Deck 11: Basic Cryptography

Full screen (f)
exit full mode
Question
A hash that is created from a set of data can be reversed.
Use Space or
up arrow
down arrow
to flip the card.
Question
In MD5, the length of a message is padded to ____ bits.

A) 32
B) 64
C) 128
D) 512
Question
____ ensures that the information is correct and no unauthorized person or malicious software has altered that data.

A) Confidentiality
B) Availability
C) Encryption
D) Integrity
Question
The basis for a digital signature rests on the ability of ____ keys to work in both directions.

A) symmetric
B) shared
C) unique
D) asymmetric
Question
Symmetric encryption is also called ____ cryptography.

A) private key
B) public key
C) symmetric key
D) shared key
Question
The simplest type of stream cipher is a ____ cipher.

A) shift
B) substitution
C) lock
D) loop
Question
Cryptography cannot be applied to entire disks.
Question
____ is designed to replace DES.

A) AES
B) Twofish
C) 3DES
D) RSA
Question
The algorithm ____ is a block cipher that operates on 64-bit blocks and can have a key length from 32 to 448 bits.

A) RSA
B) AES
C) Blowfish
D) 3DES
Question
One of the most famous ancient cryptographers was ____.

A) Albert Einstein
B) Isaac Newton
C) Julius Caesar
D) Caesar Augustus
Question
____ takes plaintext of any length and creates a hash 128 bits long.

A) RSA
B) SHA1
C) MD5
D) MD2
Question
____ is a relatively recent cryptographic hash function that has received international recognition and adoption by standards organizations, including the International Organization for Standardization (ISO).

A) Twofish
B) Blowfish
C) Whirlpool
D) Rijndal
Question
____ is text that has no formatting (such as bolding or underlining) applied.

A) Plaintext
B) Plain text
C) Simpletext
D) Simple text
Question
A ____ cipher rearranges letters without changing them.

A) substitution
B) block
C) loop
D) transposition
Question
____ encryption uses two keys instead of only one and these keys are mathematically related.

A) Symmetric
B) Asymmetric
C) Shared
D) Public key
Question
The____ is a symmetric cipher that was approved by the NIST in late 2000 as a replacement for DES.

A) AES
B) 3DES
C) RSA
D) Twofish
Question
Self-encrypting HDD is commonly found in copiers and multifunction printers as well as point-of-sale systems used in government, financial, and medical environments.
Question
The most basic type of cryptographic algorithm is a ____ algorithm.

A) hash
B) key
C) digest
D) block
Question
Most HSMs are PAN-based appliances that can provide services to multiple devices.
Question
Steganography can use image files, audio files, or even video files to contain hidden information.
Question
The original cryptographic algorithms for encrypting and decrypting documents are ____________________ cryptographic algorithms.
Question
Explain hashing.
Question
____ attempts to use the unusual and unique behavior of microscopic objects to enable users to securely develop and share keys as well as to detect eavesdropping.

A) Reactive cryptography
B) Symmetric cryptography
C) Analog cryptography
D) Quantum cryptography
Question
DES is a(n) ____________________ cipher.
Question
Discuss how HMAC works.
Question
A ____ is a number divisible only by itself and 1.

A) prime number
B) prime decimal
C) compound number
D) neutral number
Question
A(n) ____________________ is a method used by operating systems to store, retrieve, and organize files.
Question
Describe how Message Digest2 (MD2) works.
Question
In information technology, ____________________ is the process of proving that a user performed an action, such as sending an e-mail message or a specific document.
Question
The ____ is essentially a chip on the motherboard of the computer that provides cryptographic services.

A) TPM
B) SCM
C) reference monitor
D) ODS
Question
Discuss how cryptography can help ensure the availability of the data.
Question
List and describe the characteristics a hashing algorithm must have to be considered secure.
Question
The ____ algorithm is the most common asymmetric cryptography algorithm and is the basis for several products.

A) AES
B) RSA
C) Twofish
D) Blowfish
Question
____ was first proposed in the mid-1980s and it uses sloping curves.

A) FCC
B) RSA
C) ECC
D) IKE
Question
Describe the RIPEMD hash.
Question
NTRUEncrypt uses ____ cryptography that relies on a set of points in space.

A) matrix-based
B) lattice-based
C) linear
D) quantum
Question
Describe how a block cipher works.
Question
Cleartext data that is to be encrypted is called ____________________.
Question
Describe the origins of cryptography.
Question
Describe the purpose and composition of Suite B.
Question
Describe hard disk drive encryption.
Question
Match between columns
Takes data, divides it into smaller sections, and hides it in unused portions of a file
Ciphertext
Takes data, divides it into smaller sections, and hides it in unused portions of a file
Cryptography
Takes data, divides it into smaller sections, and hides it in unused portions of a file
Steganography
Takes data, divides it into smaller sections, and hides it in unused portions of a file
Cleartext
Takes data, divides it into smaller sections, and hides it in unused portions of a file
Decryption
Takes data, divides it into smaller sections, and hides it in unused portions of a file
Key
Takes data, divides it into smaller sections, and hides it in unused portions of a file
GPG
Takes data, divides it into smaller sections, and hides it in unused portions of a file
PGP
Takes data, divides it into smaller sections, and hides it in unused portions of a file
EFS
Uses RSA for protecting digital signatures and 3DES or IDEA for symmetric encryption
Ciphertext
Uses RSA for protecting digital signatures and 3DES or IDEA for symmetric encryption
Cryptography
Uses RSA for protecting digital signatures and 3DES or IDEA for symmetric encryption
Steganography
Uses RSA for protecting digital signatures and 3DES or IDEA for symmetric encryption
Cleartext
Uses RSA for protecting digital signatures and 3DES or IDEA for symmetric encryption
Decryption
Uses RSA for protecting digital signatures and 3DES or IDEA for symmetric encryption
Key
Uses RSA for protecting digital signatures and 3DES or IDEA for symmetric encryption
GPG
Uses RSA for protecting digital signatures and 3DES or IDEA for symmetric encryption
PGP
Uses RSA for protecting digital signatures and 3DES or IDEA for symmetric encryption
EFS
To change the secret message back to its original form
Ciphertext
To change the secret message back to its original form
Cryptography
To change the secret message back to its original form
Steganography
To change the secret message back to its original form
Cleartext
To change the secret message back to its original form
Decryption
To change the secret message back to its original form
Key
To change the secret message back to its original form
GPG
To change the secret message back to its original form
PGP
To change the secret message back to its original form
EFS
Data that is in an unencrypted form
Ciphertext
Data that is in an unencrypted form
Cryptography
Data that is in an unencrypted form
Steganography
Data that is in an unencrypted form
Cleartext
Data that is in an unencrypted form
Decryption
Data that is in an unencrypted form
Key
Data that is in an unencrypted form
GPG
Data that is in an unencrypted form
PGP
Data that is in an unencrypted form
EFS
The science of transforming information into a secure form so that it can be transmitted or stored and unauthorized persons cannot access it
Ciphertext
The science of transforming information into a secure form so that it can be transmitted or stored and unauthorized persons cannot access it
Cryptography
The science of transforming information into a secure form so that it can be transmitted or stored and unauthorized persons cannot access it
Steganography
The science of transforming information into a secure form so that it can be transmitted or stored and unauthorized persons cannot access it
Cleartext
The science of transforming information into a secure form so that it can be transmitted or stored and unauthorized persons cannot access it
Decryption
The science of transforming information into a secure form so that it can be transmitted or stored and unauthorized persons cannot access it
Key
The science of transforming information into a secure form so that it can be transmitted or stored and unauthorized persons cannot access it
GPG
The science of transforming information into a secure form so that it can be transmitted or stored and unauthorized persons cannot access it
PGP
The science of transforming information into a secure form so that it can be transmitted or stored and unauthorized persons cannot access it
EFS
Versions run on Windows, UNIX, and Linux operating systems
Ciphertext
Versions run on Windows, UNIX, and Linux operating systems
Cryptography
Versions run on Windows, UNIX, and Linux operating systems
Steganography
Versions run on Windows, UNIX, and Linux operating systems
Cleartext
Versions run on Windows, UNIX, and Linux operating systems
Decryption
Versions run on Windows, UNIX, and Linux operating systems
Key
Versions run on Windows, UNIX, and Linux operating systems
GPG
Versions run on Windows, UNIX, and Linux operating systems
PGP
Versions run on Windows, UNIX, and Linux operating systems
EFS
A cryptography system for Windows operating systems that use the Windows NTFS file system.
Ciphertext
A cryptography system for Windows operating systems that use the Windows NTFS file system.
Cryptography
A cryptography system for Windows operating systems that use the Windows NTFS file system.
Steganography
A cryptography system for Windows operating systems that use the Windows NTFS file system.
Cleartext
A cryptography system for Windows operating systems that use the Windows NTFS file system.
Decryption
A cryptography system for Windows operating systems that use the Windows NTFS file system.
Key
A cryptography system for Windows operating systems that use the Windows NTFS file system.
GPG
A cryptography system for Windows operating systems that use the Windows NTFS file system.
PGP
A cryptography system for Windows operating systems that use the Windows NTFS file system.
EFS
A mathematical value entered into the algorithm to produce ciphertext
Ciphertext
A mathematical value entered into the algorithm to produce ciphertext
Cryptography
A mathematical value entered into the algorithm to produce ciphertext
Steganography
A mathematical value entered into the algorithm to produce ciphertext
Cleartext
A mathematical value entered into the algorithm to produce ciphertext
Decryption
A mathematical value entered into the algorithm to produce ciphertext
Key
A mathematical value entered into the algorithm to produce ciphertext
GPG
A mathematical value entered into the algorithm to produce ciphertext
PGP
A mathematical value entered into the algorithm to produce ciphertext
EFS
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 11: Basic Cryptography
1
A hash that is created from a set of data can be reversed.
False
2
In MD5, the length of a message is padded to ____ bits.

A) 32
B) 64
C) 128
D) 512
D
3
____ ensures that the information is correct and no unauthorized person or malicious software has altered that data.

A) Confidentiality
B) Availability
C) Encryption
D) Integrity
D
4
The basis for a digital signature rests on the ability of ____ keys to work in both directions.

A) symmetric
B) shared
C) unique
D) asymmetric
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
Symmetric encryption is also called ____ cryptography.

A) private key
B) public key
C) symmetric key
D) shared key
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
The simplest type of stream cipher is a ____ cipher.

A) shift
B) substitution
C) lock
D) loop
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
Cryptography cannot be applied to entire disks.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
____ is designed to replace DES.

A) AES
B) Twofish
C) 3DES
D) RSA
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
The algorithm ____ is a block cipher that operates on 64-bit blocks and can have a key length from 32 to 448 bits.

A) RSA
B) AES
C) Blowfish
D) 3DES
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
One of the most famous ancient cryptographers was ____.

A) Albert Einstein
B) Isaac Newton
C) Julius Caesar
D) Caesar Augustus
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
____ takes plaintext of any length and creates a hash 128 bits long.

A) RSA
B) SHA1
C) MD5
D) MD2
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
____ is a relatively recent cryptographic hash function that has received international recognition and adoption by standards organizations, including the International Organization for Standardization (ISO).

A) Twofish
B) Blowfish
C) Whirlpool
D) Rijndal
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
____ is text that has no formatting (such as bolding or underlining) applied.

A) Plaintext
B) Plain text
C) Simpletext
D) Simple text
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
A ____ cipher rearranges letters without changing them.

A) substitution
B) block
C) loop
D) transposition
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
____ encryption uses two keys instead of only one and these keys are mathematically related.

A) Symmetric
B) Asymmetric
C) Shared
D) Public key
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
The____ is a symmetric cipher that was approved by the NIST in late 2000 as a replacement for DES.

A) AES
B) 3DES
C) RSA
D) Twofish
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
Self-encrypting HDD is commonly found in copiers and multifunction printers as well as point-of-sale systems used in government, financial, and medical environments.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
The most basic type of cryptographic algorithm is a ____ algorithm.

A) hash
B) key
C) digest
D) block
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
Most HSMs are PAN-based appliances that can provide services to multiple devices.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
Steganography can use image files, audio files, or even video files to contain hidden information.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
The original cryptographic algorithms for encrypting and decrypting documents are ____________________ cryptographic algorithms.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
Explain hashing.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
____ attempts to use the unusual and unique behavior of microscopic objects to enable users to securely develop and share keys as well as to detect eavesdropping.

A) Reactive cryptography
B) Symmetric cryptography
C) Analog cryptography
D) Quantum cryptography
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
DES is a(n) ____________________ cipher.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
Discuss how HMAC works.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
A ____ is a number divisible only by itself and 1.

A) prime number
B) prime decimal
C) compound number
D) neutral number
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
A(n) ____________________ is a method used by operating systems to store, retrieve, and organize files.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
Describe how Message Digest2 (MD2) works.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
In information technology, ____________________ is the process of proving that a user performed an action, such as sending an e-mail message or a specific document.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
The ____ is essentially a chip on the motherboard of the computer that provides cryptographic services.

A) TPM
B) SCM
C) reference monitor
D) ODS
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
Discuss how cryptography can help ensure the availability of the data.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
List and describe the characteristics a hashing algorithm must have to be considered secure.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
The ____ algorithm is the most common asymmetric cryptography algorithm and is the basis for several products.

A) AES
B) RSA
C) Twofish
D) Blowfish
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
____ was first proposed in the mid-1980s and it uses sloping curves.

A) FCC
B) RSA
C) ECC
D) IKE
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
Describe the RIPEMD hash.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
NTRUEncrypt uses ____ cryptography that relies on a set of points in space.

A) matrix-based
B) lattice-based
C) linear
D) quantum
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
Describe how a block cipher works.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
Cleartext data that is to be encrypted is called ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
Describe the origins of cryptography.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
Describe the purpose and composition of Suite B.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Describe hard disk drive encryption.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
Takes data, divides it into smaller sections, and hides it in unused portions of a file
Ciphertext
Takes data, divides it into smaller sections, and hides it in unused portions of a file
Cryptography
Takes data, divides it into smaller sections, and hides it in unused portions of a file
Steganography
Takes data, divides it into smaller sections, and hides it in unused portions of a file
Cleartext
Takes data, divides it into smaller sections, and hides it in unused portions of a file
Decryption
Takes data, divides it into smaller sections, and hides it in unused portions of a file
Key
Takes data, divides it into smaller sections, and hides it in unused portions of a file
GPG
Takes data, divides it into smaller sections, and hides it in unused portions of a file
PGP
Takes data, divides it into smaller sections, and hides it in unused portions of a file
EFS
Uses RSA for protecting digital signatures and 3DES or IDEA for symmetric encryption
Ciphertext
Uses RSA for protecting digital signatures and 3DES or IDEA for symmetric encryption
Cryptography
Uses RSA for protecting digital signatures and 3DES or IDEA for symmetric encryption
Steganography
Uses RSA for protecting digital signatures and 3DES or IDEA for symmetric encryption
Cleartext
Uses RSA for protecting digital signatures and 3DES or IDEA for symmetric encryption
Decryption
Uses RSA for protecting digital signatures and 3DES or IDEA for symmetric encryption
Key
Uses RSA for protecting digital signatures and 3DES or IDEA for symmetric encryption
GPG
Uses RSA for protecting digital signatures and 3DES or IDEA for symmetric encryption
PGP
Uses RSA for protecting digital signatures and 3DES or IDEA for symmetric encryption
EFS
To change the secret message back to its original form
Ciphertext
To change the secret message back to its original form
Cryptography
To change the secret message back to its original form
Steganography
To change the secret message back to its original form
Cleartext
To change the secret message back to its original form
Decryption
To change the secret message back to its original form
Key
To change the secret message back to its original form
GPG
To change the secret message back to its original form
PGP
To change the secret message back to its original form
EFS
Data that is in an unencrypted form
Ciphertext
Data that is in an unencrypted form
Cryptography
Data that is in an unencrypted form
Steganography
Data that is in an unencrypted form
Cleartext
Data that is in an unencrypted form
Decryption
Data that is in an unencrypted form
Key
Data that is in an unencrypted form
GPG
Data that is in an unencrypted form
PGP
Data that is in an unencrypted form
EFS
The science of transforming information into a secure form so that it can be transmitted or stored and unauthorized persons cannot access it
Ciphertext
The science of transforming information into a secure form so that it can be transmitted or stored and unauthorized persons cannot access it
Cryptography
The science of transforming information into a secure form so that it can be transmitted or stored and unauthorized persons cannot access it
Steganography
The science of transforming information into a secure form so that it can be transmitted or stored and unauthorized persons cannot access it
Cleartext
The science of transforming information into a secure form so that it can be transmitted or stored and unauthorized persons cannot access it
Decryption
The science of transforming information into a secure form so that it can be transmitted or stored and unauthorized persons cannot access it
Key
The science of transforming information into a secure form so that it can be transmitted or stored and unauthorized persons cannot access it
GPG
The science of transforming information into a secure form so that it can be transmitted or stored and unauthorized persons cannot access it
PGP
The science of transforming information into a secure form so that it can be transmitted or stored and unauthorized persons cannot access it
EFS
Versions run on Windows, UNIX, and Linux operating systems
Ciphertext
Versions run on Windows, UNIX, and Linux operating systems
Cryptography
Versions run on Windows, UNIX, and Linux operating systems
Steganography
Versions run on Windows, UNIX, and Linux operating systems
Cleartext
Versions run on Windows, UNIX, and Linux operating systems
Decryption
Versions run on Windows, UNIX, and Linux operating systems
Key
Versions run on Windows, UNIX, and Linux operating systems
GPG
Versions run on Windows, UNIX, and Linux operating systems
PGP
Versions run on Windows, UNIX, and Linux operating systems
EFS
A cryptography system for Windows operating systems that use the Windows NTFS file system.
Ciphertext
A cryptography system for Windows operating systems that use the Windows NTFS file system.
Cryptography
A cryptography system for Windows operating systems that use the Windows NTFS file system.
Steganography
A cryptography system for Windows operating systems that use the Windows NTFS file system.
Cleartext
A cryptography system for Windows operating systems that use the Windows NTFS file system.
Decryption
A cryptography system for Windows operating systems that use the Windows NTFS file system.
Key
A cryptography system for Windows operating systems that use the Windows NTFS file system.
GPG
A cryptography system for Windows operating systems that use the Windows NTFS file system.
PGP
A cryptography system for Windows operating systems that use the Windows NTFS file system.
EFS
A mathematical value entered into the algorithm to produce ciphertext
Ciphertext
A mathematical value entered into the algorithm to produce ciphertext
Cryptography
A mathematical value entered into the algorithm to produce ciphertext
Steganography
A mathematical value entered into the algorithm to produce ciphertext
Cleartext
A mathematical value entered into the algorithm to produce ciphertext
Decryption
A mathematical value entered into the algorithm to produce ciphertext
Key
A mathematical value entered into the algorithm to produce ciphertext
GPG
A mathematical value entered into the algorithm to produce ciphertext
PGP
A mathematical value entered into the algorithm to produce ciphertext
EFS
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.