Week 6
40 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which protocol uses 3DES symmetric key encryption and RSA for key exchanges and digital signatures?

  • S-HTTP
  • PGP
  • SET
  • PEM (correct)

What is the main purpose of Secure Electronic Transactions (SET)?

  • To provide security to email attachments
  • To encrypt credit card information transfers
  • To secure wireless networks
  • To protect against electronic payment fraud (correct)

Which modern cryptographic cipher is used by Pretty Good Privacy (PGP) for message encoding?

  • 3DES
  • AES
  • RSA
  • IDEA (correct)

Which protocol was an early attempt to provide security for 802.11 networks before being replaced by Wi-Fi Protected Access (WPA)?

<p>WEP (B)</p> Signup and view all the answers

Which protocol allows the encryption of information passing between computers through a protected and secure virtual connection?

<p>SSL (D)</p> Signup and view all the answers

What type of encryption uses Diffie-Hellman key exchange for deriving key material between peers on a public network?

<p>Symmetric encryption (D)</p> Signup and view all the answers

Which encryption protocol provides six services including authentication by digital signatures and message encryption?

<p>IPSec (B)</p> Signup and view all the answers

In the context of secure communication, what does IPSec use Public-key cryptography for?

<p>Signing the Diffie-Hellman exchanges (B)</p> Signup and view all the answers

Which protocol is known for providing improved user authentication using 802.1X and EAP?

<p>WEP Encryption (A)</p> Signup and view all the answers

What is the primary function of Pretty Good Privacy (PGP) in email security?

<p>Message encryption (B)</p> Signup and view all the answers

What is the purpose of Triple DES (3DES)?

<p>To provide security beyond DES with a 64-bit block size and 56-bit key (C)</p> Signup and view all the answers

Which encryption method requires two different keys, one public and one private, for enciphering or deciphering messages?

<p>RSA (B)</p> Signup and view all the answers

In asymmetric encryption, if Key A is used to encrypt a message, which key is required to decrypt it?

<p>Key B (B)</p> Signup and view all the answers

What was the main purpose of developing the Advanced Encryption Standard (AES)?

<p>To replace both DES and 3DES (A)</p> Signup and view all the answers

Where should Rachel store her public key to allow Alex to securely send messages to her?

<p>On a public server for anyone to access (D)</p> Signup and view all the answers

What is steganography?

<p>The technique of encoding digital images in a hidden manner (A)</p> Signup and view all the answers

Which modern version of steganography hides information in digital pictures or other images?

<p>.bmp files (A)</p> Signup and view all the answers

What is the main purpose of Secure Sockets Layer (SSL) protocol?

<p>To provide a secure channel over the public Internet (B)</p> Signup and view all the answers

What does Secure Hypertext Transfer Protocol (S-HTTP) primarily offer?

<p>Encryption of individual messages between client and server (A)</p> Signup and view all the answers

In the context of secure communication protocols, what do true cryptosystems refer to?

<p>Applications that protect confidential information effectively (C)</p> Signup and view all the answers

What is the most crucial factor in the strength of encryption applications and cryptosystems?

<p>The length of the cryptovariable or key (D)</p> Signup and view all the answers

How is the security of encrypted data in cryptosystems primarily maintained?

<p>By keeping some or all elements of the cryptovariable or key secret (A)</p> Signup and view all the answers

In terms of encryption key cracking, what is the relationship between the number of bits in a key and the operations needed for brute force attack?

<p>Exponential (A)</p> Signup and view all the answers

What does a computer need to perform to crack an encryption key using a brute force attack?

<p>$2^k$ operations (D)</p> Signup and view all the answers

Why is it essential to keep some or all elements of the cryptovariable(s) secret in a cryptosystem?

<p>To ensure the security of encrypted data (D)</p> Signup and view all the answers

What is a Template cipher used for?

<p>Hiding messages in a book or letter (C)</p> Signup and view all the answers

What is the main purpose of Hash Functions?

<p>Verifying message identity and integrity (A)</p> Signup and view all the answers

What distinguishes symmetric encryption from asymmetric encryption?

<p>The types of keys used (D)</p> Signup and view all the answers

In symmetric encryption, what happens if one copy of the secret key is compromised?

<p>An intermediate can decrypt messages without detection by sender/receiver (B)</p> Signup and view all the answers

Which cryptosystem is mentioned as an example of symmetric encryption in the text?

<p>Data Encryption Standard (DES) (C)</p> Signup and view all the answers

What is the main purpose of cryptanalysis?

<p>Breaking encryption codes (D)</p> Signup and view all the answers

Which method is used for scrambling data and involves replacing elements in the plaintext with other elements?

<p>Transposition ciphers (B)</p> Signup and view all the answers

What type of key size is often used to determine the strength of encryption applications?

<p>Symmetric key size (C)</p> Signup and view all the answers

Which cryptographic algorithms are commonly grouped into symmetric and asymmetric categories?

<p>Public-key algorithms (A)</p> Signup and view all the answers

In cryptography, what is the purpose of a public-key infrastructure (PKI)?

<p>Providing secure communication trust (D)</p> Signup and view all the answers

Which method is NOT a form of cryptography but is used to hide information during communication?

<p>Steganography (D)</p> Signup and view all the answers

What type of encrypted messages provide nonrepudiation by being independently verified?

<p>Digital signatures (D)</p> Signup and view all the answers

Which mathematical algorithms generate message digests to confirm the identity of messages?

<p>Hash functions (C)</p> Signup and view all the answers

Which encryption technique combines both symmetric and asymmetric approaches in most popular cryptosystems?

<p>Public-key infrastructure (PKI) (D)</p> Signup and view all the answers

What is the purpose of generating a message summary using hash functions in encryption?

<p>To confirm message integrity and identity (C)</p> Signup and view all the answers

More Like This

Internet & HTTP Basics
34 questions

Internet & HTTP Basics

EasygoingDialect5934 avatar
EasygoingDialect5934
Use Quizgecko on...
Browser
Browser