Security Module 5 Flashcards
What is a benefit of using a combination of symmetrical and asymmetrical cryptography when transferring data across the internet?
Asymmetrical cryptography is necessary to establish a secure connection and symmetrical cryptography can enhance the speed of the data transmission after the fact
Which solution is ideal for encrypting an entire hard drive of a PC?
Bitlocker
NTRUEncrypt is based on which cryptography method?
Lattice-based
“Plaintext” is a term that is best described as what?
Data in an unencrypted form
Why would a security administrator use perfect forward secrecy instead of other key exchange solutions?
If compromised it can only expose the content of a single message
Why is a homoalphabetic substitution considered a stream cipher?
It encrypts one plaintext character at a time
What is the disadvantage of TSA compared to most symmetrical algorithms?
RSA is complicated and slower than other algorithms
What are the differences between a block cipher and a sponge function?
A block cipher encrypts plaintext at a fixed size whereas a sponge function takes input string at any length
An encrypted digest is produced from what?
Hash algorithm
Which of the following encryption algorithms has not been successfully attacked?
AES
Which of the following is an advantage of the Keccak algorithm?
It is a compact algorithm that could be considered ideal for smaller devices and appliances
A digital signature does NOT provide which of the following?
Redundancy
How is a hash algorithm limited in functionality?
It cannot be decrypted
OTPs were originally used by whom?
Resistance groups and operation teams during World War II
How does SHA-1 differ from the MD4 algorithm?
MD4 creates a digest length of 128 bit whereas SHA-1’s digest length is 160 bits
Which of the following best describes TPM?
A chip on a motherboard
What type of system is blowfish designed to run efficiently on?
32-bit systems
Using asymmetric cryptography practices, Alex wants to send Jessica an encrypted message that he received from Joel. Additionally, Jessica wants to verify the message came from Alex by viewing his digital signature. Whose keys would be used for what in this scenario?
Jessica’s public key will encrypt the message, Jessica’s private key would be used to view the message, Alex’s private key would be used to encrypt the digest, and Alex’s public key would be used by Jessica to decrypt the digest.
Why does RC4 consume more processing power than RC5?
RC4 is a stream cipher and RC5 is a block cipher
Which of the following is NOT a benefit of USB device encryption?
The USB device can encrypt the hard drive of an attacker when they attempt to access data.