IS4560 CH 3 Cryptographic Concepts Flashcards
1
Q
1. Which of the following is not one of the key concepts of cryptography? A. Availability B. Integrity C. Authenticity D. Privacy
A
Availability
2
Q
2. Common symmetric encryption algorithms include all of the following except \_\_\_\_\_\_\_\_. A. RSA B. AES C. IDEA D. DES
A
AES
3
Q
3. A birthday attack can be used to attempt to break \_\_\_\_\_\_\_\_. A. DES B. RSA C. PKI D. MD5
A
MD5
4
Q
4. The best description of zeroization is \_\_\_\_\_\_\_\_. A. Used to encrypt asymmetric data B. Used to create an MD5 hash C. Used to clear media of a key value D. Used to encrypt symmetric data
A
Used to clear media of a key value
5
Q
5. What is the primary goal of PKI? A. Hashing B. Third-party trust C. Nonreputation D. Availability
A
Hashing
6
Q
6. Digital signatures are not used for \_\_\_\_\_\_\_\_. A. Authentication B. Nonrepudiation C. Integrity D. Availability
A
Integrity
7
Q
7. Key management is potentially the biggest problem in \_\_\_\_\_\_\_\_. A. Hashing B. Asymmetric encryption C. Symmetric encryption D. Cryptanalysis
A
Symmetric encryption
8
Q
8. \_\_\_\_\_\_\_\_ is well suited for bulk encryption. A. MD5 B. Diffie Hellman C. DES D. RSA
A
RSA
9
Q
9. \_\_\_\_\_\_\_\_ is not part of the key management process. A. Generation B. Storage C. Distribution D. Layering
A
Storage
10
Q
10. Which attack requires the attacker to obtain several encrypted messages that have been encrypted using the same encryption algorithm? A. Known plaintext attack B. Ciphertext only attack C. Chosen plaintext attack D. Random text attack
A
Known plaintext attack
11
Q
11. What is another name for a one-time pad? A. Vernam cipher B. DES C. Concealment cipher D. Caesar cipher
A
Vernam cipher
12
Q
12. \_\_\_\_\_\_\_\_ is an example of a hashing algorithm. A. MD5 B. DES C. AES D. Twofish
A
MD5
13
Q
- Which of the following is the least secure?
A. PAP
B. CHAP
C. IPSec
A
PAP