• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/50

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

50 Cards in this Set

  • Front
  • Back
Cryptography does not concern itself with:
A. Availability
B. Integrity
C. Confidentiality
D. Authenticity
A. Availability
Kerberos depends upon what encryption method?
A. Public Key cryptography
B. Private Key cryptography
C. El Gamal cryptography
D. Blowfish cryptography
B. Private Key cryptography
What is the PRIMARY advantage of secret key encryption systems as compared with public key
systems?
A. Faster speed encryption
B. Longer key lengths
C. Easier key management
D. Can be implemented in software
A. Faster speed encryption
Cryptography does not help in:
A. Detecting fraudulent insertion
B. Detecting fraudulent deletion
C. Detecting fraudulent modifications
D. Detecting fraudulent disclosure
D. Detecting fraudulent disclosure
When block chaining cryptography is used, what type of code is calculated and appended to the
data to ensure authenticity?
A. Message authentication code.
B. Ciphertext authentication code
C. Cyclic redundancy check
D. Electronic digital signature
A. Message authentication code.
Compared to RSA, which of the following is true of elliptic curve cryptography?
A. It has been mathematically proved to be the more secure
B. It has been mathematically proved to be less secure
C. It is believed to require longer keys for equivalent security
D. It is believed to require shorter keys for equivalent security
D. It is believed to require shorter keys for equivalent security
The RSA algorithm is an example of what type of cryptography?
A. Asymmetric key
B. Symmetric key
C. Secret Key
D. Private Key
A. Asymmetric key
Public key cryptography provides integrity verification through the use of public key signature and?
A. Secure hashes
B. Zero knowledge
C. Private key signature
D. Session key
A. Secure hashes
Which one of the following is a technical solution for the quality of service, speed, and security
problems facing the Internet?
A. Random Early Detection (RED) queuing
B. Multi-protocol label-switching (MPLS)
C. Public Key Cryptography Standard (PKCS)
D. Resource Reservation Protocol (RSVP)
B. Multi-protocol label-switching (MPLS)
Which of the following is not a weakness of symmetric cryptography?
A. Limited security
B. Key distribution
C. Speed
D. Scalability
C. Speed
Why is public key cryptography recommended for use in the process of securing facsimiles during
transmission?
A. Keys are never transmitted over the network.
B. Data compression decreases key change frequency.
C. Key data is not recognizable from facsimile data.
D. The key is securely passed to the receiving machine.
D. The key is securely passed to the receiving machine.
How fast is private key cryptography compared to public key cryptography?
A. 10 to 100 times faster.
B. 100 to 1000 times faster.
C. 1000 to 10000 times faster.
D. 10000 to 20000 times faster.
C. 1000 to 10000 times faster.
Which of the following elements is not included in a Public Key Infrastructure (PKI)?
A. Timestamping
B. Lightweight Directory Access Protocol (LDAP)
C. Certificate revocation
D. Internet Key Exchange (IKE)
D. Internet Key Exchange (IKE)
The Secure European System for Applications in a Multivendor
Environment (SESAME) implements a Kerberos-like distribution of
secret keys. Which of the following is NOT a characteristic of SESAME?
A. Uses a trusted authentication server at each host
B. Incorporates two certificates or tickets, one for authentication and
one defining access privileges
C. Uses secret key cryptography for the distribution of secret keys
D. Uses public key cryptography for the distribution of secret keys
C. Uses secret key cryptography for the distribution of secret keys
Using symmetric key cryptography, Kerberos authenticates clients to
other entities on a network and facilitates communications through the
assignment of:
A. Tokens.
B. Passwords.
C. Public keys.
D. Session keys.
D. Session keys.
How is authentication implemented in GSM?
A. Using public key cryptography
B. It is not implemented in GSM
C. Using secret key cryptography
D. Out-of-band verification
C. Using secret key cryptography
In public key cryptography,
A. The public key is used to encrypt and decrypt.
B. Only the private key can encrypt and only the public key can decrypt.
C. If the public key encrypts, then only the private key can decrypt.
D. Only the public key can encrypt and only the private key can decrypt.
C. If the public key encrypts, then only the private key can decrypt.
Elliptic curves, which are applied to public key cryptography, employ
modular exponentiation that characterizes the:
A. Knapsack problem.
B. Elliptic curve modular addition.
C. Elliptic curve discrete logarithm problem.
D. Prime factors of very large numbers.
C. Elliptic curve discrete logarithm problem.
In a hybrid cryptographic system, usually:
A. Digital certificates cannot be used.
B. Neither public key nor private key cryptography is used.
C. Public key cryptography is used for the encryption of the message.
D. Private key cryptography is used for the encryption of the message.
D. Private key cryptography is used for the encryption of the message.
In a hybrid cryptographic system, usually:
A. Digital certificates cannot be used.
B. Neither public key nor private key cryptography is used.
C. Public key cryptography is used for the encryption of the message.
D. Private key cryptography is used for the encryption of the message.
D. Private key cryptography is used for the encryption of the message.
In most security protocols that support authentication, integrity and confidentiality,
A. Public key cryptography is used to create digital signatures.
B. Private key cryptography is used to create digital signatures.
C. Digital signatures are not implemented.
D. DES is used to create digital signatures.
A. Public key cryptography is used to create digital signatures.
Which of the following is NOT an issue with secret key cryptography?
A. Compromise of the keys can enable the attacker to impersonate the
key owners and, therefore, read and send false messages.
B. A networked group of m users with separate keys for each pair of
users will require m (m-1)/2 keys.
C. Security of the certification authority.
D. Secure distribution of the keys.
C. Security of the certification authority.
The theft of a laptop poses a threat to which tenet of the C.I.A. triad?
A. All of the above
B. Availability
C. Integrity
D. Confidentiality
A. All of the above
What are the three fundamental principles of security?
A. Accountability, confidentiality, and integrity
B. Confidentiality, integrity, and availability
C. Integrity, availability, and accountability
D. Availability, accountability, and confidentiality
B. Confidentiality, integrity, and availability
Making sure that the data is accessible when and where it is needed is which of the following?
A. Confidentiality
B. integrity
C. acceptability
D. availability
D. availability
Which of the following describes elements that create reliability and stability in networks and
systems and which assures that connectivity is accessible when needed?
A. Availability
B. Acceptability
C. Confidentiality
D. Integrity
A. Availability
The technique of confusion, proposed by Claude Shannon, is used in block ciphers to:
A. Conceal the statistical connection between ciphertext and plaintext.
B. Implement transposition to obtain the ciphertext.
C. Spread the influence of a plaintext character over many ciphertext characters.
D. Limit the influence of a plaintext character across ciphertext characters.
A. Conceal the statistical connection between ciphertext and plaintext.
In a block cipher, diffusion can be accomplished through:
A. Nonlinear S-boxes
B. Substitution
C. Permutation
D. XORing
C. Permutation
In a block cipher, diffusion:
A. Conceals the connection between the ciphertext and plaintext
B. Is usually implemented by non-linear S-boxes
C. Spreads the influence of a plaintext character over many ciphertext
characters
D. Cannot be accomplished
C. Spreads the influence of a plaintext character over many ciphertext
characters
Which is an extremely powerful type of substitution cipher.
A. Running key cipher
B. One-time pad
C. Steganography
D. Cipher block chaining
B. One-time pad
What are two types of ciphers?
A. Transposition and Permutation
B. Transposition and Shift
C. Transposition and Substitution
D. Substitution and Replacement
C. Transposition and Substitution
The classic Caesar cipher is a:
A. Code group.
B. Transposition cipher.
C. Monoalphabetic cipher.
D. Polyalphabetic cipher.
C. Monoalphabetic cipher.
Which of the following ciphers is a subset of the Vignere polyalphabetic cipher?
A. Caesar
B. Jefferson
C. Alberti
D. SIGABA
A. Caesar
What is the result of the Exclusive Or operation, 1XOR 0?
A. 1
B. Indeterminate
C. 10
D. 0
A. 1
Ablock cipher:
A. Converts a variable-length of plaintext into a fixed length ciphertext.
B. Is an asymmetric key algorithm.
C. Encrypts by operating on a continuous data stream.
D. Breaks a message into fixed length units for encryption.
D. Breaks a message into fixed length units for encryption.
Which of the following is NOT an advantage of a stream cipher?
A. The same equipment can be used for encryption and decryption.
B. It is amenable to hardware implementations that result in higher
speeds.
C. Since encryption takes place bit by bit, there is no error propagation.
D. The receiver and transmitter must be synchronized.
D. The receiver and transmitter must be synchronized.
In an expert system, the process of beginning with a possible solution and using the knowledge in the knowledge base to justify the solution based on the raw input data is called:
A. Forward chaining
B. Dynamic reasoning
C. A blackboard solution
D. Backward chaining
D. Backward chaining
Which expert system operating mode allows determining if a given hypothesis is valid?
A. Vertical chaining
B. Lateral chaining
C. Forward chaining
D. Backward chaining
D. Backward chaining
The repeated use of the algorithm to encipher a message consisting of many blocks is called
A. Cipher feedback
B. Elliptical curve
C. Cipher block chaining
D. Triple DES
C. Cipher block chaining
How many rounds are used by DES?
A. 16
B. 32
C. 64
D. 48
A. 16
Which of the following is the most secure form of triple-DES encryption?
A. DES-EDE3
B. DES-EDE1
C. DES-EEE4
D. DES-EDE2
A. DES-EDE3
Which is a characteristic of IDEA?
A. 56 bytes
B. 64 bits
C. 64 bytes
D. All of the above
E. None of the above
B. 64 bits
Which of the following is an example of a symmetric key algorithm?(Choose all that apply)
A. Rijndael
B. RSA
C. Diffie-Hellman
D. Knapsack
E. IDEA
A. Rijndael
E. IDEA
Which of the following is a symmetric block ciphers?
A. RSA
B. Blow Fish
C. RC5
D. El Gamal
B. Blow Fish
The RSA algorithm is an example of what type of cryptography?
A. Asymmetric key
B. Symmetric key
C. Secret Key
D. Private Key
A. Asymmetric key
Which one of the following is an asymmetric algorithm?
A. Data Encryption Algorithm.
B. Data Encryption Standard
C. Enigma
D. Knapsack
D. Knapsack
Asymmetric encryption uses:
A. pulbic keys
B. Private keys
C. is used for digital signatures
D. uses one way functions
all of the above
Symmetric Encryption
a. uses one key for encryption
b. PGP
c. it is fast
all of the above
What do the message digest algorithms MD2, MD4 and MD5 have in
common?
A. They are all used in the Secure Hash Algorithm (SHA).
B. They all take a message of arbitrary length and produce a message
digest of 128-bits.
C. They all take a message of arbitrary length and produce a message
digest of 160-bits.
D. They are all optimized for 32-bit machines.
B. They all take a message of arbitrary length and produce a message
digest of 128-bits.
What size is an MD5 message digest (hash)?
A. 128 bits
B. 160 bits
C. 256 bits
D. 128 bytes
A. 128