Filters
Question type

Study Flashcards

How does public key infrastructure work?

Correct Answer

verifed

verified

Public keys are issued by a certificatio...

View Answer

In a ____ attack, the attacker has messages in both encrypted form and decrypted forms.


A) chosen-ciphertext
B) chosen-plaintext
C) known plaintext
D) ciphertext-only

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

A certificate contains a unique serial number and must follow the ____ standard that describes the makings of a certificate.


A) NIST
B) IEEE 802
C) PKI
D) X.509

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

The program ____ is one of the best programs available today for cracking password files.


A) John the Ripper
B) Hydra (THC)
C) Pwdump3v2
D) EXPECT

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

____________________ attacks are used to find the same hash value for two different inputs.

Correct Answer

verifed

verified

What is cryptanalysis?

Correct Answer

verifed

verified

As long as people attempt to create encr...

View Answer

Cryptography is the process of converting plaintext, which is readable text, into ____________________, which is unreadable or encrypted text.

Correct Answer

verifed

verified

MATCHING Match each term with the correct statement below. -operates on plaintext one bit at a time


A) asymmetric encryption
B) collision free
C) symmetric encryption
D) certificate
E) hashing
F) collision
G) stream cipher
H) message digest
I) block cipher

J) E) and F)
K) E) and H)

Correct Answer

verifed

verified

MATCHING Match each term with the correct statement below. -operates on blocks of plaintext


A) asymmetric encryption
B) collision free
C) symmetric encryption
D) certificate
E) hashing
F) collision
G) stream cipher
H) message digest
I) block cipher

J) B) and E)
K) A) and H)

Correct Answer

verifed

verified

In a ____ attack, the attacker has access to plaintext and ciphertext and the ability to choose which messages to encrypt.


A) chosen-ciphertext
B) chosen-plaintext
C) known plaintext
D) ciphertext-only

E) None of the above
F) All of the above

Correct Answer

verifed

verified

The Book of Jeremiah was written using a cipher, or key, known as ____.


A) atbash
B) Enigma
C) Caesar
D) Vigenere

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

What is a substitution cipher?

Correct Answer

verifed

verified

The Book of Jeremiah was written using a...

View Answer

MATCHING Match each term with the correct statement below. -output of a hashing algorithm


A) asymmetric encryption
B) collision free
C) symmetric encryption
D) certificate
E) hashing
F) collision
G) stream cipher
H) message digest
I) block cipher

J) F) and H)
K) E) and F)

Correct Answer

verifed

verified

____ is an asymmetrical algorithm that can be used to encrypt data, create a digital signature, and exchange secret keys.


A) Diffie-Hellman
B) ElGamal
C) Blowfish
D) AES

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

How can confidentiality and authentication be achieved using public key cryptography?

Correct Answer

verifed

verified

If confidentiality is a major concern fo...

View Answer

In a ____ attack, after an attacker has access to a password file, he or she can run a password-cracking program that uses a dictionary of known words or passwords as an input file.


A) brute force
B) replay
C) ciphertext-only
D) dictionary

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

____ is a hashing algorithm developed by Rivest in 1991.


A) RSA
B) MD5
C) SHA-1
D) HAVAL

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

MATCHING Match each term with the correct statement below. -digital document that verifies that the two parties exchanging data over the Internet are really who they claim to be


A) asymmetric encryption
B) collision free
C) symmetric encryption
D) certificate
E) hashing
F) collision
G) stream cipher
H) message digest
I) block cipher

J) B) and G)
K) A) and G)

Correct Answer

verifed

verified

Showing 41 - 58 of 58

Related Exams

Show Answer