Filters
Question type

Study Flashcards

In 1991, NIST established a standard called ___________________________________ to ensure that digital signatures could be verified.

Correct Answer

verifed

verified

DSS
Digital Signatur...

View Answer

MATCHING Match each term with the correct statement below. -takes a variable-length input and converts it to a fixed-length output string


A) asymmetric encryption
B) collision free
C) symmetric encryption
D) certificate
E) hashing
F) collision
G) stream cipher
H) message digest
I) block cipher

J) A) and F)
K) E) and F)

Correct Answer

verifed

verified

What is RC5?

Correct Answer

verifed

verified

RC5 is a block cipher that can...

View Answer

In a ____ attack, the attacker has access to the ciphertext to be decrypted and to the resulting plaintext.


A) chosen-ciphertext
B) chosen-plaintext
C) known plaintext
D) ciphertext-only

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

ECC is an efficient algorithm requiring few resources (memory, disk space, bandwidth, and so on), so it's a perfect candidate for wireless devices and cellular telephones.

A) True
B) False

Correct Answer

verifed

verified

After DES was in service for many years, NIST decided that a new standard was in order: ____.


A) Advanced Encryption Standard (AES)
B) RC5
C) International Data Encryption Algorithm (IDEA)
D) Blowfish

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

____, developed by Bruce Schneier, is a block cipher that operates on 64-bit blocks of plaintext.


A) Advanced Encryption Standard (AES)
B) RC5
C) International Data Encryption Algorithm (IDEA)
D) Blowfish

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

RSA was developed by three MIT professors:Ronald L.Rivest, ____, and Leonard M. Adleman.


A) Arthur Scherbius
B) Eugene Spafford
C) Bruce Schneier
D) Adi Shamir

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

In a chosen-ciphertext attack, the attacker needs access to the cryptosystem to perform the attack.

A) True
B) False

Correct Answer

verifed

verified

What is a one-way function? Provide an example or an analogy to help explain the concept.

Correct Answer

verifed

verified

A one-way function is a mathematical for...

View Answer

____ is a scripting language for Windows and Linux that performs repetitive tasks, such as password cracking.


A) John the Ripper
B) Hydra (THC)
C) Pwdump3v2
D) EXPECT

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

Even though DEA uses 64-bit encryption, only ____ bits are effectively being used.


A) 48
B) 50
C) 56
D) 60

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

____________________ is a form of hiding data in plain view in pictures, graphics, or text.

Correct Answer

verifed

verified

The Purple Machine code was broken by ____, a cryptanalyst for the U.S. government and known as the "Father of U.S. Cryptanalysis."


A) Arthur Scherbius
B) Bruce Schneier
C) William Frederick Friedman
D) Herbert O.Yardley

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

What is a certificate?

Correct Answer

verifed

verified

A certificate is a digital document veri...

View Answer

The CA compiles a(n) ___________________________________ that contains all revoked and suspended certificates.

Correct Answer

verifed

verified

CRL
Certificate Revo...

View Answer

MATCHING Match each term with the correct statement below. -property of a good hashing algorithm


A) asymmetric encryption
B) collision free
C) symmetric encryption
D) certificate
E) hashing
F) collision
G) stream cipher
H) message digest
I) block cipher

J) A) and E)
K) A) and G)

Correct Answer

verifed

verified

MATCHING Match each term with the correct statement below. -occurs if two different messages produce the same hash value


A) asymmetric encryption
B) collision free
C) symmetric encryption
D) certificate
E) hashing
F) collision
G) stream cipher
H) message digest
I) block cipher

J) C) and H)
K) A) and E)

Correct Answer

verifed

verified

Symmetric algorithms support confidentiality, but not authentication and nonrepudiation.

A) True
B) False

Correct Answer

verifed

verified

Asymmetric algorithms are more scalable than symmetric systems. However, they are slower than symmetric algorithms.

A) True
B) False

Correct Answer

verifed

verified

Showing 21 - 40 of 58

Related Exams

Show Answer