Deck 6: Cryptography
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/20
Play
Full screen (f)
Deck 6: Cryptography
1
A key is a parameter that controls the transformation of plaintext into ciphertext or vice versa.
True
2
Substitution is also referred to as permutation.
False
3
Julius Caesar created the scytale cipher.
False
4
The Caesar cipher and the Vigenere cipher are two of the earliest forms of substitution ciphers.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
5
In a hybrid cipher, the asymmetric algorithm provides the keys used for encryption.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
6
DES and 3DES are symmetric algorithms.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
7
Diffie-Hellman provides secure key distribution, confidentiality,
authentication, and nonrepudiation.
authentication, and nonrepudiation.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
8
The U.S. government requires the usage of SHA-2 instead of MD5.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
9
The U.S. federal government requires the use of DSA, RSA, or Elliptic Curve DSA (ECDSA) and SHA for digital signatures.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
10
Secure Sockets Layer (SSL) is a transport layer protocol that provides encryption, server and client authentication, and message integrity.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
11
Which term is used for a message in its original format?
A) Encryption
B) Decryption
C) Ciphertext
D) Plaintext
A) Encryption
B) Decryption
C) Ciphertext
D) Plaintext
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
12
Which term is used for the amount of time and resources that would be needed to break the encryption?
A) Confusion
B) Avalanche affect
C) Work factor
D) Trapdoor
A) Confusion
B) Avalanche affect
C) Work factor
D) Trapdoor
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
13
Which cipher uses 27 shift alphabets with letters being shifted up one place?
A) Scytale cipher
B) Vigenere cipher
C) Caesar cipher
D) World War II Enigma
A) Scytale cipher
B) Vigenere cipher
C) Caesar cipher
D) World War II Enigma
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
14
What is another term for a null cipher?
A) Concealment cipher
B) Substitution cipher
C) Running key cipher
D) Transposition cipher
A) Concealment cipher
B) Substitution cipher
C) Running key cipher
D) Transposition cipher
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following is the most secure encryption scheme that can be used?
A) Symmetric cipher
B) One-way hash
C) Steganography
D) One-time pad
A) Symmetric cipher
B) One-way hash
C) Steganography
D) One-time pad
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following is NOT a symmetric algorithm?
A) CAST
B) IDEA
C) RSA
D) Twofish
A) CAST
B) IDEA
C) RSA
D) Twofish
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
17
What should you implement to prevent man-in-the-middle attacks against the Diffie-Hellman algorithm?
A) One-way hash
B) Digital certificates
C) Zero Knowledge Proof
D) Private keys
A) One-way hash
B) Digital certificates
C) Zero Knowledge Proof
D) Private keys
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
18
Which hash function produces 128-, 160-, or 192-bit hash values after performing 24 rounds of computations on 512-bit blocks?
A) Tiger
B) HAVAL
C) SHA-2
D) MAC
A) Tiger
B) HAVAL
C) SHA-2
D) MAC
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
19
Which entity creates and signs digital certificates, maintains the certificates, and revokes them when necessary?
A) CRL
B) OCSP
C) RA
D) CA
A) CRL
B) OCSP
C) RA
D) CA
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following is NOT an e-mail standard?
A) MIME
B) S/MIME
C) IPsec
D) PGP
A) MIME
B) S/MIME
C) IPsec
D) PGP
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck