Module 20 - Cryptography Flashcards
Which type of encryption uses 2 keys (Public & Private)
Asymmetric Encryption
Which type of encryption uses 1 shared secret key?
Symmetric Encryption
All of the following are types of Symmetric Encryption except:
a. AES
b. Twofish
c. RC4
d. DES
e. DSA
f. 3DES
g. Blowfish
e. DSA
Which of the following Symmetric Encryptions is a stream cipher?
a. AES
b. Twofish
c. RC4
d. DES
e. DSA
f. 3DES
g. Blowfish
c. RC4
What does symmetric encryption provide?
a. Confidentiality
b. Integrity
c. Authenticity
d. Availability
e. Non-Repudiation
a. Confidentiality
What is the #1 used symmetric encryption used today?
AES
What is the #1 asymmetric encryption used today?
RSA
All of the following are types of asymmetric encryption except?
a. RSA
b. DSA
c. DES
d. ECC
e. Diffie-Hellman
f. El Gamal
c. DES
Which of the following asymmetric encryptions is used for key enchange of symmetric keys?
a. RSA
b. DSA
c. DES
d. ECC
e. Diffie-Hellman
f. El Gamal
e. Diffie-Hellman
Which of the following asymmetric encryptions provides Non-Repudiation?
a. RSA
b. DSA
c. DES
d. ECC
e. Diffie-Hellman
f. El Gamal
c. DSA
By default what is the encryption strength of AES?
a. 56 bit
b. 168 bit
c. 128 bit
d. 64 bit
e. 1 bit or 1 byte
c. 128 bit
What is the encryption strength of blowfish?
a. 56 bit
b. 168 bit
c. 128 bit
d. 64 bit
e. 1 bit or 1 byte
d. 64 bit
What is the encryption strength of RC4?
a. 56 bit
b. 168 bit
c. 128 bit
d. 64 bit
e. 1 bit or 1 byte
e. 1 bit or 1 byte
What is the encryption strength of DES?
a. 56 bit
b. 168 bit
c. 128 bit
d. 64 bit
e. 1 bit or 1 byte
a. 56 bit
What is the encryption strength of twofish?
a. 56 bit
b. 168 bit
c. 128 bit
d. 64 bit
e. 1 bit or 1 byte
c. 128 bit
What is the encryption strength of 3DES?
a. 56 bit
b. 168 bit
c. 128 bit
d. 64 bit
e. 1 bit or 1 byte
b. 168
_____ is a set of hardware, software, people, policies, and procedures required to create, manage, distribute, use, store, and revoke digital certificates.
PKI (Public Key Infrastructure)
Public Key Infrastructure (PKI):
- Issues and verifies digital certificates.
- Keeps the private key, and gives the company the public key for them to publish.
a. Registration Authority (RA)
b. Validation Authority (VA)
c. Certificate Authority (CA)
d. Digital Certificate
c. Certificate Authority (CA)
Public Key Infrastructure (PKI):
- Acts as the verifier for the certificate authority.
- Intermediary between the company and CA.
-
Cannot Issue Certificates
a. Registration Authority (RA)
b. Validation Authority (VA)
c. Certificate Authority (CA)
d. Digital Certificate
a. Registration Authority (RA)
Disk Encryption:
Disk encryption protects ___________ of the data stored on disk by converting it into an unreadable code using disk encryption software or hardware.
a. Protection
b. Availability
c. Confidentiality
d. Encryption
c. Confidentiality
Cryptanalysis:
- Contains many non-repeating groups of letters or number keys, which are chosen randomly.
- Only usable once activated, not before and will only be usable for a determined amount of time.
a. Brute-Force
b. Frequency Analysis
c. Trickery and Deceit
d. One-Time Pad
d. One-Time Pad
Cryptanalysis:
Extraction of cryptographic secrets (e.g. the password to an encrypted file) from a person by coercion or torture.
a. Chosen-Ciphertext Attack
b. Rubber Hose Attack
c. Chosen-Key Attack
d. Timing Attack
e. Man-in-the-Middle Attack
b. Rubber Hose Attack
________ encryption uses the same key for encryption as it does for decryption.
Symmetric
__________ encryption uses different encryption keys for enctyption and decryption.
Asymmetric
All of the following are email encryptions except?
a. TLS
b. S/MIME
c. PGP
d. GPG
a. TLS