Filters
Question type

Study Flashcards

After the DES cipher was broken and no longer considered secure,what encryption algorithm was made as its successor?


A) AES
B) Twofish
C) 3DES
D) RSA

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

Asymmetric cryptographic algorithms are also known as private key cryptography.

A) True
B) False

Correct Answer

verifed

verified

GNU Privacy Guard a proprietary software that runs on different operating systems.

A) True
B) False

Correct Answer

verifed

verified

What is a pseudorandom number generator?

Correct Answer

verifed

verified

A pseudorandom number generato...

View Answer

What alternative term can be used to describe asymmetric cryptographic algorithms?


A) user key cryptography
B) public key cryptography
C) private key cryptography
D) cipher-text cryptography

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

What type of cryptographic algorithm creates a unique digital fingerprint of a set of data?


A) hash
B) key
C) digest
D) block

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

How does asymmetric encryption work?

Correct Answer

verifed

verified

Asymmetric encryption uses two keys inst...

View Answer

Which of the following are considered to be common asymmetric cryptographic algorithms? (Choose all that apply. )


A) Data Encryption Standard
B) Elliptic Curve Cryptography
C) Advanced Encryption Standard
D) Digital Signature Algorithm

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

What type of cipher takes one character and replaces it with one character,working one character at a time?


A) block cipher
B) single cipher
C) unit cipher
D) stream cipher

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Explain how a hash algorithm works and how it is primarily used.

Correct Answer

verifed

verified

A hash algorithm creates a unique "digit...

View Answer

Data that is in an unencrypted form is referred to as which of the following?


A) crypttext
B) plain text
C) simpletext
D) cleartext

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

If Bob receives an encrypted reply message from Alice,whose private key is used to decrypt the received message?


A) Bob's private key.
B) Alice's private key.
C) Bob and Alice's keys.
D) Bob's private key and Alice's public key.

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

When Bob needs to send Alice a message with a digital signature,whose private key is used to encrypt the hash?


A) Bob's private key
B) Alice's private key
C) Bob and Alice's keys.
D) Bob's private key and Alice's public key.

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

What is the difference between a stream cipher and a block cipher?

Correct Answer

verifed

verified

When comparing the amount of d...

View Answer

What four basic protections can cryptography support?

Correct Answer

verifed

verified

Cryptography can sup...

View Answer

What cryptographic method,first proposed in the mid-1980s,makes use of sloping curves instead of large prime numbers?


A) FCC
B) RSA
C) ECC
D) IKE

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

Wireless data networks are particularly susceptible to known ciphertext attacks.

A) True
B) False

Correct Answer

verifed

verified

What term describes data actions being performed by endpoint devices,such as printing a report from a desktop computer?


A) data-in-transit
B) data-in-play
C) data-at-rest
D) data-in-use

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

What is meant by the phrase "security through obscurity," and why is this concept not accurate?

Correct Answer

verifed

verified

Security through obscurity,or the notion...

View Answer

How does a downgrade attack work?

Correct Answer

verifed

verified

In a downgrade attack a threat actor for...

View Answer

Showing 21 - 40 of 50

Related Exams

Show Answer