Deck 7: Encryption Controls

Full screen (f)
exit full mode
Question
Public Key cryptography refers to

A) The use of the same key for both encryption and decryption
B) The use of a secret algorithm for encryption and decryption
C) The use of a secret key only decryption
D) The use of a secret key for encryption
Use Space or
up arrow
down arrow
to flip the card.
Question
Electronic Code Book ECB is not used for encryption since it has inadequate

A) Licensing flexibility
B) Recovery features
C) Diffusion of confusion
D) Parallelism
Question
Ciphertext is

A) The transformation of data to produce ciphertext
B) Text that is unintelligible to the reader
C) A sequence of symbols that controls the operations of encipherment and decipherment
D) A well-defined sequence of steps used to describe cryptographic processes
E) An encryption method that uses no keys
Question
Encryption is

A) The transformation of data to produce ciphertext
B) Text that is unintelligible to the reader
C) A sequence of symbols that controls the operations of encipherment and decipherment
D) A well-defined sequence of steps used to describe cryptographic processes
E) An encryption method that uses no keys
Question
The current standard for secret key encryption is

A) DES Data Encryption Standard
B) AES Advanced Encryption Standard
C) IDEA International Data Encryption Algorithm
D) SHA Secure Hash Algorithm
Question
Public key encryption techniques used in practice are based heavily on

A) Division operations
B) Set operations
C) Extraction operations
D) Modulus operations
Question
Digital signatures are

A) The transformation of data to produce ciphertext
B) The use of cryptography that allows a user to prove the source and integrity of data
C) Text that is unintelligible to the reader
D) A sequence of symbols that controls the operations of encipherment and decipherment
Question
Block encryption uses both

A) Relational and Procedural operations
B) Substitution and permutation
C) Keys and hashes
D) Data and storage
Question
The word Cipher is based on an Arabic word, cifr, that means

A) Sender
B) Secret
C) Nothing
D) Receiver
Question
Cryptanalysis is

A) The art of breaking ciphertext
B) The transformation of data to produce ciphertext
C) The science of creating superior encryption algorithms
D) Text that is unintelligible to the reader
Question
Hash functions are used primarily for

A) Sharing a secret key prior to network transmission
B) Storing data on hard drives
C) Encrypting data during transmission over a network
D) Saving passwords
Question
In the context of encryption, a key is

A) A well-defined sequence of steps used to describe cryptographic processes
B) An encryption method that uses no keys
C) A sequence of symbols that controls the operations of encipherment and decipherment
D) Text that is unintelligible to the reader
Question
In using public key encryption, messages are deciphered using

A) A public key
B) A shared secret key
C) Any key
D) A private key
Question
Desirable properties In good encryption algorithms include

A) Generating characters that appear random
B) Generating output that appears to be of random length
C) Changing at least half the bits in the output when even one bit changes in the input
D) All the above
Question
Claude Shannon developed the framework for secrecy known as

A) Confusion diffusion
B) 4P model
C) 4C model
D) Inversion of control
Question
The first documented instance of encryption was used by

A) Egyptian pharaoh Tutankhamun
B) Italian inventor Leonardo da Vinci
C) Italian artist Michelangelo
D) Roman Emperor Julius Caesar
Question
Hash functions use

A) 2 keys
B) 1 key
C) 0 keys
D) Any of the above, depending upon the specific hash algorithm
Question
A cryptographic algorithm is

A) Symbols that controls encipherment and decipherment
B) A well-defined sequence of steps used to describe cryptographic processes
C) An encryption method that uses no keys
D) Text that is unintelligible to the reader
Question
Secret key cryptography refers to

A) The use of the same key for both encryption and decryption
B) The use of a secret algorithm for encryption and decryption
C) The use of a secret key only for decryption
D) The use of a secret key for encryption
Question
Public key encryption is used primarily for

A) Sharing a secret key prior to network transmission
B) Storing data on hard drives
C) Encrypting data during transmission over a network
D) Saving passwords
Question
The popular encryption method RSA is an example of

A) Secret key encryption
B) Public key encryption
C) Hash functions
D) AES
Question
A certificate used in web applications contains the

A) Shared secret key prior to network transmission
B) The hash output of the data to be transmitted
C) Saved password of the end user for recovery
D) Public key of the server and information about the key provider
Question
For any given input, the length of its hash out is

A) Always shorter than the input
B) Depends upon the length of the input
C) Always the same
D) Always longer than the input
Question
The most common technologies used for secure network communication are

A) VPN and SSL
B) AES and DES
C) PKI and RSA
D) Diffusion and confusion
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/24
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: Encryption Controls
1
Public Key cryptography refers to

A) The use of the same key for both encryption and decryption
B) The use of a secret algorithm for encryption and decryption
C) The use of a secret key only decryption
D) The use of a secret key for encryption
C
2
Electronic Code Book ECB is not used for encryption since it has inadequate

A) Licensing flexibility
B) Recovery features
C) Diffusion of confusion
D) Parallelism
Diffusion of confusion
3
Ciphertext is

A) The transformation of data to produce ciphertext
B) Text that is unintelligible to the reader
C) A sequence of symbols that controls the operations of encipherment and decipherment
D) A well-defined sequence of steps used to describe cryptographic processes
E) An encryption method that uses no keys
B
4
Encryption is

A) The transformation of data to produce ciphertext
B) Text that is unintelligible to the reader
C) A sequence of symbols that controls the operations of encipherment and decipherment
D) A well-defined sequence of steps used to describe cryptographic processes
E) An encryption method that uses no keys
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
5
The current standard for secret key encryption is

A) DES Data Encryption Standard
B) AES Advanced Encryption Standard
C) IDEA International Data Encryption Algorithm
D) SHA Secure Hash Algorithm
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
6
Public key encryption techniques used in practice are based heavily on

A) Division operations
B) Set operations
C) Extraction operations
D) Modulus operations
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
7
Digital signatures are

A) The transformation of data to produce ciphertext
B) The use of cryptography that allows a user to prove the source and integrity of data
C) Text that is unintelligible to the reader
D) A sequence of symbols that controls the operations of encipherment and decipherment
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
8
Block encryption uses both

A) Relational and Procedural operations
B) Substitution and permutation
C) Keys and hashes
D) Data and storage
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
9
The word Cipher is based on an Arabic word, cifr, that means

A) Sender
B) Secret
C) Nothing
D) Receiver
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
10
Cryptanalysis is

A) The art of breaking ciphertext
B) The transformation of data to produce ciphertext
C) The science of creating superior encryption algorithms
D) Text that is unintelligible to the reader
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
11
Hash functions are used primarily for

A) Sharing a secret key prior to network transmission
B) Storing data on hard drives
C) Encrypting data during transmission over a network
D) Saving passwords
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
12
In the context of encryption, a key is

A) A well-defined sequence of steps used to describe cryptographic processes
B) An encryption method that uses no keys
C) A sequence of symbols that controls the operations of encipherment and decipherment
D) Text that is unintelligible to the reader
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
13
In using public key encryption, messages are deciphered using

A) A public key
B) A shared secret key
C) Any key
D) A private key
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
14
Desirable properties In good encryption algorithms include

A) Generating characters that appear random
B) Generating output that appears to be of random length
C) Changing at least half the bits in the output when even one bit changes in the input
D) All the above
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
15
Claude Shannon developed the framework for secrecy known as

A) Confusion diffusion
B) 4P model
C) 4C model
D) Inversion of control
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
16
The first documented instance of encryption was used by

A) Egyptian pharaoh Tutankhamun
B) Italian inventor Leonardo da Vinci
C) Italian artist Michelangelo
D) Roman Emperor Julius Caesar
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
17
Hash functions use

A) 2 keys
B) 1 key
C) 0 keys
D) Any of the above, depending upon the specific hash algorithm
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
18
A cryptographic algorithm is

A) Symbols that controls encipherment and decipherment
B) A well-defined sequence of steps used to describe cryptographic processes
C) An encryption method that uses no keys
D) Text that is unintelligible to the reader
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
19
Secret key cryptography refers to

A) The use of the same key for both encryption and decryption
B) The use of a secret algorithm for encryption and decryption
C) The use of a secret key only for decryption
D) The use of a secret key for encryption
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
20
Public key encryption is used primarily for

A) Sharing a secret key prior to network transmission
B) Storing data on hard drives
C) Encrypting data during transmission over a network
D) Saving passwords
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
21
The popular encryption method RSA is an example of

A) Secret key encryption
B) Public key encryption
C) Hash functions
D) AES
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
22
A certificate used in web applications contains the

A) Shared secret key prior to network transmission
B) The hash output of the data to be transmitted
C) Saved password of the end user for recovery
D) Public key of the server and information about the key provider
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
23
For any given input, the length of its hash out is

A) Always shorter than the input
B) Depends upon the length of the input
C) Always the same
D) Always longer than the input
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
24
The most common technologies used for secure network communication are

A) VPN and SSL
B) AES and DES
C) PKI and RSA
D) Diffusion and confusion
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 24 flashcards in this deck.