Common Cryptography Techniques in Use Flashcards

1
Q

Which of the following is a widely used symmetric encryption algorithm?

A) RSA
B) ECC
C) AES
D) DSA

A

C) AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which cryptographic technique is primarily used for securing email communication in the UK?

A) PGP (Pretty Good Privacy)
B) DES (Data Encryption Standard)
C) SHA-256 (Secure Hash Algorithm)
D) Blowfish

A

A) PGP (Pretty Good Privacy)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does the acronym ‘RSA’ stand for in cryptography?

A) Rivest-Shamir-Adleman
B) Randomized Security Algorithm
C) Robust Security Application
D) Reliable Secure Algorithm

A

A) Rivest-Shamir-Adleman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which hashing algorithm is recommended by the UK’s National Cyber Security Centre (NCSC) for ensuring data integrity?

A) MD5
B) SHA-1
C) SHA-256
D) RC4

A

C) SHA-256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Elliptic Curve Cryptography (ECC) is known for:

A) Being faster than symmetric encryption algorithms
B) Providing security with smaller key sizes compared to other algorithms
C) Being outdated and insecure
D) Only being used for hashing

A

B) Providing security with smaller key sizes compared to other algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following encryption methods is considered outdated and insecure?

A) AES
B) RSA
C) DES
D) ECC

A

C) DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the primary purpose of a digital signature in cryptography?

A) To encrypt data for secure transmission
B) To compress data to save storage space
C) To verify the authenticity and integrity of a message
D) To generate random numbers for cryptographic operations

A

C) To verify the authenticity and integrity of a message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is an example of asymmetric encryption?

A) AES
B) RSA
C) DES
D) Blowfish

A

B) RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

TLS (Transport Layer Security) primarily uses which type of cryptography to establish a secure connection?

A) Symmetric cryptography only
B) Asymmetric cryptography only
C) A combination of both symmetric and asymmetric cryptography
D) Hashing algorithms only

A

C) A combination of both symmetric and asymmetric cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which cryptographic technique is used to ensure data integrity by producing a unique fixed-size string from input data?

A) Symmetric encryption
B) Asymmetric encryption
C) Hashing
D) Key exchange

A

C) Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which encryption algorithm is commonly used in securing Wi-Fi networks?
A) RSA
B) WPA2 (using AES)
C) ECC
D) MD5

A

B) WPA2 (using AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which protocol is often used for secure web browsing in the UK?

A) HTTP
B) FTP
C) SMTP
D) HTTPS

A

D) HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In cryptography, what does the term ‘key exchange’ refer to?

A) Encrypting data with a symmetric key
B) Decrypting data with a public key
C) The process of sharing encryption keys between parties
D) Hashing a message for integrity

A

C) The process of sharing encryption keys between parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following cryptographic protocols is designed to provide secure email services?

A) SSH
B) S/MIME
C) FTP
D) Telnet

A

B) S/MIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the primary advantage of using elliptic curve cryptography (ECC) over RSA?

A) ECC is faster than RSA for all operations
B) ECC requires smaller key sizes to achieve similar security levels as RSA
C) ECC is older and more trusted than RSA
D) ECC uses symmetric keys

A

B) ECC requires smaller key sizes to achieve similar security levels as RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which cryptographic method is specifically designed for ensuring confidentiality and integrity of data at rest?

A) Transport Layer Security (TLS)
B) Secure Shell (SSH)
C) Full Disk Encryption (FDE)
D) Pretty Good Privacy (PGP)

A

C) Full Disk Encryption (FDE)

17
Q

What does the term ‘nonce’ refer to in cryptographic operations?

A) A symmetric key used for encryption
B) A random or pseudo-random number used only once
C) A hashing algorithm
D) A digital certificate

A

B) A random or pseudo-random number used only once

18
Q

Which of the following is a common use of cryptographic hash functions?

A) Encrypting emails
B) Verifying file integrity
C) Exchanging keys
D) Generating public and private keys

A

B) Verifying file integrity

19
Q

What is the main purpose of a Public Key Infrastructure (PKI)?

A) To generate symmetric keys for encryption
B) To securely manage digital certificates and public-key encryption
C) To hash data for integrity
D) To provide a platform for secure password storage

A

B) To securely manage digital certificates and public-key encryption

20
Q

Which cryptographic technique is used in blockchain technology to ensure data integrity?

A) Symmetric encryption
B) Asymmetric encryption
C) Digital signatures
D) Hashing

A

D) Hashing