Cryptography Flashcards
Which statement describes the Software-Optimized Encryption Algorithm (SEAL)?
SEAL is a stream cipher.
Which statement is a feature of HMAC?
HMAC uses a secret key as input to the hash function, adding authentication to integrity assurance.
Which requirement of secure communications is ensured by the implementation of MD5 or SHA hash generating algorithms?
Integrity
Which algorithm can ensure data confidentiality?
AES
In which way does the use of HTTPS increase the security monitoring challenges within enterprise networks?
HTTPS traffic enables end-to-end encryption.
Which protocol is an IETF standard that defines the PKI digital certificate format?
X.509
What are two symmetric encryption algorithms?
3DES and AES
What is the purpose of code signing?
Integrity of source .EXE files
Which statement describes the use of certificate classes in the PKI?
A class 5 certificate is more trustworthy than a class 4 certificate.
What role does an RA play in PKI?
A subordinate CA
What technology supports asymmetric key encryption used in IPsec VPNs?
IKE
What technology allows users to verify the identity of a website and to trust code that is downloaded from the Internet?
Digital Signature