The financial industry created the ansi x9.17 standard to define key management procedures.

  1. T/F: A digitized signature is a combination of a strong hash of a message and a secret key.

    False

  2. T/F: A keyword mixed alphabet cipher uses a cipher alphabet that consists of a keyword, minus duplicates, followed by the remaining letters of the alphabet.

    True

  3. T/F: A person demonstrates anonymity when posting information to a web discussion site without authorities knowing who he or she is.

    True

  4. T/F: A physical courier delivering an asymmetric key is an example of in-band key exchange.

    False

  5. T/F: A private key cipher is also called an asymmetric key cipher.

    False

  6. T/F: A salt value is a set of random characters you can combine with an actual input key to create the encryption key.

    True

  7. T/F: A substitution cipher replaces bits, characters, or blocks of information with other bits, characters, or blocks.

    True

  8. T/F: An algorithm is a repeatable process that produces the same result when it receives the same input.

    True

  9. T/F: Cryptographic key distribution is typically done by phone.

    False

  10. T/F: Digital signatures require asymmetric key cryptography.

    True

  11. T/F: In a chosen-ciphertext attack, cryptanalysts submit data coded with the same cipher and key they are trying to break to the decryption device to see either the plaintext output or the effect the decrypted message has on some system.

    True

  12. T/F: In a known-plaintext attack (KPA), the cryptanalyst has access only to a segment of encrypted data, and has no choice as to what that data might be.

    False

  13. T/F: Integrity-checking tools use cryptographic methods to make sure nothing and no one has modified the software.

    True

  14. T/F: Message authentication confirms the identity of the person who started a correspondence.

    True

  15. T/F: Product cipher is an encryption algorithm that has no corresponding decryption algorithm.

    False

  16. T/F: The Diffie-Hellman (DHE) algorithm is the basis for several common key exchange protocols, including Diffie-Hellman in Ephemeral mode (DHE) and Elliptic Curve DHE (ECDHE).

    True

  17. T/F: The financial industry created the ANSI X9.17 standard to define key management procedures.

    True

  18. T/F: The hash message authentication code (HMAC) is a hash function that uses a key to create a hash, or message digest.

    True

  19. T/F: The term certificate authority (CA) refers to a trusted repository of all public keys.

    False

  20. T/F: You must always use the same algorithm to encrypt information and decrypt the same information.

    False

  21. ________ offers a mechanism to accomplish four security goals: confidentiality, integrity, authentication, and nonrepudiation.



    A) Cryptography

  22. T/F: A strong hash function is designed so that a message cannot be forged that will result in the same hash as a legitimate message.

    True

  23. The act of scrambling plaintext into ciphertext is known as ________.



    D) Encryption

  24. An algorithm used for cryptographic purposes is known as a ________.



    C) Cipher

  25. T/F: Encryption ciphers fall into two general categories: symmetric (private) key and asymmetric (public) key.

    True

  26. An encryption cipher that uses the same key to encrypt and decrypt is called a ________ key.



    A) Symmetric (private)

  27. ________ corroborates the identity of an entity, whether the sender, the sender's computer, some device, or some information.



    A) Authentication

  28. Which of the following is one of the four basic forms of a cryptographic attack?




    B) All of these

  29. T/F: The two basic types of ciphers are transposition and substitution.

    True

  30. A ________ is used to detect forgeries.



    B) Hash value

  31. DES, IDEA, RC4, and WEP are examples of ________.



    D) Symmetric algorithms (or standards)

  32. A ________ signature is a representation of a physical signature stored in a digital format.



    B) Digitized

Home

Subjects

Expert solutions

Create

Log in

Sign up

Upgrade to remove ads

Only ₩37,125/year

  1. Science
  2. Computer Science
  3. Computer Security and Reliability

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (30)

A keyword mixed alphabet cipher uses a cipher alphabet that consists of a keyword, minus duplicates, followed by the remaining letters of the alphabet
true or false

true

Which set of characteristics describes the Caesar cipher accurately?
answers:
Asymmetric, block, substitution
Asymmetric, stream, transposition
Symmetric, stream, substitution
Symmetric, block, transposition

Symmetric, stream, substitution

Gary is sending a message to Patricia. He wants to ensure that nobody tampers with the message while it is in transit. What goal of cryptography is Gary attempting to achieve?
answers:
Confidentiality
Integrity
Authentication
Nonrepudiation

Integrity

Digital signatures require asymmetric key cryptography.
true or false

true

What mathematical problem forms the basis of most modern cryptographic algorithms?
answers:
Factoring large primes
Traveling salesman problem
Quantum mechanics
Birthday problem

Factoring large primes

Which cryptographic attack offers cryptanalysts the most information about how an encryption algorithm works?
Answers:
Chosen plaintext
Ciphertext only
Known plaintext
Chosen ciphertext

Chosen plaintext

The hash message authentication code (HMAC) is a hash function that uses a key to create a hash, or message digest.
true or false

true

The financial industry created the ANSI X9.17 standard to define key management procedures.
true or false

true

When Patricia receives a message from Gary, she wants to be able to demonstrate to Sue that the message actually came from Gary. What goal of cryptography is Patricia attempting to achieve?
Answers:
Confidentiality
Integrity
Authentication
Nonrepudiation

Nonrepudiation

Which of the following allows a certificate authority (CA) to revoke a compromised digital certificate in real time?
Answers:

Certificate revocation list

(CRL)International Data Encryption
Algorithm (IDEA)

Transport Layer Security (TLS)

Online Certificate Status Protocol (OCSP)

Online Certificate Status Protocol (OCSP)

What is NOT a symmetric encryption algorithm?
Rivest-Shamir-Adelman (RSA)
Data Encryption Standard (DES)
International Data Encryption Algorithm (IDEA)
Carlisle Adams Stafford Tavares (CAST)

Rivest-Shamir-Adelman (RSA)

A private key cipher is also called an asymmetric key cipher.

true or false

false

In a chosen-ciphertext attack, cryptanalysts submit data coded with the same cipher and key they are trying to break to the decryption device to see either the plaintext output or the effect the decrypted message has on some system.
true or false?

true

What is NOT an effective key distribution method for plaintext encryption keys?
Answers:
Paper
Unencrypted email
CD
Smart card

Unencrypted email

Which information security objective allows trusted entities to endorse information?
Answers:
Validation

Authorization

Certification

Witnessing

Certification

Digital signatures require asymmetric key cryptography.
Answers:
true or false

true

Betty receives a cipher text message from her colleague Tim. What type of function does Betty need to use to read the plaintext message?
Answers:
Encryption

Hashing

Decryption

Validation

Decryption

A person demonstrates anonymity when posting information to a web discussion site without authorities knowing who he or she is.
Answers:
true or false

true

Alice would like to send a message to Bob securely and wishes to encrypt the contents of the message. What key does she use to encrypt this message?
Answers:
Alice's public key

Alice's private key

Bob's public key

Bob's private key

Bob's public key

A digitized signature is a combination of a strong hash of a message and a secret key.
Answers:
true or false

false

Message authentication confirms the identity of the person who started a correspondence.
Answers:
true or false

true

You must always use the same algorithm to encrypt information and decrypt the same information.
Answers:
true or false

false

The term certificate authority (CA) refers to a trusted repository of all public keys.
Answers:
true or false

false

Product cipher is an encryption algorithm that has no corresponding decryption algorithm.
Answers:
true or false

false

Which approach to cryptography provides the strongest theoretical protection?
Answers:
Quantum cryptography

Asymmetric cryptography

Elliptic curve cryptography

Classic cryptography

Quantum cryptography

A salt value is a set of random characters you can combine with an actual input key to create the encryption key.
Answers:
true or false

true

Cryptographic key distribution is typically done by phone.
Answers:
true or false

false

Bob received a message from Alice that contains a digital signature. What cryptographic key does Bob use to verify the digital signature?
Answers:
Alice's public key

Alice's private key

Bob's public key

Bob's private key

Alice's public key

What standard is NOT secure and should never be used on modern wireless networks?
Answers:
Wired Equivalent Privacy (WEP)

Wi-Fi Protected Access (WPA)

Wi-Fi Protected Access version 2 (WPA2)

802.11ac

Wired Equivalent Privacy (WEP)

The Diffie-Hellman (DHE) algorithm is the basis for several common key exchange protocols, including Diffie-Hellman in Ephemeral mode (DHE) and Elliptic Curve DHE (ECDHE).
Answers:
true or false

true

Students also viewed

Lab 8 Assessment Quiz

40 terms

mbarrow4PLUS

Quiz 9 Information Security Fundamentals

32 terms

DRx_

Chapter 10 Quiz

39 terms

mbarrow4PLUS

Chapter 9

20 terms

reverish004

Sets found in the same folder

Fundamental Information Security Chapter 12: Infor…

40 terms

grayson_bullock6

Fundamental Information Security Chapter 15: U.S.…

47 terms

grayson_bullock6

Fundamental Information Security Chapter 13: Infor…

44 terms

grayson_bullock6

Quiz 7 Information Security Fundamentals

29 terms

ToothpickEse

Other sets by this creator

Fundamentals Networking Tech Chapter 8

41 terms

grayson_bullock6

Fundamentals Networking Tech Chapter 4

38 terms

grayson_bullock6

Fundamentals Networking Tech Chapter 3

45 terms

grayson_bullock6

Fundamentals Networking Tech Chapter 12

42 terms

grayson_bullock6

Verified questions

computer science

After the following statement executes, what elements will be stored in the myset set? myset = set('a bb ccc dddd')

Verified answer

computer science

Rectangle Information. This program displays information about a rectangle drawn by the user. $\mathbf{Input:}$ 2 mouse clicks for the opposite corners of a rectangle. $\mathbf{Output:}$ Draw the rectangle. Print the perimeter and area of the rectangle. $\mathbf{Formula:}$ $$ \begin{array}{c}{\text { area }=(\text {length})(\text {width})} \\ {\text {perimeter}=2(\text {length}+\text {width})}\end{array} $$

Verified answer

computer science

Show that the expression q² + (n - q - 1)² achieves a maximum over q = 0, 1, ..., n - 1 when q = 0 or q = n - 1.

Verified answer

computer science

A function with no return statement returns a) nothing b) its parameters c) its variables d) None

Verified answer

Recommended textbook solutions

The financial industry created the ansi x9.17 standard to define key management procedures.

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

The financial industry created the ansi x9.17 standard to define key management procedures.

Service Management: Operations, Strategy, and Information Technology

7th EditionJames Fitzsimmons, Mona Fitzsimmons

103 solutions

The financial industry created the ansi x9.17 standard to define key management procedures.

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

The financial industry created the ansi x9.17 standard to define key management procedures.

Computer Organization and Design MIPS Edition: The Hardware/Software Interface

5th EditionDavid A. Patterson, John L. Hennessy

220 solutions

Other Quizlet sets

Gnegy Neurotransmitters Lecture

52 terms

APBr0wn

Mass Com Test #2

95 terms

elizabeth_scull3

301 Quiz 1

24 terms

joshunger_

What ISO security standard can help guide the creation of an organization's security policy?

Defined within the ISO 27001 standard are information security guidelines, requirements intended to protect an organisation's data assets from loss or unauthorised access and recognised means of demonstrating their commitment to information security management through certification.

Which standard is not secure and should never be used on modern wireless networks?

WEP was the first encryption protocol used to secure wireless networks and is now easily compromised and should never be used. TKIP shares many similarities with WEP encryption and is no longer considered secure. So it too should no longer be seriously considered when securing your network.

What standard is not secure and should never be used on modern wireless networks quizlet?

What standard is NOT secure and should never be used on modern wireless networks? The Diffie-Hellman (DHE) algorithm is the basis for several common key exchange protocols, including Diffie-Hellman in Ephemeral mode (DHE) and Elliptic Curve DHE (ECDHE).

Which algorithm can they use to exchange a secret key?

The Diffie-Hellman algorithm will be used to establish a secure communication channel. This channel is used by the systems to exchange a private key. This private key is then used to do symmetric encryption between the two systems.

When Patricia receives a message from Gary?

When Patricia receives a message from Gary, she wants to be able to demonstrate to Sue that the message actually came from Gary. What goal of cryptography is Patricia attempting to achieve? Gary is sending a message to Patricia. He wants to ensure that nobody tampers with the message while it is in transit.

What is the only unbreakable cipher when it is used properly quizlet?

What is the only unbreakable cipher when it is used properly? Explanation: The Vernam cipher, also known as a one-time pad, is unbreakable provided that the key is at least as long as the message and that each key is only used one time.