CH 13 - Cryptography Flashcards

1
Q

With a rotation of 4,
what does erwaiv decrypt to?

A. waive
B. wave
C. answer
D. decrypt

A

C.
answer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What do you call a message before it is encrypted?

A. Text
B. Plain text
C. Bare words
D. Bare text

A

B.
Plain text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does PGP use to verify identity?

A. Central authority
B. Web of users
C. Web of trust
D. Central trust authority

A

C.
Web of trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What principle is used to demonstrate that a signed message came from the owner of the key that signed it?

A. Nonrepudiation
B. Nonverifiability
C. Integrity
D. Authority

A

A.
Nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Diffie‐Hellman used for?

A. Key management
B. Key isolation
C. Key exchange
D. Key revocation

A

C.
Key exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How did 3DES improve on DES?

A. Made the key longer
B. Used two keys
C. Changed algorithms
D. Used three keys

A

D.
Used three keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What improvement does elliptic curve cryptography make?

A. Smaller keys improve speed
B. Algorithm is more complex
C. Doesn’t use factoring, which is better
D. Longer keys

A

A.
Smaller keys improve speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is it called when two different data sets yield the same cryptographic hash?

A. Paradox
B. Collision
C. Crash
D. Unrealistic

A

B.
Collision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following terms can be used in a description of asymmetric key encryption?

A. Defined key
B. Multifactor
C. Public key
D. Single factor

A

C.
Public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

If Alice were to send an email to Bob, what key would she use to encrypt the message?

A. PGP key
B. Private key
C. Public key
D. Symmetric key

A

C.
Public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What property allows you to trust someone trusted by a certificate authority you trust?

A. Commutative property
B. Associative property
C. Communicative property
D. Transitive property

A

D.
Transitive property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why is symmetric key encryption typically used over asymmetric key encryption?

A. It’s faster.
B. It’s more secure.
C. It’s easier to implement.
D. It isn’t encumbered with patents.

A

A.
It’s faster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is it called when both symmetric and asymmetric keys are used?

A. Fast cryptosystem
B. Hybrid cryptosystem
C. Super‐symmetric cryptosystem
D. Dual key cryptosystem

A

B.
Hybrid cryptosystem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is MD5 or SHA‐1 commonly used for in cryptography?

A. Media access control (MAC)
B. Machine authentication code (MAC)
C. Message access code (MAC)
D. Message authentication code (MAC)

A

D.
Message authentication code (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of encryption does PGP use?

A. Null key
B. Asymmetric key
C. Trusted key
D. Web key

A

B.
Asymmetric key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What tool would you use to identify ciphersuites in use on a web server?

A. Hydra
B. sslscan
C. tlsscan
D. cipherscan

A

B.
sslscan

17
Q

How does AES protect against related‐key attacks?

A. Longer key lengths
B. Better initialization vectors
C. Implementation doesn’t allow related keys
D. Upgrading to AES‐2

A

C.
Implementation doesn’t allow related keys

18
Q

What is one advantage of using a certificate authority?

A. Trusted third party doing validation
B. A certificate authority is faster
C. Stronger keys are offered
D. They support more cipher suites

A

A.
Trusted third party doing validation

19
Q

How does a certificate authority keep a list of valid certificates up‐to‐date?

A. Periodic CA update
B. Hashing the list
C. Re‐validating identities
D. Certificate revocation lists

A

D.
Certificate revocation lists

20
Q

What security property suggests that an email signed by an individual’s key must have come from that person?

A. Confidentiality
B. Integrity
C. Availability
D. Nonrepudiation

A

D.
Nonrepudiation