Deck 2: Cryptography and Security: Part A

Full screen (f)
exit full mode
Question
The is a polygraphic substitution cipher based on linear algebra.

A)hill cipher
B)playfair cipher
C)affine cipher
D)none of these
Use Space or
up arrow
down arrow
to flip the card.
Question
______________is the practice of concealing a message within another message,image or file.

A)steganography
B)cryptography
C)cipher
D)receiver
Question
In asymmetric key cryptography, the private key is kept by ______________ 

A)sender
B)receiver
C)sender and receiver
D)none of these
Question
What is data encryption standard (DES)?

A)block cipher
B)stream cipher
C)bit cipher
D)byte cipher
Question
In cryptography the original message before being transform is called

A)simple text
B)plain text
C)empty text
D)filled text
Question
An asymmetric-key (or public-key) cipher uses

A)1 key
B)2 key
C)3 key
D)4 key
Question
In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is

A)short
B)flat
C)long
D)thin
Question
The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two parties are not

A)authenticated
B)joined
C)submit
D)separate
Question
In Asymmetric-Key Cryptography, the two keys, e and d, have a special relationship to

A)other
B)data
C)keys
D)each other
Question
For RSA to work, the value of P must be less than the value of

A)p
B)q
C)n
D)r
Question
In RSA, ?(n) = in terms of p and q.

A)(p)/(q)
B)(p)(q)
C)(p-1)(q-1)
D)(p+1)(q+1)
Question
In RSA, we select a value 'e' such that it lies between 0 and ?(n) and it is relatively prime to ?(n).
Question
RSA is also a stream cipher like Merkel-Hellman.
Question
USENET falls under which category of public key sharing?

A)public announcement
B)publicly available directory
C)public key authority
D)public key certificate
Question
PGP makes use of which cryptographic algorithm?

A)rsa
B)aes
C)des
D)robin
Question
Public key cryptography also called as__________________________________________ 

A)asymmetric key cryptography
B)symmetric key cryptography
C)both a and b
D)none of the above
Question
ECC stands for

A)elliptic curve cryptography
B)elliptic cryptography curve
C)error correcting code
D)none of the above
Question
Diffie-Hellman algorithm is widely known as__________________________________________

A)key exchange algorithm
B)key agreement algorithm
C)only a
D)both a and b
Question
Hash function is used for__________________________________________ 

A)message authentication
B)digital signature
C)both a and b
D)only a
Question
RSA algorithm is best example of____________________________   

A)asymmetric key cryptography
B)symmetric key cryptography
C)elliptic curve cryptography
D)all of the above
Question
IPSec is designed to provide security at the __________________________________________

A)transport layer
B)network layer
C)application layer
D)session layer
Question
In tunnel mode, IPSec protects the ____________________________

A)entire ip packet
B)ip header
C)ip payload
D)ip trailer
Question
An attempt to make a computer resource unavailable to its intended users is called ____________________________

A)denial-of-service attack
B)virus attack
C)worms attack
D)botnet process
Question
SSL primarily focuses on ____________________________    Pretty good privacy (PGP) is used in

A)integrity and authenticity
B)integrity and non- repudiation
C)authenticity and privacy
D)confidentiality and integrity
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/24
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 2: Cryptography and Security: Part A
1
The is a polygraphic substitution cipher based on linear algebra.

A)hill cipher
B)playfair cipher
C)affine cipher
D)none of these
hill cipher
2
______________is the practice of concealing a message within another message,image or file.

A)steganography
B)cryptography
C)cipher
D)receiver
steganography
3
In asymmetric key cryptography, the private key is kept by ______________ 

A)sender
B)receiver
C)sender and receiver
D)none of these
receiver
4
What is data encryption standard (DES)?

A)block cipher
B)stream cipher
C)bit cipher
D)byte cipher
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
5
In cryptography the original message before being transform is called

A)simple text
B)plain text
C)empty text
D)filled text
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
6
An asymmetric-key (or public-key) cipher uses

A)1 key
B)2 key
C)3 key
D)4 key
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
7
In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is

A)short
B)flat
C)long
D)thin
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
8
The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two parties are not

A)authenticated
B)joined
C)submit
D)separate
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
9
In Asymmetric-Key Cryptography, the two keys, e and d, have a special relationship to

A)other
B)data
C)keys
D)each other
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
10
For RSA to work, the value of P must be less than the value of

A)p
B)q
C)n
D)r
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
11
In RSA, ?(n) = in terms of p and q.

A)(p)/(q)
B)(p)(q)
C)(p-1)(q-1)
D)(p+1)(q+1)
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
12
In RSA, we select a value 'e' such that it lies between 0 and ?(n) and it is relatively prime to ?(n).
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
13
RSA is also a stream cipher like Merkel-Hellman.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
14
USENET falls under which category of public key sharing?

A)public announcement
B)publicly available directory
C)public key authority
D)public key certificate
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
15
PGP makes use of which cryptographic algorithm?

A)rsa
B)aes
C)des
D)robin
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
16
Public key cryptography also called as__________________________________________ 

A)asymmetric key cryptography
B)symmetric key cryptography
C)both a and b
D)none of the above
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
17
ECC stands for

A)elliptic curve cryptography
B)elliptic cryptography curve
C)error correcting code
D)none of the above
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
18
Diffie-Hellman algorithm is widely known as__________________________________________

A)key exchange algorithm
B)key agreement algorithm
C)only a
D)both a and b
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
19
Hash function is used for__________________________________________ 

A)message authentication
B)digital signature
C)both a and b
D)only a
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
20
RSA algorithm is best example of____________________________   

A)asymmetric key cryptography
B)symmetric key cryptography
C)elliptic curve cryptography
D)all of the above
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
21
IPSec is designed to provide security at the __________________________________________

A)transport layer
B)network layer
C)application layer
D)session layer
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
22
In tunnel mode, IPSec protects the ____________________________

A)entire ip packet
B)ip header
C)ip payload
D)ip trailer
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
23
An attempt to make a computer resource unavailable to its intended users is called ____________________________

A)denial-of-service attack
B)virus attack
C)worms attack
D)botnet process
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
24
SSL primarily focuses on ____________________________    Pretty good privacy (PGP) is used in

A)integrity and authenticity
B)integrity and non- repudiation
C)authenticity and privacy
D)confidentiality and integrity
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 24 flashcards in this deck.