Cryptography Flashcards

1
Q

Which of the following types of algorithms encrypts specified sizes of groups of text at a time?

Asymmetric

Streaming

Block

A

Block

Block algorithms encrypt entire groups of bits of text, usually of specific sizes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You must implement a cryptography system in your organization. You need to be able to send large amounts of data, quickly, over the network. The system will be used by a very small group of users only, and key exchange is not a problem. Which of the following should you consider?

Asymmetric cryptography

Symmetric cryptography

Hybrid cryptography

A

Symmetric cryptography

In this scenario, symmetric key cryptography would probably be the best choice, since the user group is very small and key exchange is not a problem. You also have the requirements of speed and efficiency, as well as the ability to send large amounts of data. All are advantages of using symmetric key cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following asymmetric algorithms uses a maximum key size of 4096 bits?

AES

Diffie-Hellman

RSA

A

RSA

RSA uses key sizes between 1024 and 4096 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following asymmetric algorithms is widely used on mobile devices because of its low computational power requirements?

ECC

ElGamal

Diffie-Hellman

A

ECC

Elliptic curve cryptography (ECC) is an asymmetric algorithm widely found in use on mobile devices because it requires low amounts of computational power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which type of algorithm is typically used to encrypt data-at-rest?

Symmetric

Asymmetric

Streaming

A

Symmetric

Symmetric algorithms are typically used to encrypt data that resides in storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following places secrecy of the key versus secrecy of the algorithm as the most important factor in developing secure and reliable cryptosystems?

Data Encryption Standard (DES)

Advanced Encryption Standard (AES)

Kerckhoffs’ principle

A

Kerckhoffs’ principle

Kerckhoffs’ principle states that reliable cryptosystems should depend upon the secrecy of the key, rather than the secrecy of the algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following algorithms produces a 40-character message digest?

MD5

SHA-1

RIPEMD-128

A

SHA-1

SHA-1 is a 160-bit hashing algorithm that produces a 40-character hexadecimal message digest, or hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

If an individual encrypts a message with his own private key, what does this assure?

Confidentiality

Message authenticity

Integrity

A

Message authenticity

If an individual encrypts a message with his private key, this ensures message authenticity, since he is the only person who could have encrypted it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following entities can help distribute the workload of the CA by performing identification and authentication of individual certificate requestors?

Root CA server

Authentication authority

Registration authority

A

Registration authority

The registration authority (RA) can help distribute the workload of the CA by performing identification and authentication of individual certificate requestors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following serves as the master certificate server in an organization?

Intermediate CA server

Root CA server

Subordinate CA server

A

Root CA server

A root CA server is the master certificate server in an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly