1/23
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Which algorithm can ensure data integrity?
MD5
What is the keyspace of an encryption algorithm?
the set of all possible values used to generate a key
Alice and Bob are using a digital signature to sign a document. What key should Alice use to sign the document so that Bob can make sure that the document came from Alice?
Private key from Alice
Which three security services are provided by digital signatures? (Choose three)
Guarantees data has not changed in transit
Provides data encryption
Authenticates the source
What is another name for confidentiality of information?
Privacy
As data is being stored on a local hard disk, which method would secure the data from unauthorized access?
data encryption
What popular encryption algorithm requires that both the sender and receiver know a pre-shared key?
AES
In which method used in cryptanalysis does the attacker know a portion of the plaintext and the corresponding cipthertext?
meet-in-the-middle
Match the disciplines or roles to the descriptions
What technology supports asymmectric key encryption used in IPsec VPNs?
IKE
What are two symmectric encryption algorithms?
3DES
AES
Which two items are used in asymmectric encryption? (Choose two)
a private key
a public key
What are two properties of a cryptographic hash function? (Choose two)
The hash function is one way and irreversible
The output is a fixed length
Which statement describes asymmetric encryption algorithms?
They are relatively slow because they are based on difficult computational algorithms.
An IT enterprise is recommending the use of PKI applications to securely exchange information between the employees. IN which two cases might an organization use PKI applications to securely exchange information between users?
HTTPS web service
802.1x authentication
Two users must authenicated each other using digital certificates and a CA.
The following message was encrypted using a Ceasar cipher with a key of 2: fghgpf vjg ecuvng
defend the castle
In a hierarchical CA topology, where can a subordinate CA obtain a certificate for itself?
from the root CA or another subordinate CA at a higher level
What is the purpose for the using digital signatures for code signing?
to verify the integrity of executable files downloaded from a vendor website
What technology has a function of using trusted third-party protocols to issue credentials that are accepted as an authoritative identity?
PKI certificates
Which requirement of secure communications is ensured by the implementation of MD5 or SHA hash generating algorithms?
Integrity
What is an example of the one-time pad cipher?
RC4
A company is developing a security policy for secure communication. In the exchange of critical
Origin authentication
What is the purpose of digital certificate?
It authenticates a website and establishes a secure connection to exchange confidential data.