1/19
computer
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
The Rail Fence Cipher is a cipher that uses columns. The plaintext is written downwards and starts a new column when the bottom is reached. This technique used in the Rail Fence Cipher is an example of:
Transposition.
Evaluate the following modulo math problem.
20 + (35 mod 11)
22
Protecting data by hashing the data with a hashing function addresses which part(s) of the CIA triad?
Confidentiality and Integrity
A primary requirement for a good cryptographic hash function is that the function should not have collisions. A collision in a hash function is when:
two inputs map to the same output.
A hash function takes an input of any length and converts it into an output of a fixed length. What term is used for this output?
digest
Which of the following would be the most secure method when storing passwords in a database?
Passwords are both salted and hashed.
What is the name for the issuer of an SSL certificate?
a certificate authority
Which of the following mathematical expressions would produce the most secure encryption when used in the encryption algorithm?
value % 22
Which of the following salting procedures will produce the most secure encryption?
Use a randomized salt for every password.
Man-in-the-middle attacks affect which part(s) of the CIA triad?
Confidentiality and Integrity
A vulnerability of the Diffie-Hellman’s Key Exchange is a lack of _.
authentication
You are ready to publish a set of websites that includes the use of www.myWebsite.com
and www.account.myWebsite.com
. Which of the following SSL certificates will you want to purchase?
Wildcard SSL certificate
Which of the following is not a reason to revoke an SSL certificate?
The validity period has ended.
In the chain of trust, what is the name of the certificate that belongs to the issuer of the certificate?
The root certificate
Which is the largest disadvantage of symmetric encryption?
It is difficult to securely transmit the secret key.
A man-in-the-middle attack can endanger the security of the Diffie-Hellman method if the two parties are not _____.
authenticated
In a trapdoor function, the function is easy to:
encrypt
During asymmetric encryption, if Allie sends a message to Nicholas, she will use:
Nicholas’s public key
During asymmetric encryption, Nicholas will use ______ to open a message from Allie.
His private key
Which of the following ciphers uses asymmetric encryption?
RSA