IS4560 CH 3 Cryptographic Concepts Flashcards

1
Q
1. Which of the following is not one of the key concepts of cryptography?
A. Availability 
B. Integrity 
C. Authenticity 
D. Privacy
A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
2. Common symmetric encryption algorithms include all of the following except \_\_\_\_\_\_\_\_.
A. RSA 
B. AES 
C. IDEA 
D. DES
A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
3. A birthday attack can be used to attempt to break \_\_\_\_\_\_\_\_.
A. DES 
B. RSA 
C. PKI 
D. MD5
A

MD5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
4. The best description of zeroization is \_\_\_\_\_\_\_\_.
A. Used to encrypt asymmetric data 
B. Used to create an MD5 hash 
C. Used to clear media of a key value 
D. Used to encrypt symmetric data
A

Used to clear media of a key value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
5. What is the primary goal of PKI?
A. Hashing 
B. Third-party trust 
C. Nonreputation 
D. Availability
A

Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
6. Digital signatures are not used for \_\_\_\_\_\_\_\_.
A. Authentication 
B. Nonrepudiation 
C. Integrity 
D. Availability
A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
7. Key management is potentially the biggest problem in \_\_\_\_\_\_\_\_.
A. Hashing 
B. Asymmetric encryption 
C. Symmetric encryption 
D. Cryptanalysis
A

Symmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
8. \_\_\_\_\_\_\_\_ is well suited for bulk encryption.
A. MD5 
B. Diffie Hellman 
C. DES 
D. RSA
A

RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
9. \_\_\_\_\_\_\_\_ is not part of the key management process.
A. Generation 
B. Storage 
C. Distribution 
D. Layering
A

Storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
10. Which attack requires the attacker to obtain several encrypted messages that have been encrypted using the same encryption algorithm?
A. Known plaintext attack 
B. Ciphertext only attack 
C. Chosen plaintext attack 
D. Random text attack
A

Known plaintext attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
11. What is another name for a one-time pad?
A. Vernam cipher 
B. DES 
C. Concealment cipher 
D. Caesar cipher
A

Vernam cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
12. \_\_\_\_\_\_\_\_ is an example of a hashing algorithm.
A. MD5 
B. DES 
C. AES 
D. Twofish
A

MD5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. Which of the following is the least secure?
    A. PAP
    B. CHAP
    C. IPSec
A

PAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly