• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back
A digital signature or digital signature scheme is a type of asymmetric cryptography. For messages sent through an insecure channel, a properly implemented digital signature gives the receiver reason to believe the message was sent by the claimed sender. While using a digital signature, the message digest is encrypted with which of the following keys?
Senders private key
Which option is correct about a hash algorithms ability to avoid the same output from two guessed inputs?
Collison strength
Which of the following provides the MOST secure form of encryption?
AES
Which item will effectively allow for fast, highly secure encryption of a USB flash drive?
AES256
Non-repudiation is enforced by which of the following?
Digital signatures
Which of the following refers to the ability to be reasonably certain that data is not modified or tampered with?
integrity
Which description is true about how to accomplish steganography in graphic files?
Replacing the least significant bit of each byte.
What may happen when hashing two different files creates the same result?
Collosion
Encryption is the conversion of data into a form, called a ciphertext that cannot be easily understood by unauthorized people. Which encryption is the strongest by use of mathematical evaluation techniques?
AES
Which of the following types of cryptography is typically used to provide an integrity check?
Hash
The Diffie-Hellman encryption algorithm relies on which of the following?
Key Exchange
Encryption is the conversion of data into a form, called a ciphertext that cannot be easily understood by unauthorized people. Which of the following is considered the weakest encryption?
DES
A security specialist has downloaded a free security software tool from a trusted industry site. The source has published the MD5 hash values for the executable program. The specialist performs a successful virus scan on the download but the MD5 hash is different. Which of the following steps should the specialist take?
Avoid executing the file and contact the source website administrator.
Which of the following would be needed to ensure that a user who has received an email cannot claim that the email was not received?
Non-repudiation
Which of the following types of encryption would be BEST to use for a large amount of data?
symmetric
Which of the following describes the validation of a message’s origin?
Non-repudiation
Identity the service provided by message authentication code (MAC) hash:
Integrity
What is steganography primarily used for?
Hide information
In cryptography, MD5 (Message-Digest algorithm 5) is a widely used cryptographic hash function with a 128-bit hash value. As an Internet standard (RFC 1321), MD5 has been employed in a wide variety of security applications, and is also commonly used to check the integrity of files. A user sees an MD5 hash number beside a file that they wish to download. Which description is true about a hash?
A hash is a unique number that is generated based upon the files contents and should be verified after download.
Most current encryption schemes are based on:
algorithms.