• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/11

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

11 Cards in this Set

  • Front
  • Back
How many keys are used with asymmetric or public key cryptography?



A. One


B. Two


C. Three


D. Four

B. Two
A receiver wants to verify the integrity of a message received from a sender. A hashing value is contained within the digital signature of the sender. What must the receiver use to access the hashing value to verify the integrity of the transmission?



A. Sender's public key


B. Receiver's public key


C. Receiver's private key


D. Sender's private key

A. Sender's public key

Which of the following are characteristics of ECC? (Select two. )




A. Symmetric encryption


B. Asymmetric encryption


C. Uses multiplication of large prime numbers


D. Uses a finite set of values within an algebraic field

B. Asymmetric encryption



and




D. Uses a finite set of values within an algebraic field

Which of the following algorithms are used in asymmetric encryption? (Select two. )



A. AES


B. Diffie-Hellman


C. Blowfish


D. Twofish


E. RSA

B. Diffie-Hellman and E. RSA
Above all else, what must be protected to maintain the security and benefit of an asymmetric cryptographic solution, especially if it is widely used for digital certificates?



A. Hash values


B. Cryptographic algorithm


C. Private keys


D. Public keys

C. Private keys
Which of the following generates the key pair used in asymmetric cryptography?



A. OCSP


B. CSP


C. CRL


D. CA


E. CPS

B. CSP
Mary wants to send a message to Sam so that only Sam can read it. Which key would be used to encrypt the message?



A. Sam's private key


B. Mary's public key


C. Sam's public key

C. Sam's public key
The strength of a cryptosystem is dependent upon which of the following?



A. Secrecy of the key


B. Secrecy of the algorithm


C. Complexity of the cipher text


D. Integrity of the individuals who created the cryptosystem

A. Secrecy of the key
Which form of asymmetric cryptography is based upon Diffie-Hellman?



A. ECC


B. Merkle-Hellman Knapsack


C. RSA


D. EIGamal

D. EIGamal
Which cryptography system generates encryption keys that could be used with DES, AES, IDEA, RCS or any other symmetric cryptography solution?



A. RSA


B. Elliptical Curve


C. Diffie-Hellman


D. Merkle-Hellman Knapsack

C. Diffie-Hellman

Mary wants to send a message to Sam. she wants to digitally sign the message to prove that she sent it. Which key would Mary use to create the digital signature?




A: Mary's private key


B: Mary's Public key


C: Sam's private key


D: Sam's public key

A: Mary's private key