Deck 7: Encryption Controls
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/24
Play
Full screen (f)
Deck 7: Encryption Controls
1
Public Key cryptography refers to
A) The use of the same key for both encryption and decryption
B) The use of a secret algorithm for encryption and decryption
C) The use of a secret key only decryption
D) The use of a secret key for encryption
A) The use of the same key for both encryption and decryption
B) The use of a secret algorithm for encryption and decryption
C) The use of a secret key only decryption
D) The use of a secret key for encryption
C
2
Electronic Code Book ECB is not used for encryption since it has inadequate
A) Licensing flexibility
B) Recovery features
C) Diffusion of confusion
D) Parallelism
A) Licensing flexibility
B) Recovery features
C) Diffusion of confusion
D) Parallelism
Diffusion of confusion
3
Ciphertext is
A) The transformation of data to produce ciphertext
B) Text that is unintelligible to the reader
C) A sequence of symbols that controls the operations of encipherment and decipherment
D) A well-defined sequence of steps used to describe cryptographic processes
E) An encryption method that uses no keys
A) The transformation of data to produce ciphertext
B) Text that is unintelligible to the reader
C) A sequence of symbols that controls the operations of encipherment and decipherment
D) A well-defined sequence of steps used to describe cryptographic processes
E) An encryption method that uses no keys
B
4
Encryption is
A) The transformation of data to produce ciphertext
B) Text that is unintelligible to the reader
C) A sequence of symbols that controls the operations of encipherment and decipherment
D) A well-defined sequence of steps used to describe cryptographic processes
E) An encryption method that uses no keys
A) The transformation of data to produce ciphertext
B) Text that is unintelligible to the reader
C) A sequence of symbols that controls the operations of encipherment and decipherment
D) A well-defined sequence of steps used to describe cryptographic processes
E) An encryption method that uses no keys
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
5
The current standard for secret key encryption is
A) DES Data Encryption Standard
B) AES Advanced Encryption Standard
C) IDEA International Data Encryption Algorithm
D) SHA Secure Hash Algorithm
A) DES Data Encryption Standard
B) AES Advanced Encryption Standard
C) IDEA International Data Encryption Algorithm
D) SHA Secure Hash Algorithm
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
6
Public key encryption techniques used in practice are based heavily on
A) Division operations
B) Set operations
C) Extraction operations
D) Modulus operations
A) Division operations
B) Set operations
C) Extraction operations
D) Modulus operations
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
7
Digital signatures are
A) The transformation of data to produce ciphertext
B) The use of cryptography that allows a user to prove the source and integrity of data
C) Text that is unintelligible to the reader
D) A sequence of symbols that controls the operations of encipherment and decipherment
A) The transformation of data to produce ciphertext
B) The use of cryptography that allows a user to prove the source and integrity of data
C) Text that is unintelligible to the reader
D) A sequence of symbols that controls the operations of encipherment and decipherment
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
8
Block encryption uses both
A) Relational and Procedural operations
B) Substitution and permutation
C) Keys and hashes
D) Data and storage
A) Relational and Procedural operations
B) Substitution and permutation
C) Keys and hashes
D) Data and storage
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
9
The word Cipher is based on an Arabic word, cifr, that means
A) Sender
B) Secret
C) Nothing
D) Receiver
A) Sender
B) Secret
C) Nothing
D) Receiver
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
10
Cryptanalysis is
A) The art of breaking ciphertext
B) The transformation of data to produce ciphertext
C) The science of creating superior encryption algorithms
D) Text that is unintelligible to the reader
A) The art of breaking ciphertext
B) The transformation of data to produce ciphertext
C) The science of creating superior encryption algorithms
D) Text that is unintelligible to the reader
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
11
Hash functions are used primarily for
A) Sharing a secret key prior to network transmission
B) Storing data on hard drives
C) Encrypting data during transmission over a network
D) Saving passwords
A) Sharing a secret key prior to network transmission
B) Storing data on hard drives
C) Encrypting data during transmission over a network
D) Saving passwords
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
12
In the context of encryption, a key is
A) A well-defined sequence of steps used to describe cryptographic processes
B) An encryption method that uses no keys
C) A sequence of symbols that controls the operations of encipherment and decipherment
D) Text that is unintelligible to the reader
A) A well-defined sequence of steps used to describe cryptographic processes
B) An encryption method that uses no keys
C) A sequence of symbols that controls the operations of encipherment and decipherment
D) Text that is unintelligible to the reader
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
13
In using public key encryption, messages are deciphered using
A) A public key
B) A shared secret key
C) Any key
D) A private key
A) A public key
B) A shared secret key
C) Any key
D) A private key
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
14
Desirable properties In good encryption algorithms include
A) Generating characters that appear random
B) Generating output that appears to be of random length
C) Changing at least half the bits in the output when even one bit changes in the input
D) All the above
A) Generating characters that appear random
B) Generating output that appears to be of random length
C) Changing at least half the bits in the output when even one bit changes in the input
D) All the above
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
15
Claude Shannon developed the framework for secrecy known as
A) Confusion diffusion
B) 4P model
C) 4C model
D) Inversion of control
A) Confusion diffusion
B) 4P model
C) 4C model
D) Inversion of control
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
16
The first documented instance of encryption was used by
A) Egyptian pharaoh Tutankhamun
B) Italian inventor Leonardo da Vinci
C) Italian artist Michelangelo
D) Roman Emperor Julius Caesar
A) Egyptian pharaoh Tutankhamun
B) Italian inventor Leonardo da Vinci
C) Italian artist Michelangelo
D) Roman Emperor Julius Caesar
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
17
Hash functions use
A) 2 keys
B) 1 key
C) 0 keys
D) Any of the above, depending upon the specific hash algorithm
A) 2 keys
B) 1 key
C) 0 keys
D) Any of the above, depending upon the specific hash algorithm
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
18
A cryptographic algorithm is
A) Symbols that controls encipherment and decipherment
B) A well-defined sequence of steps used to describe cryptographic processes
C) An encryption method that uses no keys
D) Text that is unintelligible to the reader
A) Symbols that controls encipherment and decipherment
B) A well-defined sequence of steps used to describe cryptographic processes
C) An encryption method that uses no keys
D) Text that is unintelligible to the reader
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
19
Secret key cryptography refers to
A) The use of the same key for both encryption and decryption
B) The use of a secret algorithm for encryption and decryption
C) The use of a secret key only for decryption
D) The use of a secret key for encryption
A) The use of the same key for both encryption and decryption
B) The use of a secret algorithm for encryption and decryption
C) The use of a secret key only for decryption
D) The use of a secret key for encryption
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
20
Public key encryption is used primarily for
A) Sharing a secret key prior to network transmission
B) Storing data on hard drives
C) Encrypting data during transmission over a network
D) Saving passwords
A) Sharing a secret key prior to network transmission
B) Storing data on hard drives
C) Encrypting data during transmission over a network
D) Saving passwords
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
21
The popular encryption method RSA is an example of
A) Secret key encryption
B) Public key encryption
C) Hash functions
D) AES
A) Secret key encryption
B) Public key encryption
C) Hash functions
D) AES
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
22
A certificate used in web applications contains the
A) Shared secret key prior to network transmission
B) The hash output of the data to be transmitted
C) Saved password of the end user for recovery
D) Public key of the server and information about the key provider
A) Shared secret key prior to network transmission
B) The hash output of the data to be transmitted
C) Saved password of the end user for recovery
D) Public key of the server and information about the key provider
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
23
For any given input, the length of its hash out is
A) Always shorter than the input
B) Depends upon the length of the input
C) Always the same
D) Always longer than the input
A) Always shorter than the input
B) Depends upon the length of the input
C) Always the same
D) Always longer than the input
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
24
The most common technologies used for secure network communication are
A) VPN and SSL
B) AES and DES
C) PKI and RSA
D) Diffusion and confusion
A) VPN and SSL
B) AES and DES
C) PKI and RSA
D) Diffusion and confusion
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck