Filters
Question type

Study Flashcards

Which function ensures that a sender and receiver cannot deny sending or receiving a specific message?


A) Authentication
B) Nonrepudiation
C) Availability
D) Integrity

Correct Answer

verifed

verified

Cryptography is the process of converting plaintext,which is readable text,into unreadable or encrypted text called which if the following?


A) ciphertext
B) cleartext
C) maskedtext
D) subtext

Correct Answer

verifed

verified

In what type of attack does the attacker need access to the cryptosystem,and the ciphertext to be decrypted to yield the desired plaintext results?


A) chosen-ciphertext
B) chosen-plaintext
C) known plaintext
D) ciphertext-only

Correct Answer

verifed

verified

What is an encryption algorithm?

Correct Answer

verifed

verified

An encryption algorithm is a mathematica...

View Answer

What type of attack is being conducted when the attacker has messages in both encrypted form and decrypted forms?


A) chosen-ciphertext
B) chosen-plaintext
C) known plaintext
D) ciphertext-only

Correct Answer

verifed

verified

Match each item with a statement below. -Uses two keys: one to encrypt data and one to decrypt data


A) asymmetric algorithm
B) DEA
C) symmetric algorithm
D) certificate
E) hashing algorithm
F) birthday attacks
G) stream cipher
H) PKI
I) key
J) salt

Correct Answer

verifed

verified

What is Triple Data Encryption Standard (3DES)?

Correct Answer

verifed

verified

Triple Data Encryption Standard (3DES)se...

View Answer

What encryption algorithm can be used for both encryption and digital signing,uses a one-way function,and is still widely used in e-commerce?


A) ECC
B) RSA
C) DES
D) AES

Correct Answer

verifed

verified

Which of the following is the process of converting ciphertext back into plaintext?


A) ciphering
B) encryption
C) decryption
D) decoding

Correct Answer

verifed

verified

Which of the following is a range of allowable values that is used to generate an encryption key?


A) algorithm area
B) key range
C) keyspace
D) keyarea

Correct Answer

verifed

verified

C

Which of the following is a scripting language for Windows and Linux that performs repetitive tasks,such as password cracking?


A) John the Ripper
B) Hydra (THC)
C) Pwdump3v2
D) EXPECT

Correct Answer

verifed

verified

What type of attack is being performed when an attacker intercepts the initial communications between a Web server and a Web browser while forcing a vulnerable server to insecurely renegotiate the encryption being used down to a weaker cipher?


A) Cross Server attack
B) SSL/TLS downgrade attack
C) Hydra attack
D) TCP/IP attack

Correct Answer

verifed

verified

If a security expert decides to study the process of breaking encryption algorithms,they are performing which of the following?


A) cryptography
B) ciphering
C) cryptanalysis
D) substitution analysis

Correct Answer

verifed

verified

When an attacker has access to a password file,they can run a password-cracking program that uses a dictionary of known words or passwords as an input file.What type of attack is this attacker performing?


A) brute force
B) replay
C) ciphertext-only
D) dictionary

Correct Answer

verifed

verified

D

What is a certificate?

Correct Answer

verifed

verified

A certificate is a digital document veri...

View Answer

What is a digital signature?

Correct Answer

verifed

verified

Asymmetric algorithms have a useful feat...

View Answer

Match each item with a statement below. -The use of random data alongside plaintext as an input to a hashing function so that the output is unique


A) asymmetric algorithm
B) DEA
C) symmetric algorithm
D) certificate
E) hashing algorithm
F) birthday attacks
G) stream cipher
H) PKI
I) key
J) salt

Correct Answer

verifed

verified

How can confidentiality and authentication be achieved using public key cryptography?

Correct Answer

verifed

verified

If confidentiality is a major concern fo...

View Answer

Match each item with a statement below. -Used to find the same hash value for two different inputs and reveal any mathematical weaknesses in a hashing algorithm


A) asymmetric algorithm
B) DEA
C) symmetric algorithm
D) certificate
E) hashing algorithm
F) birthday attacks
G) stream cipher
H) PKI
I) key
J) salt

Correct Answer

verifed

verified

Which of the following refers to verifying the sender or receiver (or both) is who they claim to be?


A) Authentication
B) Nonrepudiation
C) Availability
D) Authorization

Correct Answer

verifed

verified

A

Showing 1 - 20 of 50

Related Exams

Show Answer