Domain 5 Flashcards
Which of the following is a cipher that uses one particular letter to replace another?
a) Polyalphabetic cipher
b) Monoalphabetic cipher
c) Caesar cipher
d) Polymorphic cipher
Monoalphabetic cipher
Which of the following plays the MOST important part in protecting a cryptosystem?
a) A sufficiently large key length
b) Using a newer cipher such as Rijndael or Blowfish, versus an older cipher like 3DES
c) Protecting the secret key for a symmetric cryptosystem and the private key for a public-key cryptosystem
d) Ensuring the cipher used has been publicly studied and scrutinized for errors
Protecting the secret key for a symmetric cryptosystem and the private key for a public-key cryptosystem
Which of the following BEST describes non-repudiation as it relates to a cryptosystem?
a) The cryptosystem should be able to prove that the message has not been tampered with.
b) The cryptosystem should allow a person to know for sure that the message given to him by another person is really from that person.
c) The cryptosystem should hide the contents of the message from all other persons except the sender and the intended recipient.
d) The cryptosystem should be able to prove that a specific person, and only that person, sent the message and that it has not been altered or falsified.
The cryptosystem should be able to prove that a specific person, and only that person, sent the message and that it has not been altered or falsified
Which of the following BEST describes the ROT-13 cipher?
a) It rotates each letter in the message thirteen places through the alphabet.
b) It runs the message through the Rijndael cipher thirteen successive times.
c) It runs the message through the ROT-3 cipher thirteen successive times.
d) It applies the Caesar cipher thirteen times to the message.
It rotates each letter in the message thirteen places through the alphabet
With respect to block cipher algorithms, CBC stands for which of the following?
a) Cipher Block Chaining
b) Code Book Cipher
c) Cipher Block Code
d) Code Block Chain
Cipher Block Chaining
Which of the following is NOT a symmetric-key cryptosystem?
a) RC4
b) RSA
c) IDEA
d) DES
RSA
Which of the following is NOT a characteristic of public-key cryptosystems?
a) Public-key cryptosystems are “slower” than symmetric-key cryptosystems when encrypting and decrypting a message.
b) Public-key cryptosystems distribute public-keys within digital signatures.
c) Public-key cryptosystems require a secure key distribution channel.
d) Public-key cryptosystems provide technical non-repudiation via digital signatures.
Public-key cryptosystems require a secure key distribution channel
Hash functions provide what primary function in a cryptosystem?
a) Confidentiality
b) Non-repudiation
c) Authentication
d) Message integrity
Message integrity
Which of the following is NOT a hash function algorithm?
a) SHA
b) ECC
c) MD5
d) HMAC
ECC
Which of following does NOT provide for confidentiality?
a) CAST
b) IDEA
c) 3DES
d) MD5
MD5
Kerberos’ main application is which of the following?
a) A public-key cryptosystem used in Microsoft products
b) A single sign-on system for client-server authentication schemes
c) A hash function used for integrity in modern cryptosystems
d) An authentication scheme used with TLS (Transaction Layer Security)
A single sign-on system for client-server authentication schemes
Double-DES, or 2DES, is not considered much stronger than DES for which of the following reasons?
a) Double-DES is vulnerable to the meet-in-the-middle attack.
b) Double-DES has an effective key length of 47 bits due to the double encryption of the message.
c) Because DES is not a mathematical “group”, successive iterations of message encryption produce weaker and weaker ciphertext with respect to cryptanalysis.
d) Each successive pass of encryption using DES reduces the effective key length by 9 bits.
Double-DES is vulnerable to the meet-in-the-middle attack
The AES (Advanced Encryption Standard) uses which of the following algorithms?
a) Serpent
b) Twofish
c) Blowfish
d) Rijndael
Rijndael
The RSA algorithm uses what kind of intractable problem as the basis of its cryptosystem?
a) Solving the discrete logarithm problem over finite fields
b) Computing elliptic curves over finite fields
c) Factoring super-polynomials
d) Factoring certain large integers into their two prime factors
Factoring certain large integers into their two prime factors
Which of the following key issues is based on the fact that the keys are not going to last forever, but if you do not discard it someone else may be able to use it?
a) Key theft
b) Key generation
c) Key change
d) Key retirement
Key retirement