Filters
Question type

Study Flashcards

A __________ is the information used in conjunction with an algorithm to create the ciphertext from the plaintext or derive the plaintext from the ciphertext.


A)  password
B)  cipher 
C)  key
D)  passphrase

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

__________ was developed by Phil Zimmermann and uses the IDEA cipher for message encoding.


A)  PEM
B)  PGP 
C)  S/MIME
D)  SSL

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

You cannot combine the XOR operation with a block cipher operation.

A) True
B) False

Correct Answer

verifed

verified

_________ is a hybrid cryptosystem that combines some of the best available cryptographic algorithms and has become the open-source de facto standard for encryption and authentication of e-mail and file storage applications.


A)  PGP
B)  DES 
C)  AH
D)  ESP

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

SHA-1 produces a(n) ___________-bit message digest, which can then be used as an input to a digital signature algorithm.


A)  48
B)  56 
C)  160
D)  256

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

Internet Protocol Security is designed to protect data integrity, user confidentiality, and authenticity at the IP packet level. _________________________

A) True
B) False

Correct Answer

verifed

verified

A(n) key is the set of steps used to convert an unencrypted message into an encrypted sequence of bits that represent the message; it sometimes refers to the programs that enable the cryptographic processes. _________________________

A) True
B) False

Correct Answer

verifed

verified

As DES became known as being too weak for highly classified communications, Double DES was created to provide a level of security far beyond that of DES. _________________________

A) True
B) False

Correct Answer

verifed

verified

The encapsulating security ____________________ protocol provides secrecy for the contents of network communications as well as system-to-system authentication and data integrity verification.

Correct Answer

verifed

verified

Secure Electronic Transactions was developed by MasterCard and Visa in 1997 to protect against electronic payment fraud.

A) True
B) False

Correct Answer

verifed

verified

Popular cryptosystems use a hybrid combination of symmetric and asymmetric algorithms.

A) True
B) False

Correct Answer

verifed

verified

__________ is the process of converting an original message into a form that is unreadable to unauthorized individuals.


A)  Encryption
B)  Decryption 
C)  Cryptology
D)  Cryptography

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

To ____________________ means to encrypt, encode, or convert plaintext into the equivalent ciphertext.

Correct Answer

verifed

verified

A __________ is a key-dependent, one-way hash function that allows only specific recipients (symmetric key holders) to access the message digest.


A)  signature
B)  MAC 
C)  fingerprint
D)  digest

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

The ____________________ operation is a function of Boolean algebra in which two bits are compared, and if the two bits are identical, the result is a binary 0.

Correct Answer

verifed

verified

AES implements a block cipher called the Rijndael ​Block Cipher. _________________________

A) True
B) False

Correct Answer

verifed

verified

3DES was created to offer the same strength as the DES algorithm but ran three times as fast, thus saving time.

A) True
B) False

Correct Answer

verifed

verified

When an asymmetric cryptographic process uses the sender's private key to encrypt a message, the sender's public key must be used to decrypt the message.

A) True
B) False

Correct Answer

verifed

verified

The most common hybrid system is based on the Diffie-Hellman key exchange, which is a method for exchanging private keys using public-key encryption.

A) True
B) False

Correct Answer

verifed

verified

__________ is the current federal information processing standard that specifies a cryptographic algorithm used within the U.S. government to protect information in federal agencies that are not a part of the national defense infrastructure.


A)  DES
B)  2DES 
C)  AES
D)  3DES

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

Showing 21 - 40 of 109

Related Exams

Show Answer