Practical Cryptography Flashcards

1
Q

Which is a common symmetric key block cipher? Choose more than one option.
A. RSA
B. AES-GCM
C. 3DES-EDE
D. AES-CBC
E. ECDSA
F. Blowfish

A

B. AES-GCM
C. 3DES-EDE
D. AES-CBC
F. Blowfish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which is a scalable way to bind a public key with an entity identity and offer revocation services?
A. Diffie-Hellman key exchange
B. Digital signing services
C. Hashed message authentication
D. Public key infrastructure

A

D. Public key infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which algorithm uses smaller key spaces while offering superior strength for mobile devices and IoT with limited memory and processing power?
A. RSA key exchange
B. Diffie-Helman key exchange
C. SHA-384
D. Elliptic curve

A

D. Elliptic curve

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is often a separate chip on the motherboard (TPM 2.0) that allows manufacturers to build the capability into their chipsets rather than requiring a separate chip?
A. Full disk encryption
B. Trusted platform module
C. Key management service
D. Hardware security module

A

B. Trusted platform module

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a distributed database that leverages a constantly growing list of ordered records called blocks for asset transfer ledgers, cryptocurrencies, tokens, and smart contracts?
A. Blockchain
B. Tokenization
C. Counter block chaining
D. Steganography

A

A. Blockchain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Alice wants to send Bob a message with origin authentication. Which scenario would apply?
A. The message will be encrypted with Alice’s private key then decrypted with Alice’s public key
B. The message will be encrypted with Bob’s public key then decrypted with Bob’s private key
C. The message will be encrypted with Alice’s public key then decrypted with Alice’s private key
D. The message will be encrypted with Bob’s private key then decrypted with Bob’s public key

A

A. The message will be encrypted with Alice’s private key then decrypted with Alice’s public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which type of encryption involves the process of encoding all user data on a solid-state drive?
A. File encryption
B. Partition encryption
C. Volume encryption
D. Full disk encryption

A

D. Full disk encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which is a scalable mechanism for providing authenticity, integrity, and non-repudiation using random public/private key pairs?
A. HMAC
B. Diffie-Hellman
C. Digital Signature
D. RSA

A

C. Digital Signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the technique of adding pseudorandom data to a cryptographic hash function to make it less deterministic for cracking tools?
A. Salting
B. Hashing
C. Collisions
D. Encryption

A

A. Salting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly