Filters
Question type

Study Flashcards

Describe how Message Digest2 (MD2) works.

Correct Answer

verifed

verified

Message Digest 2 (MD2) takes plaintext o...

View Answer

Describe the RIPEMD hash.

Correct Answer

verifed

verified

Another hash was developed by the Resear...

View Answer

The SHA-1 hashing algorithm creates a digest that is how many bits in length?


A) ​96 bits
B) ​128 bits
C) ​160 bits
D) ​192 bits

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

A key that is generated by a symmetric cryptographic algorithm is said to be a:


A) private key
B) public key
C) symmetric key
D) shared key

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

After the DES cipher was broken and no longer considered secure, what encryption algorithm was made as its successor?


A) AES
B) Twofish
C) 3DES
D) RSA

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

What cryptographic method, first proposed in the mid-1980s, makes use of sloping curves instead of large prime numbers?


A) FCC
B) RSA
C) ECC
D) IKE

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

What type of cryptography uses two keys instead of just one, generating both a private and a public key?


A) Symmetric
B) Asymmetric
C) Shared
D) Open

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Match the following terms to the appropriate definitions -Data that has been encrypted.​


A) Advanced Encryption Standard (AES)
B) Block cipher
C) Ciphertext
D) Data Encryption Standard (DES)
E) Diffie-Hellman (DH)
F) Elliptic curve cryptography (ECC)
G) Ephemeral key
H) Private key
I) Public key
J) Stream cipher

K) A) and E)
L) E) and G)

Correct Answer

verifed

verified

The asymmetric cryptography algorithm most commonly used is:


A) AES
B) RSA
C) Twofish
D) Blowfish

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Which of the following is not one of the functions of a digital signature?


A) Verification of the sender
B) Prevention of the sender from disowning the message
C) Prove the integrity of the message
D) Protect the public key

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

Discuss how HMAC works.

Correct Answer

verifed

verified

HMAC begins with a shared secret key tha...

View Answer

On what principle did Julius Caesar's cryptographic messages function?


A) Each alphabetic letter was replaced by a corresponding number
B) Each alphabetic letter was represented by a seemingly random symbol
C) Each alphabetic letter was shifted three places down in the alphabet
D) Each alphabetic letter was shifted 5 places up in the alphabet.

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

Match the following terms to the appropriate definitions -​A symmetric block cipher that uses a 56-bit key and encrypts data in 64-bit blocks


A) Advanced Encryption Standard (AES)
B) Block cipher
C) Ciphertext
D) Data Encryption Standard (DES)
E) Diffie-Hellman (DH)
F) Elliptic curve cryptography (ECC)
G) Ephemeral key
H) Private key
I) Public key
J) Stream cipher

K) F) and J)
L) A) and B)

Correct Answer

verifed

verified

In information technology, ____________________ is the process of proving that a user performed an action, such as sending an e-mail message or a specific document. ​Match the following terms to the appropriate definitions.​

Correct Answer

verifed

verified

Which type of cryptographic algorithm takes an input string of any length, and returns a string of any requested variable length?


A) Substitution
B) Block
C) Loop
D) Sponge

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

A(n) ____________________ is a method used by operating systems to store, retrieve, and organize files.

Correct Answer

verifed

verified

If using the MD5 hashing algorithm, what is the length to which each message is padded?


A) 32 bits
B) 64 bits
C) 128 bits
D) 512 bits

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

Match the following terms to the appropriate definitions -​A symmetric cipher that was approved by the NIST in late 2000 as a replacement for DES


A) Advanced Encryption Standard (AES)
B) Block cipher
C) Ciphertext
D) Data Encryption Standard (DES)
E) Diffie-Hellman (DH)
F) Elliptic curve cryptography (ECC)
G) Ephemeral key
H) Private key
I) Public key
J) Stream cipher

K) F) and J)
L) B) and I)

Correct Answer

verifed

verified

Match the following terms to the appropriate definitions -A temporary key that is used only once before it is discarded.​


A) Advanced Encryption Standard (AES)
B) Block cipher
C) Ciphertext
D) Data Encryption Standard (DES)
E) Diffie-Hellman (DH)
F) Elliptic curve cryptography (ECC)
G) Ephemeral key
H) Private key
I) Public key
J) Stream cipher

K) I) and J)
L) C) and J)

Correct Answer

verifed

verified

Explain hashing.

Correct Answer

verifed

verified

Hashing is a process for creating a uniq...

View Answer

Showing 21 - 40 of 50

Related Exams

Show Answer