Module 20 - Cryptography Flashcards

1
Q

Which type of encryption uses 2 keys (Public & Private)

A

Asymmetric Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which type of encryption uses 1 shared secret key?

A

Symmetric Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

All of the following are types of Symmetric Encryption except:

a. AES
b. Twofish
c. RC4
d. DES
e. DSA
f. 3DES
g. Blowfish

A

e. DSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following Symmetric Encryptions is a stream cipher?

a. AES
b. Twofish
c. RC4
d. DES
e. DSA
f. 3DES
g. Blowfish

A

c. RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does symmetric encryption provide?

a. Confidentiality
b. Integrity
c. Authenticity
d. Availability
e. Non-Repudiation

A

a. Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the #1 used symmetric encryption used today?

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the #1 asymmetric encryption used today?

A

RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

All of the following are types of asymmetric encryption except?

a. RSA
b. DSA
c. DES
d. ECC
e. Diffie-Hellman
f. El Gamal

A

c. DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following asymmetric encryptions is used for key enchange of symmetric keys?

a. RSA
b. DSA
c. DES
d. ECC
e. Diffie-Hellman
f. El Gamal

A

e. Diffie-Hellman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following asymmetric encryptions provides Non-Repudiation?

a. RSA
b. DSA
c. DES
d. ECC
e. Diffie-Hellman
f. El Gamal

A

c. DSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

By default what is the encryption strength of AES?

a. 56 bit
b. 168 bit
c. 128 bit
d. 64 bit
e. 1 bit or 1 byte

A

c. 128 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the encryption strength of blowfish?

a. 56 bit
b. 168 bit
c. 128 bit
d. 64 bit
e. 1 bit or 1 byte

A

d. 64 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the encryption strength of RC4?

a. 56 bit
b. 168 bit
c. 128 bit
d. 64 bit
e. 1 bit or 1 byte

A

e. 1 bit or 1 byte

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the encryption strength of DES?

a. 56 bit
b. 168 bit
c. 128 bit
d. 64 bit
e. 1 bit or 1 byte

A

a. 56 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the encryption strength of twofish?

a. 56 bit
b. 168 bit
c. 128 bit
d. 64 bit
e. 1 bit or 1 byte

A

c. 128 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the encryption strength of 3DES?

a. 56 bit
b. 168 bit
c. 128 bit
d. 64 bit
e. 1 bit or 1 byte

A

b. 168

17
Q

_____ is a set of hardware, software, people, policies, and procedures required to create, manage, distribute, use, store, and revoke digital certificates.

A

PKI (Public Key Infrastructure)

18
Q

Public Key Infrastructure (PKI):

  • Issues and verifies digital certificates.
  • Keeps the private key, and gives the company the public key for them to publish.
    a. Registration Authority (RA)
    b. Validation Authority (VA)
    c. Certificate Authority (CA)
    d. Digital Certificate
A

c. Certificate Authority (CA)

19
Q

Public Key Infrastructure (PKI):

  • Acts as the verifier for the certificate authority.
  • Intermediary between the company and CA.
  • Cannot Issue Certificates
    a. Registration Authority (RA)
    b. Validation Authority (VA)
    c. Certificate Authority (CA)
    d. Digital Certificate
A

a. Registration Authority (RA)

20
Q

Disk Encryption:

Disk encryption protects ___________ of the data stored on disk by converting it into an unreadable code using disk encryption software or hardware.

a. Protection
b. Availability
c. Confidentiality
d. Encryption

A

c. Confidentiality

21
Q

Cryptanalysis:

  • Contains many non-repeating groups of letters or number keys, which are chosen randomly.
  • Only usable once activated, not before and will only be usable for a determined amount of time.
    a. Brute-Force
    b. Frequency Analysis
    c. Trickery and Deceit
    d. One-Time Pad
A

d. One-Time Pad

22
Q

Cryptanalysis:

Extraction of cryptographic secrets (e.g. the password to an encrypted file) from a person by coercion or torture.

a. Chosen-Ciphertext Attack
b. Rubber Hose Attack
c. Chosen-Key Attack
d. Timing Attack
e. Man-in-the-Middle Attack

A

b. Rubber Hose Attack

23
Q

________ encryption uses the same key for encryption as it does for decryption.

A

Symmetric

24
Q

__________ encryption uses different encryption keys for enctyption and decryption.

A

Asymmetric

25
Q

All of the following are email encryptions except?

a. TLS
b. S/MIME
c. PGP
d. GPG

A

a. TLS