Quiz 5 Flashcards
Which of the following is used as a cryptographic primitive? (Choose all that apply.)
Question 1 options:
A) side channels
B) hashing functions
C) pseudorandom number generators
D) Feistel networks
hashing functions
pseudorandom number generators
Feistel networks
What is the block size in the AES implementation of Rijndael?
Question 2 options:
128, 192, or 256 bits
variable
128 or 256 bits
128 bits
128, 192, or 256 bits
Which of the following issues public and private key pairs?
Question 3 options:
certificate publisher
certificate store
certificate revocation list
certification authority
certification authority
Which of the following is used to check whether a certificate is still valid?
Question 4 options:
certificate publisher
certificate revocation list
registration authority
certification authority
certificate revocation list
Which of the following is a symmetric algorithm that is not considered safe for encryption use?
Question 5 options:
DES
Diffie-Hellman
AES
RSA
DES
In digital signatures, which of the following values is compared to verify a message’s integrity?
Question 6 options:
message digest
certificate
private key
public key
message digest
When using symmetric and asymmetric algorithms to encrypt the same amount of data,
which of the following statements is correct?
Question 7 options:
The symmetric and asymmetric algorithms work at the same speed to encrypt data.
The faster an asymmetric algorithm works, the stronger its encryption.
The asymmetric algorithm encrypts data faster than the symmetric algorithm.
The symmetric algorithm encrypts data faster than the asymmetric algorithm.
The symmetric algorithm encrypts data faster than the asymmetric algorithm.
Which of the following combines a hashed message authentication code with a shared
secret key, processes each half of the input data with different hashing algorithms, and
recombines them with an XOR function?
Question 8 options:
SSL
SSH
TLS
WPA
TLS
Which of the following is a reason that IPsec has become the standard protocol for tunneled communication? (Choose all that apply.)
Question 9 options:
A) IPsec is implemented at Layer 2.
B) IPsec can encrypt the entire packet.
C) IPsec supports IPv4 and IPv6.
D) IPsec is fast and supported universally.
A) IPsec supports IPv4 and IPv6.
C) IPsec can encrypt the entire packet.
Which of the following components enables IPsec to use Diffie-Hellman to create keys?
Question 10 options:
Internet Key Exchange
IPsec driver
Oakley
Internet Security Association Key Management Protocol
Oakley
Authentication Header verifies the integrity of TCP/IP packets by signing them with a
digital signature.
Question 11 options:
True False
True
In tunnel mode, Encapsulating Security Payload encrypts which of the following?
Question 12 options:
packet header
both the header and the data
data
neither the header nor the data
both the header and the data
Which of the following attacks might have the potential to exploit AES?
Question 13 options:
PRNG
XSL
visual cryptanalysis
chosen ciphertext
XSL