Module 3: Fundamentals of Cryptography

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

Aaliyah wants to send a message to a friend, but she does not want anyone else to know that she is communicating with them. Which technique would she use?

b. steganography

2
New cards

Zeinab has been asked by her supervisor to speak with an angry customer who claims that they never received notification of a change in the terms of service agreement. Zeinab learned that an automated "read receipt" was received, showing that the customer opened the email with the new terms of service outlined. What action will Zeinab now take regarding this customer?

d. nonrepudiation

3
New cards

Which of the following is NOT a form of obfuscation?

b. ciphering

4
New cards

Which of the following is NOT correct about "security through obscurity"?

d. It should only be used as a general information security protection in extreme circumstances.

5
New cards

Layla has encrypted a document so that it can only be viewed by those who have been provided the key. What protection has she given to this document?

a. confidentiality

6
New cards

Which of the following is NOT correct about a one-time pad (OTP)?

d. It requires a cipher disk.

7
New cards

What is data called that is to be encrypted by inputting it into a cryptographic algorithm?

a. plaintext

8
New cards

Which of the following creates the most secure ciphertext?

d. sponge function

9
New cards

Karyme needs to select a hash algorithm that will produce the longest and most secure digest. Which would she choose?

d. Whirlpool

10
New cards

Which algorithm uses the same key to both encrypt and decrypt data?

d. symmetric cryptographic algorithm

11
New cards

Which of the following is NOT to be decrypted but is only used for comparison purposes?

a. Digest

12
New cards

Which of these is NOT a characteristic of a secure hash algorithm?

a. Collisions may occur but they should be rare.

13
New cards

Which of the following is a weakness of RSA?

c. As computers become more powerful, the ability to compute factoring has increased.

14
New cards

Which of these is NOT true about ECC?

d. It uses both sloping curves and prime numbers.

15
New cards

If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message?

b. Alice's public key

16
New cards

Farah needs to encrypt only a few files and does not want the entire disk contents to be encrypted. What type of encryption would she use?

a. file-level encryption

17
New cards

Which type of encryption would protect all data on a hard drive, including the installed OS?

a. FDE

18
New cards

What is a collision?

a. Two files that produce the same digest.

19
New cards

Nahla has been asked to make a recommendation about the most secure TEE. Which of the following would she choose?

c. TPM

20
New cards

Which type of blockchain can anyone join?

d. Public blockchain