T/F: A digitized signature is a combination of a strong hash of a message and a secret key.
False
T/F: A keyword mixed alphabet cipher uses a cipher alphabet that consists of a keyword, minus duplicates, followed by the remaining letters of the alphabet.
True
T/F: A person demonstrates anonymity when posting information to a web discussion site without authorities knowing who he or she is.
True
T/F: A physical courier delivering an asymmetric key is an example of in-band key exchange.
False
T/F: A private key cipher is also called an asymmetric key cipher.
False
T/F: A salt value is a set of random characters you can combine with an actual input key to create the encryption key.
True
T/F: A substitution cipher replaces bits, characters, or blocks of information with other bits, characters, or blocks.
True
T/F: An algorithm is a repeatable process that produces the same result when it receives the same input.
True
T/F: Cryptographic key distribution is typically done by phone.
False
T/F: Digital signatures require asymmetric key cryptography.
True
T/F: In a chosen-ciphertext attack, cryptanalysts submit data coded with the same cipher and key they are trying to break to the decryption device to see either the plaintext output or the effect the decrypted message has on some system.
True
T/F: In a known-plaintext attack (KPA), the cryptanalyst has access only to a segment of encrypted data, and has no choice as to what that data might be.
False
T/F: Integrity-checking tools use cryptographic methods to make sure nothing and no one has modified the software.
True
T/F: Message authentication confirms the identity of the person who started a correspondence.
True
T/F: Product cipher is an encryption algorithm that has no corresponding decryption algorithm.
False
T/F: The Diffie-Hellman (DHE) algorithm is the basis for several common key exchange protocols, including Diffie-Hellman in Ephemeral mode (DHE) and Elliptic Curve DHE (ECDHE).
True
T/F: The financial industry created the ANSI X9.17 standard to define key management procedures.
True
T/F: The hash message authentication code (HMAC) is a hash function that uses a key to create a hash, or message digest.
True
T/F: The term certificate authority (CA) refers to a trusted repository of all public keys.
False
T/F: You must always use the same algorithm to encrypt information and decrypt the same information.
False
________ offers a mechanism to accomplish four security goals: confidentiality, integrity, authentication, and nonrepudiation.
A) Cryptography
T/F: A strong hash function is designed so that a message cannot be forged that will result in the same hash as a legitimate message.
True
The act of scrambling plaintext into ciphertext is known as ________.
D) Encryption
An algorithm used for cryptographic purposes is known as a ________.
C) Cipher
T/F: Encryption ciphers fall into two general categories: symmetric (private) key and asymmetric (public) key.
True
An encryption cipher that uses the same key to encrypt and decrypt is called a ________ key.
A) Symmetric (private)
________ corroborates the identity of an entity, whether the sender, the sender's computer, some device, or some information.
A) Authentication
Which of the following is one of the four basic forms of a cryptographic attack?
B) All of these
T/F: The two basic types of ciphers are transposition and substitution.
True
A ________ is used to detect forgeries.
B) Hash value
DES, IDEA, RC4, and WEP are examples of ________.
D) Symmetric algorithms (or standards)
A ________ signature is a representation of a physical signature stored in a digital format.
B) Digitized
Home
Subjects
Expert solutions
Create
Log in
Sign up
Upgrade to remove ads
Only ₩37,125/year
- Science
- Computer Science
- Computer Security and Reliability
-
Flashcards
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
Terms in this set (30)
A keyword mixed alphabet cipher uses a cipher alphabet that consists of a keyword, minus duplicates, followed by the remaining letters of the alphabet
true or false
true
Which set of characteristics describes the Caesar cipher
accurately?
answers:
Asymmetric, block, substitution
Asymmetric, stream, transposition
Symmetric, stream, substitution
Symmetric, block, transposition
Symmetric, stream, substitution
Gary is sending a message to Patricia. He wants to ensure that nobody tampers with the message while it is in transit. What goal of cryptography is Gary attempting to
achieve?
answers:
Confidentiality
Integrity
Authentication
Nonrepudiation
Integrity
Digital signatures require asymmetric key cryptography.
true or false
true
What mathematical problem forms the basis of most modern cryptographic algorithms?
answers:
Factoring large primes
Traveling salesman
problem
Quantum mechanics
Birthday problem
Factoring large primes
Which cryptographic attack offers cryptanalysts the most information about how an encryption algorithm works?
Answers:
Chosen plaintext
Ciphertext only
Known plaintext
Chosen ciphertext
Chosen plaintext
The hash message authentication code
(HMAC) is a hash function that uses a key to create a hash, or message digest.
true or false
true
The financial industry created the ANSI X9.17 standard to define key management procedures.
true or false
true
When Patricia receives a message from Gary, she wants to be able to demonstrate to Sue that the message actually
came from Gary. What goal of cryptography is Patricia attempting to achieve?
Answers:
Confidentiality
Integrity
Authentication
Nonrepudiation
Nonrepudiation
Which of the following allows a certificate authority (CA) to revoke a compromised digital certificate in real time?
Answers:
Certificate revocation list
(CRL)International Data Encryption
Algorithm (IDEA)
Transport Layer Security (TLS)
Online Certificate Status Protocol (OCSP)
Online Certificate Status Protocol (OCSP)
What is NOT a symmetric encryption algorithm?
Rivest-Shamir-Adelman (RSA)
Data Encryption Standard (DES)
International Data Encryption Algorithm (IDEA)
Carlisle Adams Stafford Tavares (CAST)
Rivest-Shamir-Adelman (RSA)
A private key cipher is also called an asymmetric key cipher.
true or false
false
In a chosen-ciphertext attack, cryptanalysts submit data coded with the same cipher and key they are trying to break to the decryption device to see either the plaintext output or the effect the decrypted message has on some system.
true or false?
true
What is NOT an effective key distribution method for plaintext encryption keys?
Answers:
Paper
Unencrypted email
CD
Smart card
Unencrypted email
Which information security objective allows trusted entities to endorse information?
Answers:
Validation
Authorization
Certification
Witnessing
Certification
Digital signatures require asymmetric key cryptography.
Answers:
true or false
true
Betty receives a cipher text message from her colleague Tim. What type of function does Betty need to use to read the plaintext message?
Answers:
Encryption
Hashing
Decryption
Validation
Decryption
A person demonstrates anonymity when posting information to a web discussion site without authorities knowing who he or she is.
Answers:
true or false
true
Alice would like to send a message to Bob securely and wishes to encrypt the contents of the message. What key does she use to encrypt this message?
Answers:
Alice's public key
Alice's private key
Bob's public key
Bob's private key
Bob's public key
A digitized signature is a combination of a strong hash of a message and a secret key.
Answers:
true or false
false
Message authentication confirms the identity of the person who started a correspondence.
Answers:
true or false
true
You must always use the same algorithm to encrypt information and decrypt the same information.
Answers:
true or false
false
The term certificate authority (CA) refers to a trusted repository of all public keys.
Answers:
true or false
false
Product cipher is an encryption
algorithm that has no corresponding decryption algorithm.
Answers:
true or false
false
Which approach to cryptography provides the strongest theoretical protection?
Answers:
Quantum cryptography
Asymmetric cryptography
Elliptic curve cryptography
Classic cryptography
Quantum cryptography
A salt
value is a set of random characters you can combine with an actual input key to create the encryption key.
Answers:
true or false
true
Cryptographic key distribution is typically done by phone.
Answers:
true or false
false
Bob received a message from Alice that contains a digital signature. What cryptographic key
does Bob use to verify the digital signature?
Answers:
Alice's public key
Alice's private key
Bob's public key
Bob's private key
Alice's public key
What standard is NOT secure and should never be used on modern wireless networks?
Answers:
Wired Equivalent Privacy (WEP)
Wi-Fi Protected Access (WPA)
Wi-Fi Protected Access version 2 (WPA2)
802.11ac
Wired Equivalent Privacy (WEP)
The Diffie-Hellman (DHE) algorithm is the basis for several common key exchange protocols, including Diffie-Hellman in Ephemeral mode (DHE) and Elliptic Curve DHE (ECDHE).
Answers:
true or false
true
Students also viewedLab 8 Assessment Quiz
40 terms
mbarrow4PLUS
Quiz 9 Information Security Fundamentals
32 terms
DRx_
Chapter 10 Quiz
39 terms
mbarrow4PLUS
Chapter 9
20 terms
reverish004
Sets found in the same folderFundamental Information Security Chapter 12: Infor…
40 terms
grayson_bullock6
Fundamental Information Security Chapter 15: U.S.…
47 terms
grayson_bullock6
Fundamental Information Security Chapter 13: Infor…
44 terms
grayson_bullock6
Quiz 7 Information Security Fundamentals
29 terms
ToothpickEse
Other sets by this creatorFundamentals Networking Tech Chapter 8
41 terms
grayson_bullock6
Fundamentals Networking Tech Chapter 4
38 terms
grayson_bullock6
Fundamentals Networking Tech Chapter 3
45 terms
grayson_bullock6
Fundamentals Networking Tech Chapter 12
42 terms
grayson_bullock6
Verified questions
computer science
After the following statement executes, what elements will be stored in the myset set? myset = set('a bb ccc dddd')
Verified answer
computer science
Rectangle Information. This program displays information about a rectangle drawn by the user. $\mathbf{Input:}$ 2 mouse clicks for the opposite corners of a rectangle. $\mathbf{Output:}$ Draw the rectangle. Print the perimeter and area of the rectangle. $\mathbf{Formula:}$ $$ \begin{array}{c}{\text { area }=(\text {length})(\text {width})} \\ {\text {perimeter}=2(\text {length}+\text {width})}\end{array} $$
Verified answer
computer science
Show that the expression q² + (n - q - 1)² achieves a maximum over q = 0, 1, ..., n - 1 when q = 0 or q = n - 1.
Verified answer
computer science
A function with no return statement returns a) nothing b) its parameters c) its variables d) None
Verified answer
Recommended textbook solutionsInformation Technology Project Management: Providing Measurable Organizational Value
5th EditionJack T. Marchewka
346 solutions
Service Management: Operations, Strategy, and Information Technology
7th EditionJames Fitzsimmons, Mona Fitzsimmons
103 solutions
Information Technology Project Management: Providing Measurable Organizational Value
5th EditionJack T. Marchewka
346 solutions
Computer Organization and Design MIPS Edition: The Hardware/Software Interface
5th EditionDavid A. Patterson, John L. Hennessy
220 solutions
Other Quizlet setsGnegy Neurotransmitters Lecture
52 terms
APBr0wn
Mass Com Test #2
95 terms
elizabeth_scull3
301 Quiz 1
24 terms
joshunger_