Deck 6: Encryption
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/25
Play
Full screen (f)
Deck 6: Encryption
1
Which is a block cipher developed by Belgian researchers and providing 128-,192-,and 256-bit key sizes?
A)AES
B)Blowfish
C)DES3
D)RSA
A)AES
B)Blowfish
C)DES3
D)RSA
A
2
Which is true about public key encryption?
A)It uses symmetric keys.
B)It uses two different keys.
C)Both keys must be closely protected to avoid hacking.
D)It is based on the PGP protocol.
A)It uses symmetric keys.
B)It uses two different keys.
C)Both keys must be closely protected to avoid hacking.
D)It is based on the PGP protocol.
B
3
Which is NOT an encryption method?
A)AES
B)ASCII
C)DES
D)PGP
A)AES
B)ASCII
C)DES
D)PGP
B
4
Changing a message in a such a way that it can be read easily by the intended recipient but cannot be read easily by any intercepting party is called ____________.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
5
Many encryption techniques such as XOR are easily broken because:
A)brute force techniques can break them
B)their basis in binary numbers makes them easy targets for math processors
C)their public keys are readily available
D)the underlying letter and word frequency can still be determined
A)brute force techniques can break them
B)their basis in binary numbers makes them easy targets for math processors
C)their public keys are readily available
D)the underlying letter and word frequency can still be determined
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
6
Operations not found in normal math that can be performed on binary numbers include all of the following EXCEPT:
A)AND
B)OR
C)NOT
D)XOR
A)AND
B)OR
C)NOT
D)XOR
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
7
Which is a very complicated block cipher using 128-bit keys to generate sub-keys to be applied to multiple blocks at the same time?
A)AES
B)DES
C)DES3
D)IDEA
A)AES
B)DES
C)DES3
D)IDEA
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
8
Which is a symmetric block cipher developed in 1993 that provides variable-length key sizes ranging from 32 to 448 bits?
A)AES
B)Blowfish
C)DES3
D)IDEA
A)AES
B)Blowfish
C)DES3
D)IDEA
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
9
Which is NOT a way in which quantum physics might improve encryption in the future?
A)Computers based on quantum physics would be much faster.
B)If someone tried to read a key without authorization,it could result in destruction of the key.
C)Transferring keys would be immune to interference with subatomic particles.
D)Transferring keys could be based on changing states of subatomic particles.
A)Computers based on quantum physics would be much faster.
B)If someone tried to read a key without authorization,it could result in destruction of the key.
C)Transferring keys would be immune to interference with subatomic particles.
D)Transferring keys could be based on changing states of subatomic particles.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
10
Which is a powerful password cracker that works on Windows and Linux platforms?
A)Brutus
B)John the Ripper
C)Quantum Cracker
D)Solarwinds
A)Brutus
B)John the Ripper
C)Quantum Cracker
D)Solarwinds
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
11
Which is a symmetric key encryption system?
A)AES
B)DES
C)PGP
D)RSA
A)AES
B)DES
C)PGP
D)RSA
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
12
Which is a very early encryption method?
A)AES
B)Caesar cipher
C)DES3
D)WEP
A)AES
B)Caesar cipher
C)DES3
D)WEP
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
13
Attempting to determine a password by simply trying every possible combination within the set parameters until successful is called:
A)authentication auditing
B)brute force
C)password cracking
D)password recovery
A)authentication auditing
B)brute force
C)password cracking
D)password recovery
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
14
An improvement over the Caesar cipher is based on ____________ substitution.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
15
Which type of encrypted communication is most common?
A)Computer and Internet communications
B)Radio communications
C)Telephone conversations
D)Written documents
A)Computer and Internet communications
B)Radio communications
C)Telephone conversations
D)Written documents
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
16
Which is a weakness of Data Encryption Standard?
A)It is based on a 1970s era block cipher.
B)It's complexity in scrambling text makes it very processor-intensive and slow.
C)The key must be transmitted,thus risking it being compromised.
D)Throughput is minimal,making it a poor choice for large files.
A)It is based on a 1970s era block cipher.
B)It's complexity in scrambling text makes it very processor-intensive and slow.
C)The key must be transmitted,thus risking it being compromised.
D)Throughput is minimal,making it a poor choice for large files.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
17
Which is a public key encryption standard developed by three mathematicians in 1977 that provides very high but slow security?
A)AES
B)DES
C)DES3
D)RSA
A)AES
B)DES
C)DES3
D)RSA
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
18
Which is NOT a part of a step in the XOR operation of encryption method.
A)Convert message text to ASCII
B)Convert ASCII to binary
C)XOR binary numbers with a key
D)XOR ASCII with a key
A)Convert message text to ASCII
B)Convert ASCII to binary
C)XOR binary numbers with a key
D)XOR ASCII with a key
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
19
The ____________ cipher is a very old encryption method used by ancient Romans.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
20
Which is a widely used public key system that is considered by many experts to be very secure and is available as a plug-in for Netscape Messenger,MSN Messenger,and other communication software?
A)AES
B)Blowfish
C)IDEA
D)PGP
A)AES
B)Blowfish
C)IDEA
D)PGP
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
21
Information about an individual or organizational identity,their public key,and its expiration date is contained in a digital certificate issued by a(n)____________.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
22
A(n)____________ is actually data attached to a file or e-mail to provide verification of the identity and\or origin of the file or e-mail.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
23
Limiting failed log in attempts minimizes the possibility that attackers will eventually determine a password while using software that repeatedly tries a large range of possibilities in a(n)____________ attack.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
24
XOR is a mathematical operation on performed on ____________ numbers that results in the basis for data encryption.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
25
A free,non-commercial,symmetric block cipher called ____________ uses a variable-length key ranging from 32 to 448 bits.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck