Chapter 3 Flashcards

1
Q

Proving that a user sent an email message is known as .

Non-repudiation

Repudiation

Integrity

Availability

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A(n) is not decrypted but is only used for comparison purposes.

Key

Stream

Digest

Algorithm

A

Digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of these is NOT a characteristic of a secure hash algorithm?

Collisions should be rare.

A message cannot be produced from a predefined hash.

The results of a hash function should not be reversed.

The hash should always be the same fixed size.

A

Collisions should be rare.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Alyosha was explaining to a friend the importance of protecting a cryptographic key from cryptoanalysis. He said that the key should not relate in a simple way to the cipher text. Which protection is Alyosha describing?

Diffusion

Confusion

Integrity

Chaos

A

Confusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of these is the strongest symmetric cryptographic algorithm?

Data Encryption Standard

Triple Data Encryption Standard

Advanced Encryption Standard

RC 1

A

Advanced Encryption Standard (AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message?

Alice’s private key

Bob’s public key

Alice’s public key

Bob’s private key

A

Alice’s public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Egor wanted to use a digital signature. Which of the following benefits will the digital signature not provide?

Verify the sender

Prove the integrity of the message

Verify the receiver

Enforce nonrepudiation

A

Verify the receiver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Illya was asked to recommend the most secure asymmetric cryptographic algorithm to his supervisor. Which of the following did he choose?

SHA-2

ME-312

BTC-2

RSA

A

RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

At a staff meeting one of the technicians suggested that the enterprise protect its new web server by hiding it and not telling anyone where it is located. Iosif raised his hand and said that security through obscurity was a poor idea. Why did he say that?

It is an unproven approach and has never been tested.

It would be too costly to have one isolated server by itself.

It would be essentially impossible to keep its location a secret from everyone.

It depends too heavily upon non-repudiation in order for it to succeed.

A

It would be essentially impossible to keep its location a secret from everyone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a characteristic of the Trusted Platform Module (TPM)?

It provides cryptographic services in hardware instead of software.

It allows the user to boot a corrupted disk and repair it.

It is available only on Windows computers running BitLocker.

It includes a pseudorandom number generator (PRNG).

A

It provides cryptographic services in hardware instead of software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of these has an onboard key generator and key storage facility, as well as accelerated symmetric and asymmetric encryption, and can back up sensitive material in encrypted form?

Trusted Platform Module (TPM)

Hardware Security Module (HSM)

Self-encrypting hard disk drives (SED)

Encrypted hardware-based USB devices

A

Hardware Security Module (HSM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The Hashed Message Authentication Code (HMAC) .

encrypts only the message

encrypts only the key

encrypts the key and the message

encrypts the DHE key only

A

encrypts the key and the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the latest version of the Secure Hash Algorithm?

SHA-2

SHA-3

SHA-4

SHA-5

A

SHA-3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Alexei was given a key to a substitution cipher. The key showed that the entire alphabet was rotated 13 steps. What type of cipher is this?

AES

XAND13

ROT13

Alphabetic

A

ROT13

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Abram was asked to explain to one of his coworkers the XOR cipher. He showed his coworker an example of adding two bits, 1 and 1. What is the result of this sum?

2

1

0

16

A

0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following key exchanges uses the same keys each time?

Diffie-Hellman-RSA (DHRSA)

Diffie-Hellman Ephemeral (DHE)

Diffie-Hellman (DH)

Elliptic Curve Diffie-Hellman (ECDH)

A

Diffie-Hellman (DH)

17
Q

Public key systems that generate random public keys that are different for each session are called .

Public Key Exchange (PKE)

perfect forward secrecy

Elliptic Curve Diffie-Hellman (ECDH)

Diffie-Hellman (DH)

A

perfect forward secrecy

18
Q

What is data called that is to be encrypted by inputting it into a cryptographic algorithm?

Opentext

Plaintext

Cleartext

Ciphertext

A

Plaintext

19
Q

Which of these is NOT a basic security protection for information that cryptography can provide?

Authenticity

Risk loss

Integrity

Confidentiality

A

Risk loss

20
Q

Which areas of a file cannot be used by steganography to hide data?

In areas that contain the content data itself

In the file header fields that describe the file

In data that is used to describe the content or structure of the actual data

In the directory structure of the file system

A

In the directory structure of the file system