Deck 3: Basic Cryptography
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 3: Basic Cryptography
1
Encryption is the practice of transforming information so that it is secure and cannot be accessed by unauthorized parties.
False
2
What is a block cipher algorithm that operates on 64-bit blocks and can have a key length from 32 to 448 bits?
A)Twofish
B)Blowfish
C)Whirlpool
D)Rijndal
A)Twofish
B)Blowfish
C)Whirlpool
D)Rijndal
B
3
A collision attack is an attempt to find two input strings of a hash function that produce the same hash result.
True
4
Wireless data networks are particularly susceptible to known ciphertext attacks.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
GNU Privacy Guard a proprietary software that runs on different operating systems.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
The XOR cipher is based on the binary operation eXclusive OR that compares two bits.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
One of the first popular symmetric cryptography algorithms was RSA.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
The simplest type of stream cipher,one in which one letter or character is exchanged for another,is known as what?
A)shift
B)substitution
C)lock
D)loop
A)shift
B)substitution
C)lock
D)loop
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
In which type of encryption is the same key used to encrypt and decrypt data?
A)private
B)public
C)symmetric
D)asymmetric
A)private
B)public
C)symmetric
D)asymmetric
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
Asymmetric cryptographic algorithms are also known as private key cryptography.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
If using the MD5 hashing algorithm,what is the length to which each message is padded?
A)32 bits
B)64 bits
C)128 bits
D)512 bits
A)32 bits
B)64 bits
C)128 bits
D)512 bits
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
Obfuscation is making something well known or clear.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Which type of cryptographic algorithm takes an input string of any length,and returns a string of any requested variable length?
A)substitution
B)block
C)loop
D)sponge
A)substitution
B)block
C)loop
D)sponge
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following is not one of the functions of a digital signature?
A)verification of the sender
B)prevention of the sender from disowning the message
C)prove the integrity of the message
D)protect the public key
A)verification of the sender
B)prevention of the sender from disowning the message
C)prove the integrity of the message
D)protect the public key
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
Ciphertext is the scrambled and unreadable output of encryption.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
What type of cryptography uses two keys instead of just one,generating both a private and a public key?
A)symmetric
B)asymmetric
C)shared
D)open
A)symmetric
B)asymmetric
C)shared
D)open
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following asymmetric cryptography algorithms is most commonly used?
A)AES
B)RSA
C)Twofish
D)Blowfish
A)AES
B)RSA
C)Twofish
D)Blowfish
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Which standard was approved by NIST in late 2000 as a replacement for DES?
A)AES
B)3DES
C)RSA
D)Twofish
A)AES
B)3DES
C)RSA
D)Twofish
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
In information technology,non-repudiation is the process of proving that a user performed an action.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
After the DES cipher was broken and no longer considered secure,what encryption algorithm was made as its successor?
A)AES
B)Twofish
C)3DES
D)RSA
A)AES
B)Twofish
C)3DES
D)RSA
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
The SHA-1 hashing algorithm creates a digest that is how many bits in length?
A)96 bits
B)128 bits
C)160 bits
D)192 bits
A)96 bits
B)128 bits
C)160 bits
D)192 bits
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following is a public key system that generates random public keys that are different for each session?
A)ephemeral-secrecy
B)perfect forward secrecy
C)public secrecy
D)random-key exchange
A)ephemeral-secrecy
B)perfect forward secrecy
C)public secrecy
D)random-key exchange
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Data that is in an unencrypted form is referred to as which of the following?
A)crypttext
B)plain text
C)simpletext
D)cleartext
A)crypttext
B)plain text
C)simpletext
D)cleartext
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Which key exchange requires Alice and Bob to each agree upon a large prime number and related integer?
A)Quantum Prime
B)Prime-Curve
C)Diffie-Hellman
D)Elliptic Curve Diffie-Hellman
A)Quantum Prime
B)Prime-Curve
C)Diffie-Hellman
D)Elliptic Curve Diffie-Hellman
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
What type of cipher takes one character and replaces it with one character,working one character at a time?
A)block cipher
B)single cipher
C)unit cipher
D)stream cipher
A)block cipher
B)single cipher
C)unit cipher
D)stream cipher
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Which hash algorithm's primary design feature is two different and independent parallel chains of computation,the results of which are then combined at the end of the process?
A)SHA-384
B)HMAC
C)RIPEMD
D)MD5
A)SHA-384
B)HMAC
C)RIPEMD
D)MD5
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
What type of message authentication code uses hashing to authenticate the sender by using both a hash function and a secret cryptographic key?
A)SHA-384
B)HMAC
C)RIPEMD
D)MD5
A)SHA-384
B)HMAC
C)RIPEMD
D)MD5
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
What type of cryptographic algorithm creates a unique digital fingerprint of a set of data?
A)hash
B)key
C)digest
D)block
A)hash
B)key
C)digest
D)block
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
In cryptography,which of the five basic protections ensures that the information is correct and no unauthorized person or malicious software has altered that data?
A)confidentiality
B)availability
C)encryption
D)integrity
A)confidentiality
B)availability
C)encryption
D)integrity
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
If Bob receives an encrypted reply message from Alice,whose private key is used to decrypt the received message?
A)Bob's private key.
B)Alice's private key.
C)Bob and Alice's keys.
D)Bob's private key and Alice's public key.
A)Bob's private key.
B)Alice's private key.
C)Bob and Alice's keys.
D)Bob's private key and Alice's public key.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
What term best describes when cryptography is applied to entire disks instead of individual files or groups of files?
A)full disk encryption
B)system encryption
C)OS encryption
D)disk encryption
A)full disk encryption
B)system encryption
C)OS encryption
D)disk encryption
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
What widely used commercial asymmetric cryptography software can be used for encrypting files and email messages?
A)PGP
B)GPG
C)EFS
D)GNUPG
A)PGP
B)GPG
C)EFS
D)GNUPG
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
What term describes data actions being performed by endpoint devices,such as printing a report from a desktop computer?
A)data-in-transit
B)data-in-play
C)data-at-rest
D)data-in-use
A)data-in-transit
B)data-in-play
C)data-at-rest
D)data-in-use
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
When Bob needs to send Alice a message with a digital signature,whose private key is used to encrypt the hash?
A)Bob's private key
B)Alice's private key
C)Bob and Alice's keys.
D)Bob's private key and Alice's public key.
A)Bob's private key
B)Alice's private key
C)Bob and Alice's keys.
D)Bob's private key and Alice's public key.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Which of the following are considered to be common asymmetric cryptographic algorithms? (Choose all that apply. )
A)Data Encryption Standard
B)Elliptic Curve Cryptography
C)Advanced Encryption Standard
D)Digital Signature Algorithm
A)Data Encryption Standard
B)Elliptic Curve Cryptography
C)Advanced Encryption Standard
D)Digital Signature Algorithm
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following is more secure than software encryption?
A)hardware encryption
B)private encryption
C)application encryption
D)full disk encryption
A)hardware encryption
B)private encryption
C)application encryption
D)full disk encryption
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
What is the U.S.federal government standard for digital signatures?
A)Data Encryption Standard
B)Elliptic Curve Cryptography
C)Advanced Encryption Standard
D)Digital Signature Algorithm
A)Data Encryption Standard
B)Elliptic Curve Cryptography
C)Advanced Encryption Standard
D)Digital Signature Algorithm
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
What alternative term can be used to describe asymmetric cryptographic algorithms?
A)user key cryptography
B)public key cryptography
C)private key cryptography
D)cipher-text cryptography
A)user key cryptography
B)public key cryptography
C)private key cryptography
D)cipher-text cryptography
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
What cryptographic method,first proposed in the mid-1980s,makes use of sloping curves instead of large prime numbers?
A)FCC
B)RSA
C)ECC
D)IKE
A)FCC
B)RSA
C)ECC
D)IKE
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
What technology uses a chip on the motherboard of the computer to provide cryptographic services?
A)SEDs
B)FDE
C)TPM
D)HSM
A)SEDs
B)FDE
C)TPM
D)HSM
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
What characteristics are needed to consider a hashing algorithm secure?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
What is the difference between a stream cipher and a block cipher?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
What four basic protections can cryptography support?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
What is the Advanced Encryption Standard (AES)?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
What is Elliptic curve cryptography?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
How does a downgrade attack work?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
How does asymmetric encryption work?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
What is meant by the phrase "security through obscurity," and why is this concept not accurate?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
What is a pseudorandom number generator?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Explain how a hash algorithm works and how it is primarily used.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck