Ch. 5 Flashcards

1
Q

A symmetric cipher that was approved by the NIST in late 2000 as a replacement for DES

A

Advanced Encryption Standard (AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Procedures based on a mathematical formula used to encrypt and decrypt the data

A

algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cryptography that uses two mathematically related keys

A

asymmetric cryptographic algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a cipher that manipulates an entire block of plaintext at one time

A

block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A block cipher that operates on 64-bit blocks and can have a key length from 32 to 448 bits

A

Blowfish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

data that has been encrypted

A

ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

unencrypted data

A

cleartext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The science of transforming information into a secure form so that unauthorized persons cannot access it

A

cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A symmetric block cipher that uses a 56-bit key and encrypts data in 64-bit blocks

A

Data Encryption Standard (DES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

the process of changing ciphertext into plaintext

A

decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a key exchange that requires all parties to agree upon a large prime number and related integer so that the same key can be separately created

A

Diffie-Hllman (DH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A Diffie-Hellman key exchange that uses different keys

A

Diffie-Hellman Ephemeral (DHE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The unique digital fingerprint created by a one-way hash algorithm

A

digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

an electronic verification of the sender

A

digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An algorithm that uses elliptic curves instead of prime numbers to compute keys

A

elliptic curve cryptography (ECC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A Diffie-Hellman key exchange that uses elliptic curve cryptography instead of prime numbers in its computation

A

Elliptic Curve Diffie-Hellman (ECDH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The process of changing plaintext into ciphertext

A

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

a temporary key that is used only once before it is discarded

A

ephemeral key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

free and open-source software that is commonly used to encrypt and decrypt data

A

GNU Privacy Guard (GPG)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A secure cryptographic processor

A

Hardware Security Module (HSM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

an algorithm that creates a unique digital fingerprint

A

hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A hash function that is applied to both the key and the message

A

Hashed Message Authentication code (HMAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Exchanging secure information within normal communication channels

A

in-band

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A mathematical value entered into a cryptographic algorithm to produce encrypted data

A

key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

the process of sending and receiving secure cryptographic keys

A

key exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A common hash algorithm with several different versions

A

message digest (MD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

The current version of MD

A

Message Digest 5 (MD5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

the process of proving that a user performed an action

A

non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

combining plaintext with a random key to create ciphertext that cannot be broken mathematically

A

one-time pad (OTP)

30
Q

exchanging secure information outside the normal communication channels

A

out-of-band

31
Q

public key systems that generate random public keys that are different for each session

A

perfect forward secrecy

32
Q

cleartext data that is to be encrypted and decrypted by a cryptographic algorithm

A

plaintext

33
Q

a commercial product that is commonly used to encrypt files and messages

A

Pretty Good Privacy (PGP)

34
Q

an asymmetric encryption key that does have to be protected

A

private key

35
Q

cryptographic algorithms that use a single key to encrypt and decrypt a message

A

private key cryptography

36
Q

an asymmetric encryption key that does not have to be protected

A

public key

37
Q

cryptography that uses two mathematically related keys

A

public key cryptography

38
Q

a type of asymmetric cryptography that attempts to use the unusual and unique behavior of microscopic objects to enable users to securely develop and share keys

A

quantum cryptography

39
Q

a hash algorithm that uses two different and independent parallel chains of computation and then combines the result at the end of the process

A

RACE Integrity Primitives Evaluation Message Digest (RIPEMD)

40
Q

an RC stream cipher that will accept keys up to 128 bits in length

A

RC4

41
Q

The most common asymmetric cryptography algorithm

A

RSA

42
Q

a secure hash algorithm that creates more secure hash values than Message Digest (MD) algorithms

A

Secure Hash Algorithm (SHA)

43
Q

a cryptographic function that applies a process on the input that has been padded with additional characters until all characters are used

A

sponge function

44
Q

hiding the existence of data within another type of file

A

steganography

45
Q

an algorithm that takes one character and replaces it with one character

A

stream cipher

46
Q

encryption that uses a single key to encrypt and decrypt a message

A

symmetric cryptographic algorithm

47
Q

a symmetric cipher that was designed to replace DES

A

Triple Data Encryption Standard (3DES)

48
Q

a chip on the motherboard of the computer that provides cryptographic services

A

Trusted Platform Module (TPM)

49
Q

a derivation of the Blowfish algorithm that is considered to be strong

A

Twofish

50
Q

cryptography that can be applied to entire disks

A

whole disk encryption

51
Q

The Hashed Message Authentication code (HMAC) _____.

a. encrypts only the key
b. encrypts the key and the message
c. encrypts only the message
d. encrypts the DHE key only

A

b

52
Q

What is the latest version of the Secure Hash Algorithm?

a. SHA-2
b. SHA-3
c. SHA-4
d. SHA-5

A

b

53
Q

All of the following can be broken mathematically EXCEPT _______.

a. AES
b. 3DES
c. SHA
d. OTP

A

d

54
Q

Elliptic Curve Diffie-Hellman (ECDH) is an example of ______.

a. in-band key exchange
b. out-of band key exchange
c. SHA-1 key management
d. AES key certification

A

a

55
Q

Which of the following key exchanges uses the same keys each time?

a. Diffie-Hellman Ephemeral (DHE)
b. Diffie-Hellman (DH)
c. Diffie-Hellman-RSA (DHRSA)
d. Elliptic Curve Diffie-Hellman (ECDH)

A

b

56
Q

Public key systems that generate random public keys that are different for each session are called _____.

a. Public Key Exchange (PKE)
b. Elliptic Curve Diffie-Hellman (ECDH)
c. Diffie-Hellman (DH)
d. perfect forward secrecy

A

d

57
Q

What is data called that is to be encrypted by inputting it into an cryptographic algorithm?

a. plaintext
b. cleartext
c. opentext
d. ciphertext

A

a

58
Q

Which of these is NOT a basic security protection for information that cryptography can provide?

a. risk loss
b. integrity
c. confidentiality
d. authenticity

A

a

59
Q

The areas of a file in which steganography can hide data include all of the following EXCEPT _______.

a. in data that is used to describe the content or structure of the actual data
b. in the directory structure of the file system
c. in the file header fields that describe the file
d. in areas that contain the content data itself

A

b

60
Q

Proving that a user sent an email message is known as ______.

a. repudiation
b. integrity
c. non-repudiation
d. availability

A

c

61
Q

A(n) _____ is not decrypted but is only used for comparison purposes.

a. stream
b. digest
c. algorithm
d. key

A

b

62
Q

Which of these is NOT a characteristic of a secure hash algorithm?

a. Collisions should be rare
b. The results of a hash function should not be reversed
c. The hash should always be the same fixed size
d. A message cannot be produced from a predefined hash

A

a

63
Q

Which protection is provided by hashing?

a. authenticity
b. confidentiality
c. integrity
d. availability

A

c

64
Q

Which of these is the strongest symmetric cryptographic algorithm?

a. Advanced Encryption Standard
b. Data Encryption Standard
c. Triple Data Encryption Standard
d. Rivest Cipher (RC) 1

A

a

65
Q

If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he used to encrypt the message?

a. Alice’s private key
b. Alice public key
c. Bob’s public key
d. Bob’s private key

A

b

66
Q

A digital signature can provide each of the following benefits EXCEPT _____.

a. prove the integrity of the message
b. verify the receiver
c. verify the sender
d. enforce nonrepudiation

A

b

67
Q

Which asymmetric cryptographic algorithm is the most secure?

a. SHA-2
b. BTC-2
c. RSA
d. ME-14

A

c

68
Q

Which asymmetric encryption algorithm uses prime numbers?

a. EFS
b. quantum computing
c. ECC
d. RSA

A

d

69
Q

The trusted Platform Module (TPM) ______.

a. allows the user to boot a corrupted disk and repair it
b. is available only on Windows computers running BitLocker
c. includes a pseudorandom number generator (PRNG)
d. provides cryptographic services in hardware instead of software

A

d

70
Q

Which of these has an onboard key generator and key storage facility, as well as accelerated symmetric and asymmetric encryption, and can back up sensitive material in encrypted form?

a. Trusted Platform Module (TPM)
b. self-encrypting hard disk drives (HDDs)
c. encrypted hardware-based USB devices
d. Hardware Security Module (HSM)

A

d