IS5403 Week 2 All Quizezz

  1. With this type of key cryptography, the sender and receiver of a message share a single common key.

Symmetric

2. Hashing aims to produce:

A fixed-size bit string

3. MD5 uses a hash value to create a hash which is typically a 32 character hex number and how many bits?

128

4. In Active Directory, what does authorization?

LDAP

5. A Digital signature is a piece of data digest encrypted with:

The private key of the signer.

6. Which of the following may be used as an alternative to CRLs?

OCSP

7. What is the faster way for browsers to obtain the revocation status of a digital certificate attached to a Web site?

OCSP

8. The security administrator for Conglomerate.com has been been directed by the CIO to reduce the cost of certificates. Which of the following is the FIRST step that should be taken?

Install a CA.

9. Which of the following technologies are necessary for implementing USB drive encryption or hard drive encryption? [Choose two that apply.]

HSM

TPM

10. When defining data policies, what areas or issues must be covered? [Choose four that apply.]

Disposing

Retention

Wiping

Storage

11. Which of the following can protect “data at rest”? [Choose four that apply.]

Encrypted file system (EFS)

BitLocker To Go

Transparent database encryption (TDE)

BitLocker

12. Which of these is NOT part of the certificate life cycle?

authorization

13. _____ is a protocol for securely accessing a remote computer.

Secure Shell (SSH)

14. A digital certificate associates _____.

the user’s identity with his public key

15. _____ performs a real-time lookup of a digital certificate’s status.

Online Certificate Status Protocol (OCSP)

16. A centralized directory of digital certificates is called a(n) _____.

Certificate Repository (CR)

17. Which digital certificate displays the name of the entity behind the website?

Extended Validation (EV) Certificate

18. Which digital certificate displays the name of the entity behind the website?

Extended Validation (EV) Certificate

19. Which of these is considered the strongest cryptographic transport protocol?

TLS v1.2

20. Which of the following block ciphers XORs each block of plaintext with the previous block of ciphertext before being encrypted?

Cipher Block Chaining (CBC)

21. The strongest technology that would assure Alice that Bob is the sender of a message is a(n) _____.

digital certificate

22. Public key infrastructure (PKI) _____.

is the management of digital certificates

23. An entity that issues digital certificates is a _____.

Certificate Authority (CA)

24. Which statement is NOT true regarding hierarchical trust models?

It is designed for use on a large scale.

25. _____ are symmetric keys to encrypt and decrypt information exchanged during the session and to verify its integrity.

Session keys

26. _____ refers to a situation in which keys are managed by a third party, such as a trusted CA.

Key escrow

27. A(n) _____ is a published set of rules that govern the operation of a PKI.

certificate policy (CP)

28. What is a value that can be used to ensure that hashed plaintext will not consistently result in the same digest?

salt

29. Which of the following is NOT a method for strengthening a key?

Variability

30. What entity calls in crypto modules to perform cryptographic tasks?

Crypto service provider

31. Digital certificates can be used for each of these EXCEPT _____.

to verify the authenticity of the Registration Authorizer

32. Illya was asked to recommend the most secure asymmetric cryptographic algorithm to his supervisor. Which of the following did he choose?

RSA

33. Which areas of a file cannot be used by steganography to hide data?

in the directory structure of the file system

34. What is the latest version of the Secure Hash Algorithm?

SHA-3

35. Which of the following key exchanges uses the same keys each time?

Diffie-Hellman (DH)

36. At a staff meeting one of the technicians suggested that the enterprise protect its new web server by hiding it and not telling anyone where it is located. Iosif raised his hand and said that security through obscurity was a poor idea. Why did he say that?

It would be essentially impossible to keep its location a secret from everyone

37. If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message?

Alice’s public key

38. Proving that a user sent an email message is known as _____.

non-repudiation

39. A(n) _____ is not decrypted but is only used for comparison purposes.

digest

40. Abram was asked to explain to one of his coworkers the XOR cipher. He showed his coworker an example of adding two bits, 1 and 1. What is the result of this sum?

0

41. The Hashed Message Authentication Code (HMAC) _____.

hashes the key and the message

42. Which of these is NOT a characteristic of a secure hash algorithm?

Collisions should be rare.

43. Alyosha was explaining to a friend the importance of protecting a cryptographic key from cryptoanalysis. He said that the key should not relate in a simple way to the cipher text. Which protection is Alyosha describing?

confusion

44. Alexei was given a key to a substitution cipher. The key showed that the entire alphabet was rotated 13 steps. What type of cipher is this?

ROT13

45. Which of these has an onboard key generator and key storage facility, as well as accelerated symmetric and asymmetric encryption, and can back up sensitive material in encrypted form?

Hardware Security Module (HSM)

46. Which of these is the strongest symmetric cryptographic algorithm?

Advanced Encryption Standard

47. Public key systems that generate random public keys that are different for each session are called _____.

perfect forward secrecy

48. Egor wanted to use a digital signature. Which of the following benefits will the digital signature not provide?

verify the receiver

49. What is data called that is to be encrypted by inputting it into a cryptographic algorithm?

plaintext

50. Which of these is NOT a basic security protection for information that cryptography can provide?

risk loss

51. What is a characteristic of the Trusted Platform Module (TPM)?

It provides cryptographic services in hardware instead of software

Other Links:

Statistics Quiz

Networking Quiz

See other websites for quiz:

Check on QUIZLETCheck on CHEGG

Leave a Reply

Your email address will not be published. Required fields are marked *