Filters
Question type

Study Flashcards

What is the name of the cryptographic hash function that has international recognition and has been adopted by standards organizations such as the ISO, that creates a digest of 512 bits and will not be subject to patents?


A) Twofish
B) Blowfish
C) Whirlpool
D) Rijndal

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

Self-encrypting HDD is commonly found in copiers and multifunction printers as well as point-of-sale systems used in government, financial, and medical environments.

A) True
B) False

Correct Answer

verifed

verified

Match the following terms to the appropriate definitions -A key exchange that requires all parties to agree upon a large prime number and related integer so that the same key can be separately created.​


A) Advanced Encryption Standard (AES)
B) Block cipher
C) Ciphertext
D) Data Encryption Standard (DES)
E) Diffie-Hellman (DH)
F) Elliptic curve cryptography (ECC)
G) Ephemeral key
H) Private key
I) Public key
J) Stream cipher

K) A) and D)
L) H) and J)

Correct Answer

verifed

verified

Match the following terms to the appropriate definitions -An asymmetric encryption key that does not have to be protected.​


A) Advanced Encryption Standard (AES)
B) Block cipher
C) Ciphertext
D) Data Encryption Standard (DES)
E) Diffie-Hellman (DH)
F) Elliptic curve cryptography (ECC)
G) Ephemeral key
H) Private key
I) Public key
J) Stream cipher

K) B) and E)
L) H) and J)

Correct Answer

verifed

verified

How can steganography be used to hide information in something other than images?

Correct Answer

verifed

verified

Steganography can be used to hide data within the file header fields that describe the file, between sections of the metadata.

Match the following terms to the appropriate definitions -​An algorithm that uses elliptic curves instead of prime numbers to compute keys


A) Advanced Encryption Standard (AES)
B) Block cipher
C) Ciphertext
D) Data Encryption Standard (DES)
E) Diffie-Hellman (DH)
F) Elliptic curve cryptography (ECC)
G) Ephemeral key
H) Private key
I) Public key
J) Stream cipher

K) C) and F)
L) B) and F)

Correct Answer

verifed

verified

Match the following terms to the appropriate definitions -​An algorithm that takes one character and replaces it with one character.


A) Advanced Encryption Standard (AES)
B) Block cipher
C) Ciphertext
D) Data Encryption Standard (DES)
E) Diffie-Hellman (DH)
F) Elliptic curve cryptography (ECC)
G) Ephemeral key
H) Private key
I) Public key
J) Stream cipher

K) A) and I)
L) C) and I)

Correct Answer

verifed

verified

J

Select below the standard that is based on the Rijndael algorithm, and was approved by NIST in late 2000 as a replacement for DES:


A) AES
B) 3DES
C) RSA
D) Twofish

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

Data that is in an unencrypted form is referred to as which of the following?


A) Plaintext
B) Plain text
C) Simpletext
D) Cleartext

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

A block cipher works on a single character at a time, and is faster than a stream cipher.

A) True
B) False

Correct Answer

verifed

verified

The original cryptographic algorithms for encrypting and decrypting documents are ____________________ cryptographic algorithms.

Correct Answer

verifed

verified

What is the block cipher algorithm that operates on 64-bit blocks and can have a key length from 32 to 448 bits known as?


A) RSA
B) AES
C) Blowfish
D) 3DES

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

The NTRUEncrypt cryptographic algorithm makes use of which of the following cryptographic techniques?


A) matrix-based
B) lattice-based
C) linear
D) quantum

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Cryptography that attempts to use the microscopic behaviors of objects to develop and share keys while also detecting eavesdropping is known as what type of cryptography?


A) Reactive cryptography
B) Symmetric cryptography
C) Analog cryptography
D) Quantum cryptography

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

A hash algorithm is designed to create a hash that represents the contents of a set of data that can later be decrypted.

A) True
B) False

Correct Answer

verifed

verified

Discuss how cryptography can help ensure the availability of the data.

Correct Answer

verifed

verified

Rather than keeping an important file or...

View Answer

Match the following terms to the appropriate definitions -A cipher that manipulates an entire block of plaintext at one time.​


A) Advanced Encryption Standard (AES)
B) Block cipher
C) Ciphertext
D) Data Encryption Standard (DES)
E) Diffie-Hellman (DH)
F) Elliptic curve cryptography (ECC)
G) Ephemeral key
H) Private key
I) Public key
J) Stream cipher

K) B) and C)
L) C) and D)

Correct Answer

verifed

verified

Select below the hashing algorithm that takes plaintext of any length and generates a digest 128 bits in length:


A) RSA
B) SHA1
C) MD5
D) MD2

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

The Data Encryption Standard is a(n) ______________ cipher.

Correct Answer

verifed

verified

In cryptography, which of the five basic protections ensures that the information is correct and no unauthorized person or malicious software has altered that data?


A) Confidentiality
B) Availability
C) Encryption
D) Integrity

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

D

Showing 1 - 20 of 50

Related Exams

Show Answer