Deck 16: Cryptography
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/17
Play
Full screen (f)
Deck 16: Cryptography
1
Which of the following organizations is responsible for issuing and maintaining digital certificates?
A)Certification Authority
B)Certificate Company
C)Certificate Storage
D)Certificate Agency
A)Certification Authority
B)Certificate Company
C)Certificate Storage
D)Certificate Agency
Certification Authority
2
John wants to check the validity of a digital certificate. Which of the following should he use?
A)Trust model
B)Certificate policy
C)Key escrow
D)Certificate revocation list
A)Trust model
B)Certificate policy
C)Key escrow
D)Certificate revocation list
Certificate revocation list
3
What is the block size of the SHA-1 algorithm?
A)256 bits
B)64 bits
C)512 bits
D)128 bits
A)256 bits
B)64 bits
C)512 bits
D)128 bits
512 bits
4
Which of the following Symmetric Algorithms uses a key size of up to 2,040 bits?
A)Blowfish
B)RC5
C)IDEA
D)CAST
A)Blowfish
B)RC5
C)IDEA
D)CAST
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
5
David wants to use symmetric-key encryption to encrypt and decrypt data. How many keys will he need?
A)3
B)4
C)2
D)1
A)3
B)4
C)2
D)1
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
6
What is the block size used by the Blowfish algorithm?
A)64 bits
B)100 bits
C)128 bits
D)150 bits
A)64 bits
B)100 bits
C)128 bits
D)150 bits
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following standards does S/MIME use?
A)PKCS #7
B)PKCS#4
C)TLS
D)X)509
A)PKCS #7
B)PKCS#4
C)TLS
D)X)509
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following can PGP not encrypt?
A)Full Disk
B)Individual File
C)E-mails
D)Hard copies
A)Full Disk
B)Individual File
C)E-mails
D)Hard copies
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
9
What is a hardware based encryption device that stores keys that protect information called?
A)TPM
B)DMZ
C)SLP
D)TFTP
A)TPM
B)DMZ
C)SLP
D)TFTP
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
10
A simple way to secure hardware, such as laptops and PCs, with a key or combination would be:
A)Padlock
B)Cable Locks
C)Key pad
D)Rope
A)Padlock
B)Cable Locks
C)Key pad
D)Rope
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
11
What is a company that can authorize the issuing of Digital Certificates called?
A)Certificate Authority
B)Certificate Assigner
C)Certificate Headquarter
D)Certificate Distributer
A)Certificate Authority
B)Certificate Assigner
C)Certificate Headquarter
D)Certificate Distributer
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
12
What is used for encrypting and decrypting disk partitions, e-mails, files and other data that use hashing, symmetric cryptography and public key cryptography?
A)TFTP
B)HTTPS
C)PGP
D)SSH
A)TFTP
B)HTTPS
C)PGP
D)SSH
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
13
A way of concealing messages from even being seen except from the sender and receiver is:
A)Cryptography
B)Steganography
C)Hiding
D)Concealment
A)Cryptography
B)Steganography
C)Hiding
D)Concealment
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
14
What kind of trust model is in place when a CA is both the root and subordinate as is every other CA in the organization?
A)Hybrid Trust
B)Rooted Trust
C)User Trust
D)Network Trust
A)Hybrid Trust
B)Rooted Trust
C)User Trust
D)Network Trust
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
15
Which Cryptographic hash function uses a 128-bit hash and is not collision resistant?
A)SHA
B)AES
C)MD5
D)3DES
A)SHA
B)AES
C)MD5
D)3DES
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
16
What is a digital signature?
A)A png of someone's signature.
B)A Cryptographic way of remotely signing a document.
C)A mathematical way of verifying the authenticity of a document.
D)A way to protect the user from themselves.
A)A png of someone's signature.
B)A Cryptographic way of remotely signing a document.
C)A mathematical way of verifying the authenticity of a document.
D)A way to protect the user from themselves.
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
17
What was the first IEEE encryption standard for 802.11 wireless communications?
A)WPA
B)WEP
C)WPA2
D)CHAP
A)WPA
B)WEP
C)WPA2
D)CHAP
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck