Chapter 03 Quiz – Basic Cyprography Flashcards
Questions 20
Question # 01
The XOR cipher is based on the binary operation eXclusive OR that compares two bits.
a. True
b. False
a. True
Question # 02
In information technology, non-repudiation is the process of proving that a user performed an action.
a. True
b. False
a. True
Question # 03
A collision attack is an attempt to find two input strings of a hash function that produce the same hash result.
a. True
b. False
a. True
Question # 04
If using the MD5 hashing algorithm, what is the length to which each message is padded?
a. 32 bits
b. 64 bits
c. 128 bits
d. 512 bits
d. 512 bits
Question # 05
Which type of cryptographic algorithm takes an input string of any length, and returns a string of any requested variable length?
a. substitution
b. block
c. loop
d. sponge
d. sponge
Question # 06
After the DES cipher was broken and no longer considered secure, what encryption algorithm was made as its successor?
a. AES
b. Twofish
c. 3DES
d. RSA
c. 3DES
Question # 07
Which of the following is not one of the functions of a digital signature?
a. verification of the sender
b. prevention of the sender from disowning the message
c. prove the integrity of the message
d. protect the public key
d. protect the public key
Question # 08
Which of the following asymmetric cryptography algorithms is most commonly used?
a. AES
b. RSA
c. Twofish
d. Blowfish
b. RSA
Question # 09
What widely used commercial asymmetric cryptography software can be used for encrypting files and email messages?
a. PGP
b. GPG
c. EFS
d. GNUPG
a. PGP
Question # 10
The SHA-1 hashing algorithm creates a digest that is how many bits in length?
a. 96 bits
b. 128 bits
c. 160 bits
d. 192 bits
c. 160 bits
Question # 11
What type of cipher takes one character and replaces it with one character, working one character at a time?
a. block cipher
b. single cipher
c. unit cipher
d. stream cipher
d. stream cipher
Question # 12
What term describes data actions being performed by endpoint devices, such as printing a report from a desktop computer?
a. data-in-transit
b. data-in-play
c. data-at-rest
d. data-in-use
d. data-in-use
Question # 13
What alternative term can be used to describe asymmetric cryptographic algorithms?
a. user key cryptography
b. public key cryptography
c. private key cryptography
d. cipher-text cryptography
b. public key cryptography
Question # 14
Which of the following are considered to be common asymmetric cryptographic algorithms? (Choose all that apply.)
a. Data Encryption Standard
b. Elliptic Curve Cryptography
c. Advanced Encryption Standard
d. Digital Signature Algorithm
b. Elliptic Curve Cryptography
d. Digital Signature Algorithm
Question # 15
Which key exchange requires Alice and Bob to each agree upon a large prime number and related integer?
a. Quantum Prime
b. Prime-Curve
c. Diffie-Hellman
d. Elliptic Curve Diffie-Hellman
c. Diffie-Hellman