b. encrypts the key and the message |
The Hashed Message Authentication Code (HMAC) __________. a. encrypts only the key b. encrypts the key and the message c. encrypts only the message d. encrypts the DHE key only |
b. SHA-3 |
What is the latest version of the Secure Hash Algorithm? a. SHA-2 b. SHA-3 c. SHA-4 d. SHA-5 |
d. OTP |
All of the following can be broken mathematically EXCEPT____________. a. AES b. 3DES c. SHA d. OTP |
a. in-band key exchange |
Elliptic Curve Diffie-Hellman (ECDH) is an example of ______________. a. in-band key exchange b. out-of-band key exchange c. SHA-1 key management d. AES key certification |
b. Diffie-Hellman (DH) |
Which of the following key exchanges uses the same keys each time? a. Diffie-Hellman Ephemeral (DHE) b. Diffie-Hellman (DH) c. Diffie-Hellman-RSA (DHRSA) d. Elliptic Curve Diffie-Hellman (ECDH) |
d. perfect forward secrecy |
Public key systems that generate random public keys that are different for each session are called __________________. a. Public Key Exchange (PKE) b. Elliptic Curve Diffie-Hellman (ECDH) c. Diffie-Hellman (DH) d. perfect forward secrecy |
a. plaintext |
What is data called that is to be encrypted by inputting it into a cryptographic algorithm? a. plaintext b. cleartext c. opentext d. ciphertext |
a. risk loss |
Which of these is NOT a basic security protection for information that cryptography can provide? a. risk loss b. integrity c. confidentiality d. authenticity |
b. in the directory structure of the file system |
The areas of a file in which steganography can hide data include all of the following EXCEPT_________. a. in data that is used to describe the content or structure of the actual data b. in the directory structure of the file system c. in the file header fields that describe the file d. in areas that contain the content data itself. |
c. non-repudiation |
Proving that a user sent an email message is known as ______________. a. repudiation b. integrity c. non-repudiation d. availability |
b. digest |
A(n) ______________ is not decrypted but is only used for comparison purposes. a. stream b. digest c. algorithm d. key |
a. Collisions should be rare |
Which of these is NOT a characteristic of a secure has algorithm? a. Collisions should be rare b. The results of a hash function should not be reversed. c. The hash should always be the same fixed size d. A message cannot be produced from a predefined hash |
c. integrity |
Which protection is provided by hashing? a. authenticity b. confidentiality c. integrity d. availability |
a. Advanced Encryption Standard |
Which of these is the strongest symmetric cryptographic algorithm? a. Advanced Encryption Standard b. Data Encryption Standard c. Triple Data Encryption Standard d. Rivest Cipher (RC) 1 |
b. Alice’s public key |
If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message? a. Alice’s private key b. Alice’s public key c. Bob’s public key d. Bob’s private key |
b. verify the receiver |
A digital signature can provide each of the following benefits EXCEPT _____________. a. prove the integrity of the message b. verify the receiver c. verify the sender d. enforce nonrepudiation |
c. RSA |
Which asymmetric cryptographic algorithm is the most secure? a. SHA-2 b. BTC-2 c. RSA d. ME-14 |
d. RSA |
Which asymmetric encryption algorithm uses prime numbers? a. EFS b. quantum computing c. ECC d. RSA |
d. provides cryptographic services in hardware instead of software. |
The Trusted Platform Module (TPM) ____________. a. allows the user to boot a corrupted disk and repair it b. is available only on Windows computers running BitLocker. c. includes a pseudorandom number generator (PRNG) d. provides cryptographic services in hardware instead of software. |
d. Hardware Security Module (HSM) |
Which of these has an onboard key generator and key storage facility, as well as accelerated symmetric and asymmetric encryption, and can back up sensitive material in encrypted form? a. Trusted Platform Module (TPM) b. self-encrypting hard disk drives (HDDs) c. encrypted hardware-based USB drives d. Hardware Security Module (HSM) |
Security+ Chapter 5 review questions
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price