Chapter 03 Quiz – Basic Cyprography Flashcards
Questions 20
Question # 01
The XOR cipher is based on the binary operation eXclusive OR that compares two bits.
a. True
b. False
a. True
Question # 02
In information technology, non-repudiation is the process of proving that a user performed an action.
a. True
b. False
a. True
Question # 03
A collision attack is an attempt to find two input strings of a hash function that produce the same hash result.
a. True
b. False
a. True
Question # 04
If using the MD5 hashing algorithm, what is the length to which each message is padded?
a. 32 bits
b. 64 bits
c. 128 bits
d. 512 bits
d. 512 bits
Question # 05
Which type of cryptographic algorithm takes an input string of any length, and returns a string of any requested variable length?
a. substitution
b. block
c. loop
d. sponge
d. sponge
Question # 06
After the DES cipher was broken and no longer considered secure, what encryption algorithm was made as its successor?
a. AES
b. Twofish
c. 3DES
d. RSA
c. 3DES
Question # 07
Which of the following is not one of the functions of a digital signature?
a. verification of the sender
b. prevention of the sender from disowning the message
c. prove the integrity of the message
d. protect the public key
d. protect the public key
Question # 08
Which of the following asymmetric cryptography algorithms is most commonly used?
a. AES
b. RSA
c. Twofish
d. Blowfish
b. RSA
Question # 09
What widely used commercial asymmetric cryptography software can be used for encrypting files and email messages?
a. PGP
b. GPG
c. EFS
d. GNUPG
a. PGP
Question # 10
The SHA-1 hashing algorithm creates a digest that is how many bits in length?
a. 96 bits
b. 128 bits
c. 160 bits
d. 192 bits
c. 160 bits
Question # 11
What type of cipher takes one character and replaces it with one character, working one character at a time?
a. block cipher
b. single cipher
c. unit cipher
d. stream cipher
d. stream cipher
Question # 12
What term describes data actions being performed by endpoint devices, such as printing a report from a desktop computer?
a. data-in-transit
b. data-in-play
c. data-at-rest
d. data-in-use
d. data-in-use
Question # 13
What alternative term can be used to describe asymmetric cryptographic algorithms?
a. user key cryptography
b. public key cryptography
c. private key cryptography
d. cipher-text cryptography
b. public key cryptography
Question # 14
Which of the following are considered to be common asymmetric cryptographic algorithms? (Choose all that apply.)
a. Data Encryption Standard
b. Elliptic Curve Cryptography
c. Advanced Encryption Standard
d. Digital Signature Algorithm
b. Elliptic Curve Cryptography
d. Digital Signature Algorithm
Question # 15
Which key exchange requires Alice and Bob to each agree upon a large prime number and related integer?
a. Quantum Prime
b. Prime-Curve
c. Diffie-Hellman
d. Elliptic Curve Diffie-Hellman
c. Diffie-Hellman
Question # 16
Ciphertext is the scrambled and unreadable output of encryption.
a. True
b. False
a. True
Question # 17
Obfuscation is making something well known or clear.
a. True
b. False
b. False
Question # 18
Which of the following is a public key system that generates random public keys that are different for each session?
a. ephemeral-secrecy
b. perfect forward secrecy
c. public secrecy
d. random-key exchange
b. perfect forward secrecy
Question # 19
What four basic protections can cryptography support?
Cryptography can support confidentiality, integrity, authentication, and non-repudiation.
Question # 20
What is meant by the phrase “security through obscurity,” and why is this concept not accurate?
Security through obscurity, or the notion that virtually any system can be made secure so long as outsiders are unaware of it or how it functions.
However, this is a flawed approach since it is essentially impossible to keep “secrets” from everyone.