CH 13 - Cryptography Flashcards
With a rotation of 4,
what does erwaiv decrypt to?
A. waive
B. wave
C. answer
D. decrypt
C.
answer
What do you call a message before it is encrypted?
A. Text
B. Plain text
C. Bare words
D. Bare text
B.
Plain text
What does PGP use to verify identity?
A. Central authority
B. Web of users
C. Web of trust
D. Central trust authority
C.
Web of trust
What principle is used to demonstrate that a signed message came from the owner of the key that signed it?
A. Nonrepudiation
B. Nonverifiability
C. Integrity
D. Authority
A.
Nonrepudiation
What is Diffie‐Hellman used for?
A. Key management
B. Key isolation
C. Key exchange
D. Key revocation
C.
Key exchange
How did 3DES improve on DES?
A. Made the key longer
B. Used two keys
C. Changed algorithms
D. Used three keys
D.
Used three keys
What improvement does elliptic curve cryptography make?
A. Smaller keys improve speed
B. Algorithm is more complex
C. Doesn’t use factoring, which is better
D. Longer keys
A.
Smaller keys improve speed
What is it called when two different data sets yield the same cryptographic hash?
A. Paradox
B. Collision
C. Crash
D. Unrealistic
B.
Collision
Which of the following terms can be used in a description of asymmetric key encryption?
A. Defined key
B. Multifactor
C. Public key
D. Single factor
C.
Public key
If Alice were to send an email to Bob, what key would she use to encrypt the message?
A. PGP key
B. Private key
C. Public key
D. Symmetric key
C.
Public key
What property allows you to trust someone trusted by a certificate authority you trust?
A. Commutative property
B. Associative property
C. Communicative property
D. Transitive property
D.
Transitive property
Why is symmetric key encryption typically used over asymmetric key encryption?
A. It’s faster.
B. It’s more secure.
C. It’s easier to implement.
D. It isn’t encumbered with patents.
A.
It’s faster.
What is it called when both symmetric and asymmetric keys are used?
A. Fast cryptosystem
B. Hybrid cryptosystem
C. Super‐symmetric cryptosystem
D. Dual key cryptosystem
B.
Hybrid cryptosystem
What is MD5 or SHA‐1 commonly used for in cryptography?
A. Media access control (MAC)
B. Machine authentication code (MAC)
C. Message access code (MAC)
D. Message authentication code (MAC)
D.
Message authentication code (MAC)
What type of encryption does PGP use?
A. Null key
B. Asymmetric key
C. Trusted key
D. Web key
B.
Asymmetric key