Quiz 5 Flashcards

1
Q

Which of the following is used as a cryptographic primitive? (Choose all that apply.)

Question 1 options:

A) side channels

B) hashing functions

C) pseudorandom number generators

D) Feistel networks

A

hashing functions

pseudorandom number generators

Feistel networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the block size in the AES implementation of Rijndael?

Question 2 options:

128, 192, or 256 bits

variable

128 or 256 bits

128 bits

A

128, 192, or 256 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following issues public and private key pairs?

Question 3 options:

certificate publisher

certificate store

certificate revocation list

certification authority

A

certification authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is used to check whether a certificate is still valid?

Question 4 options:

certificate publisher

certificate revocation list

registration authority

certification authority

A

certificate revocation list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is a symmetric algorithm that is not considered safe for encryption use?

Question 5 options:

DES

Diffie-Hellman

AES

RSA

A

DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In digital signatures, which of the following values is compared to verify a message’s integrity?

Question 6 options:

message digest

certificate

private key

public key

A

message digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When using symmetric and asymmetric algorithms to encrypt the same amount of data,
which of the following statements is correct?
Question 7 options:

The symmetric and asymmetric algorithms work at the same speed to encrypt data.

The faster an asymmetric algorithm works, the stronger its encryption.

The asymmetric algorithm encrypts data faster than the symmetric algorithm.

The symmetric algorithm encrypts data faster than the asymmetric algorithm.

A

The symmetric algorithm encrypts data faster than the asymmetric algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following combines a hashed message authentication code with a shared
secret key, processes each half of the input data with different hashing algorithms, and
recombines them with an XOR function?
Question 8 options:

SSL

SSH

TLS

WPA

A

TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is a reason that IPsec has become the standard protocol for tunneled communication? (Choose all that apply.)
Question 9 options:

A) IPsec is implemented at Layer 2.

B) IPsec can encrypt the entire packet.

C) IPsec supports IPv4 and IPv6.

D) IPsec is fast and supported universally.

A

A) IPsec supports IPv4 and IPv6.

C) IPsec can encrypt the entire packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following components enables IPsec to use Diffie-Hellman to create keys?

Question 10 options:

Internet Key Exchange

IPsec driver

Oakley

Internet Security Association Key Management Protocol

A

Oakley

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Authentication Header verifies the integrity of TCP/IP packets by signing them with a
digital signature.
Question 11 options:

True
False
A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In tunnel mode, Encapsulating Security Payload encrypts which of the following?

Question 12 options:

packet header

both the header and the data

data

neither the header nor the data

A

both the header and the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following attacks might have the potential to exploit AES?

Question 13 options:

PRNG

XSL

visual cryptanalysis

chosen ciphertext

A

XSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly