Filters
Question type

Study Flashcards

Which of the following is true about Message Authentication Code.


A) it uses asymmetric encryption
B) the key is sent to the receiver securely
C) is uses PKI and certificates
D) it uses a private and public key

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

MATCHING -the study of breaking encryption methods


A) AES
B) block cipher
C) ciphertext
D) cryptanalysis
E) DES
F) XOR function
G) IPsec
H) key management
I) plaintext
J) stream cipher

K) D) and J)
L) D) and G)

Correct Answer

verifed

verified

What three conditions must be true to make a hashing algorithm secure?

Correct Answer

verifed

verified

1.No hash should be usable to determine ...

View Answer

The standardization of cryptographic protocols discourages attackers from trying to break them.

A) True
B) False

Correct Answer

verifed

verified

Which of the following was developed as a way of enabling Web servers and browsers to exchange encrypted information and uses a hashed message authentication code to increase security?


A) SSH
B) SSL
C) TLS
D) IPsec

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

Which of the following is commonly used for verifying message integrity?


A) registration authority
B) CRL
C) pseudorandom number generator
D) hashing function

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Which of the following is the first step in the digital signature process where Mike sends a message to Sophie?


A) a message digest of Mike's message is calculated using a hashing algorithm
B) Sophie compares the message digest she calculated to Mikes's message
C) Sophie encrypts Mike's message with Mike's public key
D) the message digest is encrypted by Mike's private key

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

A

What is a hash value and how does it verify message integrity?

Correct Answer

verifed

verified

A hash value is a fixed-size string representing the original input's contents.If the input changes in any way,even by adding a period at the end of a sentence,the resulting output has a different hash value.

Which component of IPsec enables computers to exchange keys to make an SA?


A) IKE
B) ISAKMP
C) Oakley
D) IPsec driver

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Which of the following is NOT a critical goal of information security?


A) confidentiality
B) scalability
C) authentication
D) nonrepudiation

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

Which of the following is described as a 64-bit block cipher composed of a 16-round Feistel network and key-dependent S-box functions?


A) Twofish
B) RC4
C) Blowfish
D) Rijndael

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

In a passive attack,cryptanalysts eavesdrop on transmissions but don't interact with parties exchanging information.

A) True
B) False

Correct Answer

verifed

verified

______________ cryptanalysis is applicable to block ciphers that use a substitution-permutation network including Rijndael,Twofish,and IDEA.

Correct Answer

verifed

verified

Which of the following is true about PRNGs?


A) they are not completely random
B) their state is measured in bytes
C) the shorter the state, the longer the period
D) they can never produce the same value

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

MATCHING -a type of encryption algorithm that encrypts groups of cleartext characters


A) AES
B) block cipher
C) ciphertext
D) cryptanalysis
E) DES
F) XOR function
G) IPsec
H) key management
I) plaintext
J) stream cipher

K) B) and E)
L) C) and H)

Correct Answer

verifed

verified

MATCHING -A set of standard procedures that the Internet Engineering Task Force (IETF) developed for enabling secure communication on the Internet


A) AES
B) block cipher
C) ciphertext
D) cryptanalysis
E) DES
F) XOR function
G) IPsec
H) key management
I) plaintext
J) stream cipher

K) H) and I)
L) B) and F)

Correct Answer

verifed

verified

Compare and contrast block cipher with stream cipher.

Correct Answer

verifed

verified

The two major types of encryption algori...

View Answer

Which of the following best describes a CRL?


A) a published listing of invalid certificates
B) serve as a front end to users for revoking certificates
C) a file that contains information about the user and public key
D) keeps track of issued credentials and manages revocation of certificates

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

Which of the following makes a single pass on data and generates a 128-bit hash value displayed as a 32-character hexadecimal number and is used in VPNs?


A) RSA
B) Message Digest 5
C) RC4
D) Twofish

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Encrypted files can be transmitted in both electronic form and as written messages.

A) True
B) False

Correct Answer

verifed

verified

True

Showing 1 - 20 of 50

Related Exams

Show Answer