quiz image

Week 6

LowRiskBlack avatar
LowRiskBlack
·
·
Download

Start Quiz

Study Flashcards

40 Questions

Which protocol uses 3DES symmetric key encryption and RSA for key exchanges and digital signatures?

PEM

What is the main purpose of Secure Electronic Transactions (SET)?

To protect against electronic payment fraud

Which modern cryptographic cipher is used by Pretty Good Privacy (PGP) for message encoding?

IDEA

Which protocol was an early attempt to provide security for 802.11 networks before being replaced by Wi-Fi Protected Access (WPA)?

WEP

Which protocol allows the encryption of information passing between computers through a protected and secure virtual connection?

SSL

What type of encryption uses Diffie-Hellman key exchange for deriving key material between peers on a public network?

Symmetric encryption

Which encryption protocol provides six services including authentication by digital signatures and message encryption?

IPSec

In the context of secure communication, what does IPSec use Public-key cryptography for?

Signing the Diffie-Hellman exchanges

Which protocol is known for providing improved user authentication using 802.1X and EAP?

WEP Encryption

What is the primary function of Pretty Good Privacy (PGP) in email security?

Message encryption

What is the purpose of Triple DES (3DES)?

To provide security beyond DES with a 64-bit block size and 56-bit key

Which encryption method requires two different keys, one public and one private, for enciphering or deciphering messages?

RSA

In asymmetric encryption, if Key A is used to encrypt a message, which key is required to decrypt it?

Key B

What was the main purpose of developing the Advanced Encryption Standard (AES)?

To replace both DES and 3DES

Where should Rachel store her public key to allow Alex to securely send messages to her?

On a public server for anyone to access

What is steganography?

The technique of encoding digital images in a hidden manner

Which modern version of steganography hides information in digital pictures or other images?

.bmp files

What is the main purpose of Secure Sockets Layer (SSL) protocol?

To provide a secure channel over the public Internet

What does Secure Hypertext Transfer Protocol (S-HTTP) primarily offer?

Encryption of individual messages between client and server

In the context of secure communication protocols, what do true cryptosystems refer to?

Applications that protect confidential information effectively

What is the most crucial factor in the strength of encryption applications and cryptosystems?

The length of the cryptovariable or key

How is the security of encrypted data in cryptosystems primarily maintained?

By keeping some or all elements of the cryptovariable or key secret

In terms of encryption key cracking, what is the relationship between the number of bits in a key and the operations needed for brute force attack?

Exponential

What does a computer need to perform to crack an encryption key using a brute force attack?

$2^k$ operations

Why is it essential to keep some or all elements of the cryptovariable(s) secret in a cryptosystem?

To ensure the security of encrypted data

What is a Template cipher used for?

Hiding messages in a book or letter

What is the main purpose of Hash Functions?

Verifying message identity and integrity

What distinguishes symmetric encryption from asymmetric encryption?

The types of keys used

In symmetric encryption, what happens if one copy of the secret key is compromised?

An intermediate can decrypt messages without detection by sender/receiver

Which cryptosystem is mentioned as an example of symmetric encryption in the text?

Data Encryption Standard (DES)

What is the main purpose of cryptanalysis?

Breaking encryption codes

Which method is used for scrambling data and involves replacing elements in the plaintext with other elements?

Transposition ciphers

What type of key size is often used to determine the strength of encryption applications?

Symmetric key size

Which cryptographic algorithms are commonly grouped into symmetric and asymmetric categories?

Public-key algorithms

In cryptography, what is the purpose of a public-key infrastructure (PKI)?

Providing secure communication trust

Which method is NOT a form of cryptography but is used to hide information during communication?

Steganography

What type of encrypted messages provide nonrepudiation by being independently verified?

Digital signatures

Which mathematical algorithms generate message digests to confirm the identity of messages?

Hash functions

Which encryption technique combines both symmetric and asymmetric approaches in most popular cryptosystems?

Public-key infrastructure (PKI)

What is the purpose of generating a message summary using hash functions in encryption?

To confirm message integrity and identity

Test your knowledge on Secure Hypertext Transfer Protocol (S-HTTP) and different encryption methods for securing emails like S/MIME, PEM, and PGP. Explore how these technologies ensure secure communication over the internet.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Use Quizgecko on...
Browser
Browser