Chapter 7

20 Kesyon  I  By Jorellerivera
Please take the quiz to rate it.

Chapter 7

  
Changes are done, please start the quiz.


Questions and Answers

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
  • 1. 
    The permutation cipher simply rearranges the values within a block to create the ciphertext.
    • A. 

      True

    • B. 

      False


  • 2. 
    Hashing functions require the use of keys.
    • A. 

      True

    • B. 

      False


  • 3. 
    The asymmetric encryption systems use a single key to both encrypt and decrypt a message.
    • A. 

      True

    • B. 

      False


  • 4. 
    PKI systems are based on public key cryptosystems and include digital certificates and certificate authorities.
    • A. 

      True

    • B. 

      False


  • 5. 
    The encapsulating security payload protocol provides secrecy for the contents of network communications as well as system-to-system authentication and data integrity verification.
    • A. 

      True

    • B. 

      False


  • 6. 
    ____ is the process of converting an original message into a form that is unreadable to unauthorized individuals.
    • A. 

      Encryption

    • B. 

      Decryption

    • C. 

      Cryptology

    • D. 

      Cryptography


  • 7. 
    ____ is the information used in conjunction with an algorithm to create the ciphertext from the plaintext or derive the plaintext from the ciphertext.
    • A. 

      Password

    • B. 

      Cipher

    • C. 

      Key

    • D. 

      Passphrase


  • 8. 
    Bit stream methods commonly use algorithm functions like the exclusive OR operation (____).
    • A. 

      XOR

    • B. 

      EOR

    • C. 

      NOR

    • D. 

      OR


  • 9. 
    ____ functions are mathematical algorithms that generate a message summary or digest to confirm the identity of a specific message and to confirm that there have not been any changes to the content.
    • A. 

      Hash

    • B. 

      Map

    • C. 

      Key

    • D. 

      Encryption


  • 10. 
    DES uses a(n) ____-bit block size.
    • A. 

      32

    • B. 

      64

    • C. 

      128

    • D. 

      256


  • 11. 
    ____ is a federal information processing standard that specifies a cryptographic algorithm used within the U.S. government to protect information in federal agencies that are not a part of the national defense infrastructure.
    • A. 

      Des

    • B. 

      2des

    • C. 

      Aes

    • D. 

      3des


  • 12. 
    The ____ algorithm was the first public key encryption algorithm developed (in 1977) and published for commercial use.
    • A. 

      Des

    • B. 

      Rsa

    • C. 

      Mac

    • D. 

      Aes


  • 13. 
    ____ is an integrated system of software, encryption methodologies, protocols, legal agreements, and third-party services that enables users to communicate securely.
    • A. 

      Mac

    • B. 

      Pki

    • C. 

      Des

    • D. 

      Aes


  • 14. 
    ____ are encrypted messages that can be mathematically proven to be authentic
    • A. 

      Digital signatures

    • B. 

      Mac

    • C. 

      Message certificates

    • D. 

      Message digests


  • 15. 
    The ____ is responsible for the fragmentation, compression, encryption, and attachment of an SSL header to the cleartext prior to transmission.
    • A. 

      Standard http

    • B. 

      Sftp

    • C. 

      Shttp

    • D. 

      Ssl record protocol


  • 16. 
    The ____ protocol provides system-to-system authentication and data integrity verification, but does not provide secrecy for the content of a network communication.
    • A. 

      Esp

    • B. 

      Ah

    • C. 

      Ha

    • D. 

      Sep


  • 17. 
    ____ is a hybrid cryptosystem that combines some of the best available cryptographic algorithms and has become the open-source de facto standard for encryption and authentication of e-mail and file storage applications.  
    • A. 

      Pgp

    • B. 

      Des

    • C. 

      Ah

    • D. 

      Esp


  • 18. 
    ____ attacks are a collection of brute-force methods that attempt to deduce statistical relationships between the structure of the unknown key and the ciphertext that is the output of the cryptosystem.
    • A. 

      Timing

    • B. 

      Dictionary

    • C. 

      Correlation

    • D. 

      Man in the middle


  • 19. 
    In a ____ attack, the attacker eavesdrops during the victim’s session and uses statistical analysis of patterns and inter-keystroke timings to discern sensitive session information.
    • A. 

      Replay

    • B. 

      Timing

    • C. 

      Correlation

    • D. 

      Dictionary


  • 20. 
    ____ is the protocol used to secure communications across any IP-based network such as LANs, WANs, and the Internet.
    • A. 

      Pem

    • B. 

      Ssh

    • C. 

      Ipsec

    • D. 

      Set


Back to top

Removing ad is a premium feature

Upgrade and get a lot more done!
Take Another Quiz
We have sent an email with your new password.