40 Questions
Which protocol uses 3DES symmetric key encryption and RSA for key exchanges and digital signatures?
PEM
What is the main purpose of Secure Electronic Transactions (SET)?
To protect against electronic payment fraud
Which modern cryptographic cipher is used by Pretty Good Privacy (PGP) for message encoding?
IDEA
Which protocol was an early attempt to provide security for 802.11 networks before being replaced by Wi-Fi Protected Access (WPA)?
WEP
Which protocol allows the encryption of information passing between computers through a protected and secure virtual connection?
SSL
What type of encryption uses Diffie-Hellman key exchange for deriving key material between peers on a public network?
Symmetric encryption
Which encryption protocol provides six services including authentication by digital signatures and message encryption?
IPSec
In the context of secure communication, what does IPSec use Public-key cryptography for?
Signing the Diffie-Hellman exchanges
Which protocol is known for providing improved user authentication using 802.1X and EAP?
WEP Encryption
What is the primary function of Pretty Good Privacy (PGP) in email security?
Message encryption
What is the purpose of Triple DES (3DES)?
To provide security beyond DES with a 64-bit block size and 56-bit key
Which encryption method requires two different keys, one public and one private, for enciphering or deciphering messages?
RSA
In asymmetric encryption, if Key A is used to encrypt a message, which key is required to decrypt it?
Key B
What was the main purpose of developing the Advanced Encryption Standard (AES)?
To replace both DES and 3DES
Where should Rachel store her public key to allow Alex to securely send messages to her?
On a public server for anyone to access
What is steganography?
The technique of encoding digital images in a hidden manner
Which modern version of steganography hides information in digital pictures or other images?
.bmp files
What is the main purpose of Secure Sockets Layer (SSL) protocol?
To provide a secure channel over the public Internet
What does Secure Hypertext Transfer Protocol (S-HTTP) primarily offer?
Encryption of individual messages between client and server
In the context of secure communication protocols, what do true cryptosystems refer to?
Applications that protect confidential information effectively
What is the most crucial factor in the strength of encryption applications and cryptosystems?
The length of the cryptovariable or key
How is the security of encrypted data in cryptosystems primarily maintained?
By keeping some or all elements of the cryptovariable or key secret
In terms of encryption key cracking, what is the relationship between the number of bits in a key and the operations needed for brute force attack?
Exponential
What does a computer need to perform to crack an encryption key using a brute force attack?
$2^k$ operations
Why is it essential to keep some or all elements of the cryptovariable(s) secret in a cryptosystem?
To ensure the security of encrypted data
What is a Template cipher used for?
Hiding messages in a book or letter
What is the main purpose of Hash Functions?
Verifying message identity and integrity
What distinguishes symmetric encryption from asymmetric encryption?
The types of keys used
In symmetric encryption, what happens if one copy of the secret key is compromised?
An intermediate can decrypt messages without detection by sender/receiver
Which cryptosystem is mentioned as an example of symmetric encryption in the text?
Data Encryption Standard (DES)
What is the main purpose of cryptanalysis?
Breaking encryption codes
Which method is used for scrambling data and involves replacing elements in the plaintext with other elements?
Transposition ciphers
What type of key size is often used to determine the strength of encryption applications?
Symmetric key size
Which cryptographic algorithms are commonly grouped into symmetric and asymmetric categories?
Public-key algorithms
In cryptography, what is the purpose of a public-key infrastructure (PKI)?
Providing secure communication trust
Which method is NOT a form of cryptography but is used to hide information during communication?
Steganography
What type of encrypted messages provide nonrepudiation by being independently verified?
Digital signatures
Which mathematical algorithms generate message digests to confirm the identity of messages?
Hash functions
Which encryption technique combines both symmetric and asymmetric approaches in most popular cryptosystems?
Public-key infrastructure (PKI)
What is the purpose of generating a message summary using hash functions in encryption?
To confirm message integrity and identity
Test your knowledge on Secure Hypertext Transfer Protocol (S-HTTP) and different encryption methods for securing emails like S/MIME, PEM, and PGP. Explore how these technologies ensure secure communication over the internet.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free