Data Security Test 4 Trivia Questions

40 Questions | Total Attempts: 176

SettingsSettingsSettings
Please wait...
Data Security Quizzes & Trivia

Zzz 11-14


Questions and Answers
  • 1. 
    What is data called that is to be encrypted by inputting into an encryption algorithm?
    • A. 

      Plaintext

    • B. 

      Cleartext

    • C. 

      Opentext

    • D. 

      Ciphertext

  • 2. 
    Which of the following is not a basic security protection over information that cryptography can provide?
    • A. 

      Confidentiality

    • B. 

      Stop loss

    • C. 

      Integrity

    • D. 

      Authenticity

  • 3. 
    The areas of a file in which steganography can hide data include all of the following except ________.
    • A. 

      In data that is used to describe the content or structure of the actual data

    • B. 

      In the directory structure of the file system

    • C. 

      In the file header fields that describe the file

    • D. 

      In areas that contain the content data itself

  • 4. 
    Proving that a user sent an email message is known as ________.
    • A. 

      Repudiation

    • B. 

      Integrity

    • C. 

      Nonrepudiation

    • D. 

      Availability

  • 5. 
    Symmetric cryptographic algorithms are also called _______.
    • A. 

      Private key cryptography

    • B. 

      Cipherkey cryptography

    • C. 

      Public/private key cryptography

    • D. 

      Public key cryptography

  • 6. 
    A(n) _______ is not decrypted, but is only used for comparison purposes.
    • A. 

      Stream

    • B. 

      Hash

    • C. 

      Algorithm

    • D. 

      Key

  • 7. 
    Each of the following is a characteristic of a secure hash algorithm except ________.
    • A. 

      Collisions should be rare

    • B. 

      The results of a hash function should not be reversed

    • C. 

      The hash should always be the same fixed size

    • D. 

      A message cannot be produced from a predefined hash

  • 8. 
    Hashing would not be used in which of the following examples?
    • A. 

      Bank automatic teller machine (ATM)

    • B. 

      Encrypting and decrypting email attachments

    • C. 

      Verifying a user password entered on a Linux system

    • D. 

      Determining the integrity of a message

  • 9. 
    _______ encrypts a hash with a shared secret key.
    • A. 

      Key_hash

    • B. 

      WEP

    • C. 

      MDRIPE

    • D. 

      Hashed Message Authentication Code (HMAC)

  • 10. 
    Which of the following is a protection provided by hashing?
    • A. 

      Authenticity

    • B. 

      Confidentiality

    • C. 

      Integrity

    • D. 

      Availability

  • 11. 
    _______ is a hash that uses two different and independent parallel chains of computation, the results of which are then combined at the end of the process.
    • A. 

      DES

    • B. 

      AES

    • C. 

      RC4

    • D. 

      RIPEMD

  • 12. 
    Which of the following is the strongest symmetric cryptographic algorithm?
    • A. 

      Advanced Encryption Standard

    • B. 

      Data Encryption Standard

    • C. 

      Triple Data Encryption Standard

    • D. 

      Rivest Cipher (RC) 1

  • 13. 
    If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, the key he uses to encrypt the message is _______.
    • A. 

      Alice’s private key

    • B. 

      Alice’s public key

    • C. 

      Bob’s public key

    • D. 

      Bob’s private key

  • 14. 
    A digital signature can provide each of the following benefits except _______.
    • A. 

      Prove the integrity of the message

    • B. 

      Verify the receiver

    • C. 

      Verify the sender

    • D. 

      Enforce nonrepudiation

  • 15. 
    Which of the following asymmetric cryptographic algorithms is the most secure?
    • A. 

      MEC-2

    • B. 

      RSA

    • C. 

      MD-17

    • D. 

      SHA-2

  • 16. 
    Which of the following asymmetric cryptographic algorithms uses prime numbers?
    • A. 

      EFS

    • B. 

      Quantum computing

    • C. 

      ECC

    • D. 

      RSA

  • 17. 
    ______ uses lattice-based cryptography and may be  more resistant to quantum computing attacks.
    • A. 

      NTRUEncrypt

    • B. 

      ECC

    • C. 

      RC4

    • D. 

      SHA-512

  • 18. 
    The Trusted Platform Module (TPM) _______.
    • A. 

      Allows the user to boot a corrupted disk and repair it

    • B. 

      Is only available on Windows computers running BitLocker

    • C. 

      Includes a pseudorandom number generator (PRNG)

    • D. 

      Provides cryptographic services in hardware instead of software

  • 19. 
    Which of the following has an onboard key generator and key storage facility, accelerated symmetric and asymmetric encryption, and can back up sensitive material in encrypted form?
    • A. 

      Trusted Platform Module (TPM)

    • B. 

      Self-encrypting hard disk drives (HDDs)

    • C. 

      Encrypted hardware-based USB devices

    • D. 

      Hardware Security Module (HSM)

  • 20. 
    The Microsoft Windows LAN Manager hash _______.
    • A. 

      Is weaker than NTLMv2

    • B. 

      Is part of BitLocker

    • C. 

      Is required to be present when using TPM

    • D. 

      Is identical to MD-4

  • 21. 
    The strongest technology that would assure Alice that Bob is the sender of a message is a(n) _______.
    • A. 

      Digital signature

    • B. 

      Encrypted signature

    • C. 

      Hash

    • D. 

      Digital certificate

  • 22. 
    A digital certificate associates ________.
    • A. 

      A private key with a digital signature

    • B. 

      the user’s identity with their public key

    • C. 

      A user’s private key with public key

    • D. 

      A user’s public key with their private key

  • 23. 
    Digital certification can be used for each of the following except ________.
    • A. 

      To verify the authenticity of the Registration Authorizer

    • B. 

      To verify the identity of clients and servers on the Web

    • C. 

      To encrypt messages for secure email communications

    • D. 

      To encrypt channels to provide secure communications between clients and servers

  • 24. 
    An entity that issues digital certificates is a _______.
    • A. 

      Certificate Signatory (CS)

    • B. 

      Signature Authority (SA)

    • C. 

      Digital Signer (DS)

    • D. 

      Certificate Authority (CA)

  • 25. 
    A centralized directory of digital certificates is called a(n) ________.
    • A. 

      Digital Signature Approval List (DSAP)

    • B. 

      Digital Signature Permitted Authorization (DSPA)

    • C. 

      Authorized Digital Signature (ADS)

    • D. 

      Certificate Repository (CR)

Back to Top Back to top