SEC110_ Chapter 5 Quiz

Which of the following is not one of the functions of a digital signature?

Protect the public key

The NTRUEncrypt cryptographic algorithm makes use of which of the following cryptographic techniques?

lattice-based

What cryptographic method, first proposed in the mid-1980s, makes use of sloping curves instead of large prime numbers?

ECC

In cryptography, which of the five basic protections ensures that the information is correct and no unauthorized person or malicious software has altered that data?

Integrity

On what principle did Julius Caesar's cyptographic messages function?

Each alphabetic letter was shifted three places down in the alphabet

Select below the hashing algorithm that takes plaintext of any length and generates a digest 128 bits in length:

MD2

What is the name of the open source asymmetric cryptography system that runs on Windows, UNIX, and Linux systems, and is compatible with PGP?

GPG

What type of cryptography uses two keys instead of just one, generating both a private and a public key?

Asymmetric

Which type of cryptographic algorithm takes an input string of any length, and returns a string of any requested variable length?

sponge

Cryptography that attempts to use the microscopic behaviors of objects to develop and share keys while also detecting eavesdropping is known as what type of cryptography?

Quantum Cryptography

What is the name of the cryptographic hash function that has international recognition and has been adopted by standards organizations such as the ISO, that creates a digest of 512 bits and will not be subject to patents?

Whirlpool

Data that is in an unencrypted form is referred to as which of the following?

cleartext

What is the block cipher algorithm that operates on 64-bit blocks and can have a key length from 32 to 448 bits known as?

blowfish

The asymmetric cryptography algorithm most commonly used is:

RSA

After the DES cipher was broken and no longer considered secure, what encryption algorithm was made as its successor?

3DES

The SHA-1 hashing algorithm creates a digest that is how many bits in length?

160 bits

Select below the standard that is based on the Rijndael algorithm, and was approved by NIST in late 2000 as a replacement for DES:

AES

A key that is generated by a symmetric cryptographic algorithm is said to be a:

private key

What type of cryptographic algorithm is considered to be a one-way algorithm, in that its contents can't be used to reveal the original set of data?

hash

The simplest type of stream cipher, one in which one letter or character is exchanged for another, is known as what?

substitution

​A symmetric cipher that was approved by the NIST in late 2000 as a replacement for DES

AES

​An algorithm that uses elliptic curves instead of prime numbers to compute keys

ECC

An asymmetric encryption key that does not have to be protected.​

public key

​A symmetric block cipher that uses a 56-bit key and encrypts data in 64-bit blocks

Data Encryption Standard (DES)

A temporary key that is used only once before it is discarded.​

ephemeral key

​An asymmetric encryption key that does have to be protected.

Private Key

A cipher that manipulates an entire block of plaintext at one time.​

Block Cipher

A key exchange that requires all parties to agree upon a large prime number and related integer so that the same key can be separately created.​

Diffie-Hellman (DH)

​An algorithm that takes one character and replaces it with one character.

Stream Cipher

Data that has been encrypted.​

Ciphertext

A block cipher works on a single character at a time, and is faster than a stream cipher.

false

A hash algorithm is designed to create a hash that represents the contents of a set of data that can later be decrypted.

flase

A Hardware Security Module (HSM) is essentially a chip on the motherboard of the computer that provides cryptographic services.

False

Steganography hides the existence of data within images by dividing and hiding portions of a file within the image.

True

SEC110_ Chapter 5 Quiz - Subjecto.com

SEC110_ Chapter 5 Quiz

Your page rank:

Total word count: 657
Pages: 2

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

Which of the following is not one of the functions of a digital signature?

Protect the public key

The NTRUEncrypt cryptographic algorithm makes use of which of the following cryptographic techniques?

lattice-based

What cryptographic method, first proposed in the mid-1980s, makes use of sloping curves instead of large prime numbers?

ECC

In cryptography, which of the five basic protections ensures that the information is correct and no unauthorized person or malicious software has altered that data?

Integrity

On what principle did Julius Caesar’s cyptographic messages function?

Each alphabetic letter was shifted three places down in the alphabet

Select below the hashing algorithm that takes plaintext of any length and generates a digest 128 bits in length:

MD2

What is the name of the open source asymmetric cryptography system that runs on Windows, UNIX, and Linux systems, and is compatible with PGP?

GPG

What type of cryptography uses two keys instead of just one, generating both a private and a public key?

Asymmetric

Which type of cryptographic algorithm takes an input string of any length, and returns a string of any requested variable length?

sponge

Cryptography that attempts to use the microscopic behaviors of objects to develop and share keys while also detecting eavesdropping is known as what type of cryptography?

Quantum Cryptography

What is the name of the cryptographic hash function that has international recognition and has been adopted by standards organizations such as the ISO, that creates a digest of 512 bits and will not be subject to patents?

Whirlpool

Data that is in an unencrypted form is referred to as which of the following?

cleartext

What is the block cipher algorithm that operates on 64-bit blocks and can have a key length from 32 to 448 bits known as?

blowfish

The asymmetric cryptography algorithm most commonly used is:

RSA

After the DES cipher was broken and no longer considered secure, what encryption algorithm was made as its successor?

3DES

The SHA-1 hashing algorithm creates a digest that is how many bits in length?

160 bits

Select below the standard that is based on the Rijndael algorithm, and was approved by NIST in late 2000 as a replacement for DES:

AES

A key that is generated by a symmetric cryptographic algorithm is said to be a:

private key

What type of cryptographic algorithm is considered to be a one-way algorithm, in that its contents can’t be used to reveal the original set of data?

hash

The simplest type of stream cipher, one in which one letter or character is exchanged for another, is known as what?

substitution

​A symmetric cipher that was approved by the NIST in late 2000 as a replacement for DES

AES

​An algorithm that uses elliptic curves instead of prime numbers to compute keys

ECC

An asymmetric encryption key that does not have to be protected.​

public key

​A symmetric block cipher that uses a 56-bit key and encrypts data in 64-bit blocks

Data Encryption Standard (DES)

A temporary key that is used only once before it is discarded.​

ephemeral key

​An asymmetric encryption key that does have to be protected.

Private Key

A cipher that manipulates an entire block of plaintext at one time.​

Block Cipher

A key exchange that requires all parties to agree upon a large prime number and related integer so that the same key can be separately created.​

Diffie-Hellman (DH)

​An algorithm that takes one character and replaces it with one character.

Stream Cipher

Data that has been encrypted.​

Ciphertext

A block cipher works on a single character at a time, and is faster than a stream cipher.

false

A hash algorithm is designed to create a hash that represents the contents of a set of data that can later be decrypted.

flase

A Hardware Security Module (HSM) is essentially a chip on the motherboard of the computer that provides cryptographic services.

False

Steganography hides the existence of data within images by dividing and hiding portions of a file within the image.

True

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending