Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
20 Cards in this Set
- Front
- Back
A digital signature or digital signature scheme is a type of asymmetric cryptography. For messages sent through an insecure channel, a properly implemented digital signature gives the receiver reason to believe the message was sent by the claimed sender. While using a digital signature, the message digest is encrypted with which of the following keys?
|
Senders private key
|
|
Which option is correct about a hash algorithms ability to avoid the same output from two guessed inputs?
|
Collison strength
|
|
Which of the following provides the MOST secure form of encryption?
|
AES
|
|
Which item will effectively allow for fast, highly secure encryption of a USB flash drive?
|
AES256
|
|
Non-repudiation is enforced by which of the following?
|
Digital signatures
|
|
Which of the following refers to the ability to be reasonably certain that data is not modified or tampered with?
|
integrity
|
|
Which description is true about how to accomplish steganography in graphic files?
|
Replacing the least significant bit of each byte.
|
|
What may happen when hashing two different files creates the same result?
|
Collosion
|
|
Encryption is the conversion of data into a form, called a ciphertext that cannot be easily understood by unauthorized people. Which encryption is the strongest by use of mathematical evaluation techniques?
|
AES
|
|
Which of the following types of cryptography is typically used to provide an integrity check?
|
Hash
|
|
The Diffie-Hellman encryption algorithm relies on which of the following?
|
Key Exchange
|
|
Encryption is the conversion of data into a form, called a ciphertext that cannot be easily understood by unauthorized people. Which of the following is considered the weakest encryption?
|
DES
|
|
A security specialist has downloaded a free security software tool from a trusted industry site. The source has published the MD5 hash values for the executable program. The specialist performs a successful virus scan on the download but the MD5 hash is different. Which of the following steps should the specialist take?
|
Avoid executing the file and contact the source website administrator.
|
|
Which of the following would be needed to ensure that a user who has received an email cannot claim that the email was not received?
|
Non-repudiation
|
|
Which of the following types of encryption would be BEST to use for a large amount of data?
|
symmetric
|
|
Which of the following describes the validation of a message’s origin?
|
Non-repudiation
|
|
Identity the service provided by message authentication code (MAC) hash:
|
Integrity
|
|
What is steganography primarily used for?
|
Hide information
|
|
In cryptography, MD5 (Message-Digest algorithm 5) is a widely used cryptographic hash function with a 128-bit hash value. As an Internet standard (RFC 1321), MD5 has been employed in a wide variety of security applications, and is also commonly used to check the integrity of files. A user sees an MD5 hash number beside a file that they wish to download. Which description is true about a hash?
|
A hash is a unique number that is generated based upon the files contents and should be verified after download.
|
|
Most current encryption schemes are based on:
|
algorithms.
|