeasures for protecting dialogues
C) a specific set of options in SSL/TLS
D) when both parties authenticate themselves
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
28
Which of the following is NOT one of the three handshaking stages of a cryptographic system standard?
A) Negotiation
B) Authentication
C) Communicating
D) Keying
A) Negotiation
B) Authentication
C) Communicating
D) Keying
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
29
A specific set of options in SSL/TLS is called a(n) ________.
A) DES key
B) cipher suite
C) RSA key
D) symmetric key
A) DES key
B) cipher suite
C) RSA key
D) symmetric key
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
30
When are the handshaking stages over in a cryptographic system standard?
A) After the two sides have authenticated each other and keys have been exchanged
B) After an electronic signature is sent and received by each party
C) After the sender encrypts the combined message and electronic signature for confidentiality
D) After the two sides have authenticated each other and messages have been exchanged
A) After the two sides have authenticated each other and keys have been exchanged
B) After an electronic signature is sent and received by each party
C) After the sender encrypts the combined message and electronic signature for confidentiality
D) After the two sides have authenticated each other and messages have been exchanged
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
31
The third stage of handshaking of a cryptographic system standard is ________.
A) negotiation
B) authentication
C) communicating
D) keying
A) negotiation
B) authentication
C) communicating
D) keying
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
32
There are three handshaking stages when two parties communicate through a cryptographic system standard.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
33
The second stage of a cryptographic system standard is initial authentication.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
34
Message-by-message authentication thwarts efforts by impostors to insert messages into a dialogue stream.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
35
Message integrity refers to the idea that if an attacker captures and alters a message, the authentication process will reject the message.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
36
A cipher suite includes all of the following EXCEPT ________.
A) a specific set of methods and options for initial authentication
B) a key exchange
C) ongoing message confidentiality, authentication, and integrity
D) an encrypted message and an electronic signature
A) a specific set of methods and options for initial authentication
B) a key exchange
C) ongoing message confidentiality, authentication, and integrity
D) an encrypted message and an electronic signature
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
37
The weakest cipher suites in a cryptographic system standard may provide no protection at all.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
38
There is wide variation in the strengths of SSL/TLS cipher suites.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
39
Once security negotiation is finished, the next handshaking stage in establishing a cryptographic system dialog is ________.
A) communication
B) authentication
C) confidentiality
D) encryption
A) communication
B) authentication
C) confidentiality
D) encryption
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
40
In authentication in a cryptographic system, the party trying to prove its identity is called the ________.
A) key
B) verifier
C) supplicant
D) hash
A) key
B) verifier
C) supplicant
D) hash
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
41
In authentication in a cryptographic system, the supplicant sends ________ to the verifier.
A) a key
B) a response message
C) credentials
D) a challenge message
A) a key
B) a response message
C) credentials
D) a challenge message
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
42
When ________ is applied to a binary message, the results is far shorter than the original message.
A) hashing
B) credentialing
C) verifying
D) keying
A) hashing
B) credentialing
C) verifying
D) keying
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
43
Which of the following is FALSE about hashing?
A) It is irreversible.
B) It is repeatable.
C) It is an important part of how cryptographic systems function.
D) It produces ciphertext that is about as long as the plaintext that was sent.
A) It is irreversible.
B) It is repeatable.
C) It is an important part of how cryptographic systems function.
D) It produces ciphertext that is about as long as the plaintext that was sent.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
44
MS-CHAP is part of the ________.
A) Microsoft Windows Server operating system
B) Microsoft Windows PC operating system
C) Microsoft Office suite
D) Microsoft and Apple operating systems
A) Microsoft Windows Server operating system
B) Microsoft Windows PC operating system
C) Microsoft Office suite
D) Microsoft and Apple operating systems
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
45
MS-CHAP is an encryption method.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
46
Unlike encryption, hashing is irreversible.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
47
One hashing method that is archaic and was primarily used in the past is MD5.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
48
SHA-2 is the hashing method that is recommended by NIST.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
49
Which are the two widely used public key encryption ciphers?
A) RSA and ECC
B) ECC and DES
C) RSA and AES
D) DES and 3DES
A) RSA and ECC
B) ECC and DES
C) RSA and AES
D) DES and 3DES
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
50
Which of the following is FALSE about public key encryption ciphers?
A) They are extremely complex.
B) They are slow.
C) They are expensive to use.
D) They are often used to encrypt very long messages for confidentiality.
A) They are extremely complex.
B) They are slow.
C) They are expensive to use.
D) They are often used to encrypt very long messages for confidentiality.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
51
For RSA public key encryption, a recommended minimum key length for a strong key is ________.
A) 1,024 bits
B) 256 bits
C) 1,024 bytes
D) 256 bytes
A) 1,024 bits
B) 256 bits
C) 1,024 bytes
D) 256 bytes
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
52
Diffie-Hellman is a(n) ________.
A) authentication method
B) hashing method
C) popular keying method
D) communication method
A) authentication method
B) hashing method
C) popular keying method
D) communication method
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
53
Symmetric key encryption is somewhat slow yet fairly expensive.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
54
Public key encryption and symmetric key encryption are complementary.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
55
Public key encryption takes 100 to 1,000 times longer than symmetric key encryption to encrypt a message of a given length.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
56
The use of public key encryption to do keying is widespread.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
57
Public key encryption to do keying is extremely vast.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
58
After two parties exchange session keys, what happens?
A) The two sides begin sending messages back and forth.
B) Encryption and decryption occurs.
C) The two sides begin the authentication phase.
D) Keying starts.
A) The two sides begin sending messages back and forth.
B) Encryption and decryption occurs.
C) The two sides begin the authentication phase.
D) Keying starts.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
59
A(n) ________ is when an attacker intercepts messages being sent between two parties and forwards them on.
A) replay attack
B) security through obscurity attack
C) evil twin attack
D) man-in-the-middle attack
A) replay attack
B) security through obscurity attack
C) evil twin attack
D) man-in-the-middle attack
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
60
A(n) ________ occurs when an attacker intercepts an encrypted message and transmits it again later.
A) replay attack
B) security through obscurity attack
C) evil twin attack
D) man-in-the-middle attack
A) replay attack
B) security through obscurity attack
C) evil twin attack
D) man-in-the-middle attack
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
61
An electronic signature provides ________ and ________.
A) authentication; handshaking
B) authentication; message integrity
C) handshaking; message integrity
D) keying; encryption
A) authentication; handshaking
B) authentication; message integrity
C) handshaking; message integrity
D) keying; encryption
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
62
A ________ is the person a supplicant claims to be.
A) verifier
B) public key
C) true party
D) digital signature
A) verifier
B) public key
C) true party
D) digital signature
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
63
A ________ authenticates a single message with public key encryption.
A) public key
B) verification
C) digital signature
D) message digest
A) public key
B) verification
C) digital signature
D) message digest
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
64
________ is an independent and trusted source of information about public keys of true parties.
A) A message digest
B) Verification
C) A digital signature
D) A certificate authority
A) A message digest
B) Verification
C) A digital signature
D) A certificate authority
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
65
What are IdenTrust, Sectifo, and GoDaddy?
A) Certificate authorities
B) Verification authorities
C) Digital signature authorities
D) Message digest software suppliers
A) Certificate authorities
B) Verification authorities
C) Digital signature authorities
D) Message digest software suppliers
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
66
________ uses a key exchanged during the initial negotiation phase.
A) A DES
B) The HMAC
C) A hash
D) A message digest
A) A DES
B) The HMAC
C) A hash
D) A message digest
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
67
Digital signatures are used much more often than are HMACs.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
68
The first step in creating a digital signature for authentication is to hash the plaintext message.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
69
If a send is the true party, the sender will be authenticated.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
70
If a message has changed while in transit, the message digests will match but will show a separate log of the changes.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
71
Digital certificates and digital signatures must be used together in public key authentication.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
72
Nonrepudiation means that a sender cannot deny that he or she sent an important message.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
73
Quantum mechanics governs ________.
A) national security
B) large-scale interactions
C) small-scale interactions
D) global security issues
A) national security
B) large-scale interactions
C) small-scale interactions
D) global security issues
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
74
________ can deliver very long keys to communication partners.
A) Diffie-Hellman key exchange
B) Public key encryption
C) One-time key exchange
D) Quantum key distribution
A) Diffie-Hellman key exchange
B) Public key encryption
C) One-time key exchange
D) Quantum key distribution
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
75
________ can be used to crack keys quickly by trying dozens or even thousands of keys at once.
A) Diffie-Hellman key exchange
B) Quantum key cracking
C) Public key encryption
D) One-time key exchange
A) Diffie-Hellman key exchange
B) Quantum key cracking
C) Public key encryption
D) One-time key exchange
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
76
Quantum key distribution creates a one-time key.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
77
Currently, quantum computer can crack keys that are thousands of bits long.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
78
What is the first task in establishing a cryptographic system?
A) For a company to invent their own custom cryptographic protections
B) Selecting a cryptographic system standard for the dialogue
C) Handshaking tasks are performed
D) Verification takes place
A) For a company to invent their own custom cryptographic protections
B) Selecting a cryptographic system standard for the dialogue
C) Handshaking tasks are performed
D) Verification takes place
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
79
A ________connects a single client over an untrusted network to a single server.
A) host-to-host VPN
B) remote access VPN
C) one-time key
D) site-to-site VPN
A) host-to-host VPN
B) remote access VPN
C) one-time key
D) site-to-site VPN
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
80
Cryptographic systems are nearly always used over trusted networks.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck