Deck 11: Basic Cryptography
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
Play
Full screen (f)
Deck 11: Basic Cryptography
1
A hash that is created from a set of data can be reversed.
False
2
In MD5, the length of a message is padded to ____ bits.
A) 32
B) 64
C) 128
D) 512
A) 32
B) 64
C) 128
D) 512
D
3
____ ensures that the information is correct and no unauthorized person or malicious software has altered that data.
A) Confidentiality
B) Availability
C) Encryption
D) Integrity
A) Confidentiality
B) Availability
C) Encryption
D) Integrity
D
4
The basis for a digital signature rests on the ability of ____ keys to work in both directions.
A) symmetric
B) shared
C) unique
D) asymmetric
A) symmetric
B) shared
C) unique
D) asymmetric
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
Symmetric encryption is also called ____ cryptography.
A) private key
B) public key
C) symmetric key
D) shared key
A) private key
B) public key
C) symmetric key
D) shared key
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
The simplest type of stream cipher is a ____ cipher.
A) shift
B) substitution
C) lock
D) loop
A) shift
B) substitution
C) lock
D) loop
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
Cryptography cannot be applied to entire disks.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
____ is designed to replace DES.
A) AES
B) Twofish
C) 3DES
D) RSA
A) AES
B) Twofish
C) 3DES
D) RSA
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
The algorithm ____ is a block cipher that operates on 64-bit blocks and can have a key length from 32 to 448 bits.
A) RSA
B) AES
C) Blowfish
D) 3DES
A) RSA
B) AES
C) Blowfish
D) 3DES
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
One of the most famous ancient cryptographers was ____.
A) Albert Einstein
B) Isaac Newton
C) Julius Caesar
D) Caesar Augustus
A) Albert Einstein
B) Isaac Newton
C) Julius Caesar
D) Caesar Augustus
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
____ takes plaintext of any length and creates a hash 128 bits long.
A) RSA
B) SHA1
C) MD5
D) MD2
A) RSA
B) SHA1
C) MD5
D) MD2
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
____ is a relatively recent cryptographic hash function that has received international recognition and adoption by standards organizations, including the International Organization for Standardization (ISO).
A) Twofish
B) Blowfish
C) Whirlpool
D) Rijndal
A) Twofish
B) Blowfish
C) Whirlpool
D) Rijndal
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
____ is text that has no formatting (such as bolding or underlining) applied.
A) Plaintext
B) Plain text
C) Simpletext
D) Simple text
A) Plaintext
B) Plain text
C) Simpletext
D) Simple text
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
A ____ cipher rearranges letters without changing them.
A) substitution
B) block
C) loop
D) transposition
A) substitution
B) block
C) loop
D) transposition
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
____ encryption uses two keys instead of only one and these keys are mathematically related.
A) Symmetric
B) Asymmetric
C) Shared
D) Public key
A) Symmetric
B) Asymmetric
C) Shared
D) Public key
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
The____ is a symmetric cipher that was approved by the NIST in late 2000 as a replacement for DES.
A) AES
B) 3DES
C) RSA
D) Twofish
A) AES
B) 3DES
C) RSA
D) Twofish
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
Self-encrypting HDD is commonly found in copiers and multifunction printers as well as point-of-sale systems used in government, financial, and medical environments.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
The most basic type of cryptographic algorithm is a ____ algorithm.
A) hash
B) key
C) digest
D) block
A) hash
B) key
C) digest
D) block
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
Most HSMs are PAN-based appliances that can provide services to multiple devices.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
Steganography can use image files, audio files, or even video files to contain hidden information.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
The original cryptographic algorithms for encrypting and decrypting documents are ____________________ cryptographic algorithms.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
Explain hashing.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
____ attempts to use the unusual and unique behavior of microscopic objects to enable users to securely develop and share keys as well as to detect eavesdropping.
A) Reactive cryptography
B) Symmetric cryptography
C) Analog cryptography
D) Quantum cryptography
A) Reactive cryptography
B) Symmetric cryptography
C) Analog cryptography
D) Quantum cryptography
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
DES is a(n) ____________________ cipher.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
Discuss how HMAC works.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
A ____ is a number divisible only by itself and 1.
A) prime number
B) prime decimal
C) compound number
D) neutral number
A) prime number
B) prime decimal
C) compound number
D) neutral number
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
A(n) ____________________ is a method used by operating systems to store, retrieve, and organize files.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
Describe how Message Digest2 (MD2) works.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
In information technology, ____________________ is the process of proving that a user performed an action, such as sending an e-mail message or a specific document.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
The ____ is essentially a chip on the motherboard of the computer that provides cryptographic services.
A) TPM
B) SCM
C) reference monitor
D) ODS
A) TPM
B) SCM
C) reference monitor
D) ODS
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
Discuss how cryptography can help ensure the availability of the data.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
List and describe the characteristics a hashing algorithm must have to be considered secure.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
The ____ algorithm is the most common asymmetric cryptography algorithm and is the basis for several products.
A) AES
B) RSA
C) Twofish
D) Blowfish
A) AES
B) RSA
C) Twofish
D) Blowfish
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
____ was first proposed in the mid-1980s and it uses sloping curves.
A) FCC
B) RSA
C) ECC
D) IKE
A) FCC
B) RSA
C) ECC
D) IKE
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
Describe the RIPEMD hash.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
NTRUEncrypt uses ____ cryptography that relies on a set of points in space.
A) matrix-based
B) lattice-based
C) linear
D) quantum
A) matrix-based
B) lattice-based
C) linear
D) quantum
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
Describe how a block cipher works.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
Cleartext data that is to be encrypted is called ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
Describe the origins of cryptography.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
Describe the purpose and composition of Suite B.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Describe hard disk drive encryption.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck