Filters
Question type

Study Flashcards

Which of the following is not one of the functions of a digital signature?


A) verification of the sender
B) prevention of the sender from disowning the message
C) prove the integrity of the message
D) protect the public key

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

What type of cryptography uses two keys instead of just one,generating both a private and a public key?


A) symmetric
B) asymmetric
C) shared
D) open

E) C) and D)
F) A) and D)

Correct Answer

verifed

verified

Which of the following asymmetric cryptography algorithms is most commonly used?


A) AES
B) RSA
C) Twofish
D) Blowfish

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Ciphertext is the scrambled and unreadable output of encryption.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is a public key system that generates random public keys that are different for each session?


A) ephemeral-secrecy
B) perfect forward secrecy
C) public secrecy
D) random-key exchange

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

The XOR cipher is based on the binary operation eXclusive OR that compares two bits.

A) True
B) False

Correct Answer

verifed

verified

Which key exchange requires Alice and Bob to each agree upon a large prime number and related integer?


A) Quantum Prime
B) Prime-Curve
C) Diffie-Hellman
D) Elliptic Curve Diffie-Hellman

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

What type of message authentication code uses hashing to authenticate the sender by using both a hash function and a secret cryptographic key?


A) SHA-384
B) HMAC
C) RIPEMD
D) MD5

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

If using the MD5 hashing algorithm,what is the length to which each message is padded?


A) 32 bits
B) 64 bits
C) 128 bits
D) 512 bits

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Which of the following is more secure than software encryption?


A) hardware encryption
B) private encryption
C) application encryption
D) full disk encryption

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Showing 41 - 50 of 50

Related Exams

Show Answer