Mod 10 Cryptography Quiz PDF
Document Details
Uploaded by HarmoniousPlateau8094
Tags
Related
- White box cryptography is an essential technology when it comes to….pdf
- Whitebox cryptography is a field of study that focuses on designing….pdf
- 5 Cryptography Whitman_Ch08.pdf
- Chapter 14 - 03 - Discuss Various Hash Functions and Cryptography Tools - 01_ocred.pdf
- Sample Quiz Part 4 PDF
- Blockchain Technology Quiz PDF
Summary
This document contains a series of true or false questions about the history of cryptography. These questions cover key concepts and significant events. These questions can be used as a self-assessment test or in classroom settings.
Full Transcript
**True / False** +-----------------------------------------------------------------------+ | 1. In 1953, Giovan Batista Bellaso introduced the idea of the | | passphrase (password) as a key for encryption. | |...
**True / False** +-----------------------------------------------------------------------+ | 1. In 1953, Giovan Batista Bellaso introduced the idea of the | | passphrase (password) as a key for encryption. | | | | --- ----- ------- | | a. True | | b. False | | --- ----- ------- | | | | -------------------------- ---------------------------------------- | | ---------------------------------------------------------------- | | *ANSWER: * False | | | | *POINTS: * 1 | | | | *REFERENCES: * H1: Introduction To Cryptography\ | | H2: The History of Cryptology\ | | P. 385 | | | | *QUESTION TYPE: * True / False | | | | *HAS VARIABLES: * False | | | | *LEARNING OBJECTIVES: * POIS.WHMA.22.10.1 - Chronicle the most s | | ignificant events and discoveries in the history of cryptology | | | | *DATE CREATED: * 9/14/2016 10:45 AM | | | | *DATE MODIFIED: * 9/14/2016 10:45 AM | | -------------------------- ---------------------------------------- | | ---------------------------------------------------------------- | +-----------------------------------------------------------------------+ +-----------------------------------------------------------------------+ | 2. In 1917, Gilbert S. Vernam, an AT&T employee, invented a | | polyalphabetic cipher machine that used a non-repeating random key. | | | | --- ----- ------- | | a. True | | b. False | | --- ----- ------- | | | | -------------------------- ---------------------------------------- | | ---------------------------------------------------------------- | | *ANSWER: * True | | | | *POINTS: * 1 | | | | *REFERENCES: * p\. 385\ | | H1: Introduction To Cryptography\ | | H2: The History of Cryptology | | | | *QUESTION TYPE: * True / False | | | | *HAS VARIABLES: * False | | | | *LEARNING OBJECTIVES: * POIS.WHMA.22.10.1 - Chronicle the most s | | ignificant events and discoveries in the history of cryptology | | | | *DATE CREATED: * 9/14/2016 10:45 AM | | | | *DATE MODIFIED: * 3/9/2017 11:11 PM | | -------------------------- ---------------------------------------- | | ---------------------------------------------------------------- | +-----------------------------------------------------------------------+ +-----------------------------------------------------------------------+ | 3. Sequence encryption is a series of encryptions and decryptions | | between a number of systems, wherein each system in a network | | decrypts the message sent to it and then reencrypts it using | | different keys and sends it to the next neighbor. This process | | continues until the message reaches the final destination. | | | | --- ----- ------- | | a. True | | b. False | | --- ----- ------- | | | | -------------------------- ---------------------------------------- | | ---------------------------------------------------------------- | | *ANSWER: * False | | | | *POINTS: * 1 | | | | *REFERENCES: * p\. 386\ | | H1: Introduction To Cryptography\ | | H2: Key Cryptology Terms | | | | *QUESTION TYPE: * True / False | | | | *HAS VARIABLES: * False | | | | *LEARNING OBJECTIVES: * POIS.WHMA.22.10.1 - Chronicle the most s | | ignificant events and discoveries in the history of cryptology | | | | *DATE CREATED: * 9/14/2016 10:45 AM | | | | *DATE MODIFIED: * 3/9/2017 11:12 PM | | -------------------------- ---------------------------------------- | | ---------------------------------------------------------------- | +-----------------------------------------------------------------------+ +-----------------------------------------------------------------------+ | 4. The permutation cipher simply rearranges the values within a block | | to create the ciphertext. | | | | --- ----- ------- | | a. True | | b. False | | --- ----- ------- | | | | -------------------------- ---------------------------------------- | | -------------------------- | | *ANSWER: * True | | | | *POINTS: * 1 | | | | *REFERENCES: * H1: Encryption Methods\ | | H2: Transposition Cipher\ | | p. 390 | | | | *QUESTION TYPE: * True / False | | | | *HAS VARIABLES: * False | | | | *LEARNING OBJECTIVES: * POIS.WHMA.22.10.2 - Explain the basic pr | | inciples of cryptography | | | | *DATE CREATED: * 9/14/2016 10:45 AM | | | | *DATE MODIFIED: * 9/14/2016 10:45 AM | | -------------------------- ---------------------------------------- | | -------------------------- | +-----------------------------------------------------------------------+ +-----------------------------------------------------------------------+ | 5. In addition to being credited with inventing a substitution | | cipher, Julius Caesar was associated with an early version of the | | transposition cipher. | | | | --- ----- ------- | | a. True | | b. False | | --- ----- ------- | | | | -------------------------- ---------------------------------------- | | -------------------------- | | *ANSWER: * True | | | | *POINTS: * 1 | | | | *REFERENCES: * p\. 391\ | | H1: Encryption Methods\ | | H2: Transposition Cipher | | | | *QUESTION TYPE: * True / False | | | | *HAS VARIABLES: * False | | | | *LEARNING OBJECTIVES: * POIS.WHMA.22.10.2 - Explain the basic pr | | inciples of cryptography | | | | *DATE CREATED: * 9/14/2016 10:45 AM | | | | *DATE MODIFIED: * 9/14/2016 10:45 AM | | -------------------------- ---------------------------------------- | | -------------------------- | +-----------------------------------------------------------------------+ +-----------------------------------------------------------------------+ | 6. You cannot combine the XOR operation with a block cipher | | operation. | | | | --- ----- ------- | | a. True | | b. False | | --- ----- ------- | | | | -------------------------- ---------------------------------------- | | -------------------------- | | *ANSWER: * False | | | | *POINTS: * 1 | | | | *REFERENCES: * p\. 391\ | | H1: Encryption Methods\ | | H2: Exclusive OR | | | | *QUESTION TYPE: * True / False | | | | *HAS VARIABLES: * False | | | | *LEARNING OBJECTIVES: * POIS.WHMA.22.10.2 - Explain the basic pr | | inciples of cryptography | | | | *DATE CREATED: * 9/14/2016 10:45 AM | | | | *DATE MODIFIED: * 9/14/2016 10:45 AM | | -------------------------- ---------------------------------------- | | -------------------------- | +-----------------------------------------------------------------------+ +-----------------------------------------------------------------------+ | 7. To perform the Caesar cipher encryption operation, the pad values | | are added to numeric values that represent the plaintext that needs | | to be encrypted. | | | | --- ----- ------- | | a. True | | b. False | | --- ----- ------- | | | | -------------------------- ---------------------------------------- | | -------------------------- | | *ANSWER: * False | | | | *POINTS: * 1 | | | | *REFERENCES: * p\. 392\ | | H1: Encryption Methods\ | | H2: Vernam Cipher | | | | *QUESTION TYPE: * True / False | | | | *HAS VARIABLES: * False | | | | *LEARNING OBJECTIVES: * POIS.WHMA.22.10.2 - Explain the basic pr | | inciples of cryptography | | | | *DATE CREATED: * 9/14/2016 10:45 AM | | | | *DATE MODIFIED: * 9/14/2016 10:45 AM | | -------------------------- ---------------------------------------- | | -------------------------- | +-----------------------------------------------------------------------+ +-----------------------------------------------------------------------+ | 8. One encryption method made popular by spy movies is the book | | cipher, which involves using the text in a book to encrypt and | | decrypt messages. | | | | --- ----- ------- | | a. True | | b. False | | --- ----- ------- | | | | -------------------------- ---------------------------------------- | | -------------------------- | | *ANSWER: * True | | | | *POINTS: * 1 | | | | *REFERENCES: * p\. 393\ | | H1: Encryption Methods\ | | H2: Book-Based Ciphers | | | | *QUESTION TYPE: * True / False | | | | *HAS VARIABLES: * False | | | | *LEARNING OBJECTIVES: * POIS.WHMA.22.10.2 - Explain the basic pr | | inciples of cryptography | | | | *DATE CREATED: * 9/14/2016 10:45 AM | | | | *DATE MODIFIED: * 6/27/2021 11:56 AM | | -------------------------- ---------------------------------------- | | -------------------------- | +-----------------------------------------------------------------------+ +-----------------------------------------------------------------------+ | 9. Hashing functions require the use of keys. | | | | --- ----- ------- | | a. True | | b. False | | --- ----- ------- | | | | -------------------------- ---------------------------------------- | | -------------------------- | | *ANSWER: * False | | | | *POINTS: * 1 | | | | *REFERENCES: * p\. 394\ | | H1: Encryption Methods\ | | H2: Hash Functions | | | | *QUESTION TYPE: * True / False | | | | *HAS VARIABLES: * False | | | | *LEARNING OBJECTIVES: * POIS.WHMA.22.10.2 - Explain the basic pr | | inciples of cryptography | | | | *DATE CREATED: * 9/14/2016 10:45 AM | | | | *DATE MODIFIED: * 9/14/2016 10:45 AM | | -------------------------- ---------------------------------------- | | -------------------------- | +-----------------------------------------------------------------------+ +-----------------------------------------------------------------------+ | 10. A cryptovariable is a value representing the application of a | | hash algorithm on a message. | | | | --- ----- ------- | | a. True | | b. False | | --- ----- ------- | | | | -------------------------- ---------------------------------------- | | -------------------------- | | *ANSWER: * False | | | | *POINTS: * 1 | | | | *REFERENCES: * p\. 398\ | | H1: Cryptographic Algorithms\ | | H2: Encryption Key Size | | | | *QUESTION TYPE: * True / False | | | | *HAS VARIABLES: * False | | | | *LEARNING OBJECTIVES: * POIS.WHMA.22.10.2 - Explain the basic pr | | inciples of cryptography | | | | *DATE CREATED: * 9/14/2016 10:45 AM | | | | *DATE MODIFIED: * 9/14/2016 10:45 AM | | -------------------------- ---------------------------------------- | | -------------------------- | +-----------------------------------------------------------------------+ +-----------------------------------------------------------------------+ | 11. A brute force function is a mathematical algorithm that generates | | a message summary or digest (sometimes called a fingerprint) to | | confirm message identity and integrity. | | | | --- ----- ------- | | a. True | | b. False | | --- ----- ------- | | | | -------------------------- ---------------------------------------- | | -------------------------- | | *ANSWER: * False | | | | *POINTS: * 1 | | | | *REFERENCES: * p\. 394\ | | H1: Encryption Methods\ | | H2: Hash Functions | | | | *QUESTION TYPE: * True / False | | | | *HAS VARIABLES: * False | | | | *LEARNING OBJECTIVES: * POIS.WHMA.22.10.2 - Explain the basic pr | | inciples of cryptography | | | | *DATE CREATED: * 9/14/2016 10:45 AM | | | | *DATE MODIFIED: * 3/9/2017 11:14 PM | | -------------------------- ---------------------------------------- | | -------------------------- | +-----------------------------------------------------------------------+ +-----------------------------------------------------------------------+ | 12. Popular cryptosystems use a hybrid combination of symmetric and | | asymmetric algorithms. | | | | --- ----- ------- | | a. True | | b. False | | --- ----- ------- | | | | -------------------------- ---------------------------------------- | | ------------------------------------------------------- | | *ANSWER: * True | | | | *POINTS: * 1 | | | | *REFERENCES: * H1: Cryptographic Tools\ | | H2: Hybrid Cryptography Systems\ | | p. 403 | | | | *QUESTION TYPE: * True / False | | | | *HAS VARIABLES: * False | | | | *LEARNING OBJECTIVES: * POIS.WHMA.22.10.3 - Describe the operati | | ng principles of the most popular cryptographic tools | | | | *DATE CREATED: * 9/14/2016 10:45 AM | | | | *DATE MODIFIED: * 9/14/2016 10:45 AM | | -------------------------- ---------------------------------------- | | ------------------------------------------------------- | +-----------------------------------------------------------------------+ +-----------------------------------------------------------------------+ | 13. Adopted by NIST in 1976 as a federal standard, DES uses a 64-bit | | block size and key. | | | | --- ----- ------- | | a. True | | b. False | | --- ----- ------- | | | | -------------------------- ---------------------------------------- | | -------------------------- | | *ANSWER: * False | | | | *POINTS: * 1 | | | | *REFERENCES: * p\. 396\ | | H1: Cryptographic Algorithms\ | | H2: Symmetric Encryption | | | | *QUESTION TYPE: * True / False | | | | *HAS VARIABLES: * False | | | | *LEARNING OBJECTIVES: * POIS.WHMA.22.10.2 - Explain the basic pr | | inciples of cryptography | | | | *DATE CREATED: * 9/14/2016 10:45 AM | | | | *DATE MODIFIED: * 9/14/2016 10:45 AM | | -------------------------- ---------------------------------------- | | -------------------------- | +-----------------------------------------------------------------------+ +-----------------------------------------------------------------------+ | 14. 3DES was created to offer the same strength as the DES algorithm | | but ran three times as fast, thus saving time. | | | | --- ----- ------- | | a. True | | b. False | | --- ----- ------- | | | | -------------------------- ---------------------------------------- | | -------------------------- | | *ANSWER: * False | | | | *POINTS: * 1 | | | | *REFERENCES: * p\. 396\ | | H1: Cryptographic Algorithms\ | | H2: Symmetric Encryption | | | | *QUESTION TYPE: * True / False | | | | *HAS VARIABLES: * False | | | | *LEARNING OBJECTIVES: * POIS.WHMA.22.10.2 - Explain the basic pr | | inciples of cryptography | | | | *DATE CREATED: * 9/14/2016 10:46 AM | | | | *DATE MODIFIED: * 9/14/2016 10:46 AM | | -------------------------- ---------------------------------------- | | -------------------------- | +-----------------------------------------------------------------------+ +-----------------------------------------------------------------------+ | 15. The AES algorithm was the first public-key encryption algorithm | | to use a 256-bit key length. | | | | --- ----- ------- | | a. True | | b. False | | --- ----- ------- | | | | -------------------------- ---------------------------------------- | | -------------------------- | | *ANSWER: * False | | | | *POINTS: * 1 | | | | *REFERENCES: * p\. 398\ | | H1: Cryptographic Algorithms\ | | H2: Asymmetric Encryption | | | | *QUESTION TYPE: * True / False | | | | *HAS VARIABLES: * False | | | | *LEARNING OBJECTIVES: * POIS.WHMA.22.10.2 - Explain the basic pr | | inciples of cryptography | | | | *DATE CREATED: * 9/14/2016 10:46 AM | | | | *DATE MODIFIED: * 3/9/2017 11:15 PM | | -------------------------- ---------------------------------------- | | -------------------------- | +-----------------------------------------------------------------------+ +-----------------------------------------------------------------------+ | 16. When an asymmetric cryptographic process uses the sender's | | private key to encrypt a message, the sender's public key must be | | used to decrypt the message. | | | | --- ----- ------- | | a. True | | b. False | | --- ----- ------- | | | | -------------------------- ---------------------------------------- | | -------------------------- | | *ANSWER: * True | | | | *POINTS: * 1 | | | | *REFERENCES: * p\. 397\ | | H1: Cryptographic Algorithms\ | | H2: Asymmetric Encryption | | | | *QUESTION TYPE: * True / False | | | | *HAS VARIABLES: * False | | | | *LEARNING OBJECTIVES: * POIS.WHMA.22.10.2 - Explain the basic pr | | inciples of cryptography | | | | *DATE CREATED: * 9/14/2016 10:46 AM | | | | *DATE MODIFIED: * 9/14/2016 10:46 AM | | -------------------------- ---------------------------------------- | | -------------------------- | +-----------------------------------------------------------------------+ +-----------------------------------------------------------------------+ | 17. Asymmetric encryption systems use a single key to both encrypt | | and decrypt a message. | | | | --- ----- ------- | | a. True | | b. False | | --- ----- ------- | | | | -------------------------- ---------------------------------------- | | -------------------------- | | *ANSWER: * False | | | | *POINTS: * 1 | | | | *REFERENCES: * p\. 397\ | | H1: Cryptographic Algorithms\ | | H2: Asymmetric Encryption | | | | *QUESTION TYPE: * True / False | | | | *HAS VARIABLES: * False | | | | *LEARNING OBJECTIVES: * POIS.WHMA.22.10.2 - Explain the basic pr | | inciples of cryptography | | | | *DATE CREATED: * 9/14/2016 10:46 AM | | | | *DATE MODIFIED: * 3/9/2017 11:15 PM | | -------------------------- ---------------------------------------- | | -------------------------- | +-----------------------------------------------------------------------+ +-----------------------------------------------------------------------+ | 18. Usually, as the length of a cryptovariable increases, the number | | of random guesses that have to be made in order to break the code is | | reduced. | | | | --- ----- ------- | | a. True | | b. False | | --- ----- ------- | | | | -------------------------- ---------------------------------------- | | -------------------------- | | *ANSWER: * False | | | | *POINTS: * 1 | | | | *REFERENCES: * p\. 399\ | | H1: Cryptographic Algorithms\ | | H2: Encryption Key Size | | | | *QUESTION TYPE: * True / False | | | | *HAS VARIABLES: * False | | | | *LEARNING OBJECTIVES: * POIS.WHMA.22.10.2 - Explain the basic pr | | inciples of cryptography | | | | *DATE CREATED: * 9/14/2016 10:46 AM | | | | *DATE MODIFIED: * 3/9/2017 11:16 PM | | -------------------------- ---------------------------------------- | | -------------------------- | +-----------------------------------------------------------------------+ +-----------------------------------------------------------------------+ | 19. PKI systems are based on public-key cryptosystems and include | | digital certificates and certificate authorities. | | | | --- ----- ------- | | a. True | | b. False | | --- ----- ------- | | | | -------------------------- ---------------------------------------- | | ------------------------------------------------------- | | *ANSWER: * True | | | | *POINTS: * 1 | | | | *REFERENCES: * p\. 401\ | | H1: Cryptographic Tools\ | | H2: Public Key Infrastructure (PKI) | | | | *QUESTION TYPE: * True / False | | | | *HAS VARIABLES: * False | | | | *LEARNING OBJECTIVES: * POIS.WHMA.22.10.3 - Describe the operati | | ng principles of the most popular cryptographic tools | | | | *DATE CREATED: * 9/14/2016 10:46 AM | | | | *DATE MODIFIED: * 3/9/2017 11:21 PM | | -------------------------- ---------------------------------------- | | ------------------------------------------------------- | +-----------------------------------------------------------------------+ +-----------------------------------------------------------------------+ | 20. The registration authority (RA) is a third party that issues, | | manages, authenticates, signs, and revokes users' digital | | certificates. | | | | --- ----- ------- | | a. True | | b. False | | --- ----- ------- | | | | -------------------------- ---------------------------------------- | | ------------------------------------------------------- | | *ANSWER: * False | | | | *POINTS: * 1 | | | | *REFERENCES: * p\. 401\ | | H1: Cryptographic Tools\ | | H2: Public Key Infrastructure (PKI) | | | | *QUESTION TYPE: * True / False | | | | *HAS VARIABLES: * False | | | | *LEARNING OBJECTIVES: * POIS.WHMA.22.10.3 - Describe the operati | | ng principles of the most popular cryptographic tools | | | | *DATE CREATED: * 9/14/2016 10:46 AM | | | | *DATE MODIFIED: * 6/27/2021 11:56 AM | | -------------------------- ---------------------------------------- | | ------------------------------------------------------- | +-----------------------------------------------------------------------+ +-----------------------------------------------------------------------+ | 21. Nonrepudiation means that customers or partners can be held | | accountable for transactions, such as online purchases, which they | | cannot later deny. | | | | --- ----- ------- | | a. True | | b. False | | --- ----- ------- | | | | -------------------------- ---------------------------------------- | | ------------------------------------------------------- | | *ANSWER: * True | | | | *POINTS: * 1 | | | | *REFERENCES: * p\. 400\ | | H1: Cryptographic Tools\ | | H2: Public Key Infrastructure (PKI) | | | | *QUESTION TYPE: * True / False | | | | *HAS VARIABLES: * False | | | | *LEARNING OBJECTIVES: * POIS.WHMA.22.10.3 - Describe the operati | | ng principles of the most popular cryptographic tools | | | | *DATE CREATED: * 9/14/2016 10:46 AM | | | | *DATE MODIFIED: * 9/14/2016 10:46 AM | | -------------------------- ---------------------------------------- | | ------------------------------------------------------- | +-----------------------------------------------------------------------+ +-----------------------------------------------------------------------+ | 22. The most common hybrid system is based on the Diffie-Hellman key | | exchange, which is a method for exchanging private keys using | | public-key encryption. | | | | --- ----- ------- | | a. True | | b. False | | --- ----- ------- | | | | -------------------------- ---------------------------------------- | | ------------------------------------------------------- | | *ANSWER: * True | | | | *POINTS: * 1 | | | | *REFERENCES: * p\. 403\ | | H1: Cryptographic Tools\ | | H2: Hybrid Cryptography Systems | | | | *QUESTION TYPE: * True / False | | | | *HAS VARIABLES: * False | | | | *LEARNING OBJECTIVES: * POIS.WHMA.22.10.3 - Describe the operati | | ng principles of the most popular cryptographic tools | | | | *DATE CREATED: * 9/14/2016 10:46 AM | | | | *DATE MODIFIED: * 3/9/2017 11:17 PM | | -------------------------- ---------------------------------------- | | ------------------------------------------------------- | +-----------------------------------------------------------------------+ +-----------------------------------------------------------------------+ | 23. Steganography is a data hiding method that involves embedding | | information within other files, such as digital pictures or other | | images. | | | | --- ----- ------- | | a. True | | b. False | | --- ----- ------- | | | | -------------------------- ---------------------------------------- | | ------------------------------------------------------- | | *ANSWER: * True | | | | *POINTS: * 1 | | | | *REFERENCES: * p\. 404\ | | H1: Cryptographic Tools\ | | H2: Steganography | | | | *QUESTION TYPE: * True / False | | | | *HAS VARIABLES: * False | | | | *LEARNING OBJECTIVES: * POIS.WHMA.22.10.3 - Describe the operati | | ng principles of the most popular cryptographic tools | | | | *DATE CREATED: * 9/14/2016 10:46 AM | | | | *DATE MODIFIED: * 9/14/2016 10:46 AM | | -------------------------- ---------------------------------------- | | ------------------------------------------------------- | +-----------------------------------------------------------------------+ +-----------------------------------------------------------------------+ | 24. Standard HTTP (S-HTTP) is an extended version of the Hypertext | | Transfer Protocol that provides for the encryption of individual | | messages transmitted via the Internet between a client and server | | using AES over HTTP. | | | | --- ----- ------- | | a. True | | b. False | | --- ----- ------- | | | | -------------------------- ---------------------------------------- | | ------------------------------------------------- | | *ANSWER: * False | | | | *POINTS: * 1 | | | | *REFERENCES: * H1: Protocols For Secure Communications\ | | H2: Securing Internet Communication with | | HTTPS and SSL\ | | p. 405 | | | | *QUESTION TYPE: * True / False | | | | *HAS VARIABLES: * False | | | | *LEARNING OBJECTIVES: * POIS.WHMA.22.10.4 - List and explain the | | major protocols used for secure communications | | | | *DATE CREATED: * 9/14/2016 10:46 AM | | | | *DATE MODIFIED: * 6/27/2021 11:57 AM | | -------------------------- ---------------------------------------- | | ------------------------------------------------- | +-----------------------------------------------------------------------+ +-----------------------------------------------------------------------+ | 25. SSL builds on the encoding format of the digital encryption | | standard (DES) protocol and uses digital signatures based on | | public-key cryptosystems to secure e-mail. | | | | --- ----- ------- | | a. True | | b. False | | --- ----- ------- | | | | -------------------------- ---------------------------------------- | | ------------------------------------------------- | | *ANSWER: * False | | | | *POINTS: * 1 | | | | *REFERENCES: * p\. 407\ | | H1: Protocols For Secure Communications\ | | H2: Securing E-Mail with S/MIME, PEM, an | | d PGP | | | | *QUESTION TYPE: * True / False | | | | *HAS VARIABLES: * False | | | | *LEARNING OBJECTIVES: * POIS.WHMA.22.10.4 - List and explain the | | major protocols used for secure communications | | | | *DATE CREATED: * 9/14/2016 10:46 AM | | | | *DATE MODIFIED: * 6/27/2021 12:03 PM | | -------------------------- ---------------------------------------- | | ------------------------------------------------- | +-----------------------------------------------------------------------+ +-----------------------------------------------------------------------+ | 26. Bluetooth is a de facto industry standard for short-range | | wireless communications between devices. | | | | --- ----- ------- | | a. True | | b. False | | --- ----- ------- | | | | -------------------------- ---------------------------------------- | | ------------------------------------------------- | | *ANSWER: * True | | | | *POINTS: * 1 | | | | *REFERENCES: * p\. 409\ | | H1: Protocols For Secure Communications\ | | H2: Securing Wireless Networks with WPA | | and RSN | | | | *QUESTION TYPE: * True / False | | | | *HAS VARIABLES: * False | | | | *LEARNING OBJECTIVES: * POIS.WHMA.22.10.4 - List and explain the | | major protocols used for secure communications | | | | *DATE CREATED: * 9/14/2016 10:46 AM | | | | *DATE MODIFIED: * 9/14/2016 10:46 AM | | -------------------------- ---------------------------------------- | | ------------------------------------------------- | +-----------------------------------------------------------------------+ +-----------------------------------------------------------------------+ | 27. Secure Electronic Transactions was developed by MasterCard and | | Visa in 1997 to protect against electronic payment fraud. | | | | --- ----- ------- | | a. True | | b. False | | --- ----- ------- | | | | -------------------------- ---------------------------------------- | | ------------------------------------------------- | | *ANSWER: * True | | | | *POINTS: * 1 | | | | *REFERENCES: * p\. 409\ | | H1: Protocols For Secure Communications\ | | H2: Securing Web Transactions with SET, | | SSL, and HTTPS | | | | *QUESTION TYPE: * True / False | | | | *HAS VARIABLES: * False | | | | *LEARNING OBJECTIVES: * POIS.WHMA.22.10.4 - List and explain the | | major protocols used for secure communications | | | | *DATE CREATED: * 9/14/2016 10:46 AM | | | | *DATE MODIFIED: * 3/9/2017 11:26 PM | | -------------------------- ---------------------------------------- | | ------------------------------------------------- | +-----------------------------------------------------------------------+ +-----------------------------------------------------------------------+ | 28. The encapsulating security payload protocol provides secrecy for | | the contents of network communications as well as system-to-system | | authentication and data integrity verification. | | | | --- ----- ------- | | a. True | | b. False | | --- ----- ------- | | | | -------------------------- ---------------------------------------- | | ------------------------------------------------- | | *ANSWER: * True | | | | *POINTS: * 1 | | | | *REFERENCES: * p\. 410\ | | H1: Protocols For Secure Communications\ | | H2: Securing TCP/IP with IPSec and PGP | | | | *QUESTION TYPE: * True / False | | | | *HAS VARIABLES: * False | | | | *LEARNING OBJECTIVES: * POIS.WHMA.22.10.4 - List and explain the | | major protocols used for secure communications | | | | *DATE CREATED: * 9/14/2016 10:46 AM | | | | *DATE MODIFIED: * 9/14/2016 10:46 AM | | -------------------------- ---------------------------------------- | | ------------------------------------------------- | +-----------------------------------------------------------------------+ +-----------------------------------------------------------------------+ | 29. The HTTPS security solution provides six services: authentication | | by digital signatures, message encryption, compression, e-mail | | compatibility, segmentation, and key management. | | | | --- ----- ------- | | a. True | | b. False | | --- ----- ------- | | | | -------------------------- ---------------------------------------- | | ------------------------------------------------- | | *ANSWER: * False | | | | *POINTS: * 1 | | | | *REFERENCES: * p\. 412\ | | H1: Protocols For Secure Communications\ | | H2: Securing TCP/IP with IPSec and PGP | | | | *QUESTION TYPE: * True / False | | | | *HAS VARIABLES: * False | | | | *LEARNING OBJECTIVES: * POIS.WHMA.22.10.4 - List and explain the | | major protocols used for secure communications | | | | *DATE CREATED: * 9/14/2016 10:46 AM | | | | *DATE MODIFIED: * 6/14/2021 7:27 PM | | -------------------------- ---------------------------------------- | | ------------------------------------------------- | +-----------------------------------------------------------------------+ +-----------------------------------------------------------------------+ | 30. Internet Protocol Security (IPSec) is an open-source protocol | | framework for security development within the TCP/IP family of | | protocols. | | | | --- ----- ------- | | a. True | | b. False | | --- ----- ------- | | | | -------------------------- ---------------------------------------- | | ------------------------------------------------- | | *ANSWER: * True | | | | *POINTS: * 1 | | | | *REFERENCES: * p\. 410\ | | H1: Protocols For Secure Communications\ | | H2: Securing TCP/IP with IPSec and PGP | | | | *QUESTION TYPE: * True / False | | | | *HAS VARIABLES: * False | | | | *LEARNING OBJECTIVES: * POIS.WHMA.22.10.4 - List and explain the | | major protocols used for secure communications | | | | *DATE CREATED: * 9/14/2016 10:46 AM | | | | *DATE MODIFIED: * 3/9/2017 11:27 PM | | -------------------------- ---------------------------------------- | | ------------------------------------------------- | +-----------------------------------------------------------------------+ --------------------------- **Modified True / False** --------------------------- +-----------------------------------------------------------------------+ | 31. [Encryption] is the process of converting the | | ciphertext message back into plaintext so that it can be readily | | understood. \_\_\_\_\_ | | | | -------------------------- ---------------------------------------- | | ---------------------------------------------------------------- | | *ANSWER: * False - Decryption | | | | *POINTS: * 1 | | | | *REFERENCES: * P. 386\ | | H1: Introduction To Cryptography\ | | H2: Key Cryptology Terms | | | | *QUESTION TYPE: * Modified True / False | | | | *HAS VARIABLES: * False | | | | *STUDENT ENTRY MODE: * Basic | | | | *LEARNING OBJECTIVES: * POIS.WHMA.22.10.1 - Chronicle the most s | | ignificant events and discoveries in the history of cryptology | | | | *DATE CREATED: * 9/14/2016 10:46 AM | | | | *DATE MODIFIED: * 6/6/2021 4:00 PM | | -------------------------- ---------------------------------------- | | ---------------------------------------------------------------- | +-----------------------------------------------------------------------+ +-----------------------------------------------------------------------+ | 32. A(n) [key] is the set of steps used to convert an | | unencrypted message into an encrypted sequence of bits that represent | | the message; it sometimes refers to the programs that enable the | | cryptographic processes. \_\_\_\_\_ | | | | -------------------------- ---------------------------------------- | | ---------------------------------------------------------------- | | *ANSWER: * False - algorithm | | | | *POINTS: * 1 | | | | *REFERENCES: * p\. 385\ | | H1: Introduction To Cryptography\ | | H2: Key Cryptology Terms | | | | *QUESTION TYPE: * Modified True / False | | | | *HAS VARIABLES: * False | | | | *STUDENT ENTRY MODE: * Basic | | | | *LEARNING OBJECTIVES: * POIS.WHMA.22.10.1 - Chronicle the most s | | ignificant events and discoveries in the history of cryptology | | | | *DATE CREATED: * 9/14/2016 10:46 AM | | | | *DATE MODIFIED: * 6/6/2021 4:00 PM | | -------------------------- ---------------------------------------- | | ---------------------------------------------------------------- | +-----------------------------------------------------------------------+ +-----------------------------------------------------------------------+ | 33. To [encipher] means to decrypt, decode, or convert | | ciphertext into the equivalent plaintext. \_\_\_\_\_ | | | | -------------------------- ---------------------------------------- | | ---------------------------------------------------------------- | | *ANSWER: * False - decipher | | | | *POINTS: * 1 | | | | *REFERENCES: * p\. 386\ | | H1: Introduction To Cryptography\ | | H2: Key Cryptology Terms | | | | *QUESTION TYPE: * Modified True / False | | | | *HAS VARIABLES: * False | | | | *STUDENT ENTRY MODE: * Basic | | | | *LEARNING OBJECTIVES: * POIS.WHMA.22.10.1 - Chronicle the most s | | ignificant events and discoveries in the history of cryptology | | | | *DATE CREATED: * 9/14/2016 10:46 AM | | | | *DATE MODIFIED: * 6/6/2021 4:00 PM | | -------------------------- ---------------------------------------- | | ---------------------------------------------------------------- | +-----------------------------------------------------------------------+ +-----------------------------------------------------------------------+ | 34. Ciphertext or a [cryptogram] is an encoded message, | | or a message that has been successfully encrypted. \_\_\_\_\_ | | | | -------------------------- ---------------------------------------- | | ---------------------------------------------------------------- | | *ANSWER: * True | | | | *POINTS: * 1 | | | | *REFERENCES: * p\. 386\ | | H1: Introduction To Cryptography\ | | H2: Key Cryptology Terms | | | | *QUESTION TYPE: * Modified True / False | | | | *HAS VARIABLES: * False | | | | *STUDENT ENTRY MODE: * Basic | | | | *LEARNING OBJECTIVES: * POIS.WHMA.22.10.1 - Chronicle the most s | | ignificant events and discoveries in the history of cryptology | | | | *DATE CREATED: * 9/14/2016 10:46 AM | | | | *DATE MODIFIED: * 6/6/2021 4:00 PM | | -------------------------- ---------------------------------------- | | ---------------------------------------------------------------- | +-----------------------------------------------------------------------+ +-----------------------------------------------------------------------+ | 35. In a book cipher, the [key] consists of a list of | | codes representing the page number, line number, and word number of | | the plaintext word. \_\_\_\_\_ | | | | +--------------------------------+--------------------------------+ | | | *ANSWER: * | False - ciphertext | | | | | | | | | | False - cryptogram | | | | | | | | | | False - encrypted text | | | +--------------------------------+--------------------------------+ | | | *POINTS: * | 1 | | | +--------------------------------+--------------------------------+ | | | *REFERENCES: * | p\. 393\ | | | | | H1: Encryption Methods\ | | | | | H2: Book-Based Ciphers | | | +--------------------------------+--------------------------------+ | | | *QUESTION TYPE: * | Modified True / False | | | +--------------------------------+--------------------------------+ | | | *HAS VARIABLES: * | False | | | +--------------------------------+--------------------------------+ | | | *STUDENT ENTRY MODE: * | Basic | | | +--------------------------------+--------------------------------+ | | | *LEARNING OBJECTIVES: * | POIS.WHMA.22.10.2 - Explain | | | | | the basic principles of | | | | | cryptography | | | +--------------------------------+--------------------------------+ | | | *DATE CREATED: * | 9/14/2016 10:46 AM | | | +--------------------------------+--------------------------------+ | | | *DATE MODIFIED: * | 6/27/2021 12:04 PM | | | +--------------------------------+--------------------------------+ | +-----------------------------------------------------------------------+ +-----------------------------------------------------------------------+ | 36. Hash algorithms are mathematical functions that create a [message | | digest] by converting variable-length messages into a | | single fixed-length value. \_\_\_\_\_ | | | | -------------------------- ---------------------------------------- | | -------------------------- | | *ANSWER: * True | | | | *POINTS: * 1 | | | | *REFERENCES: * p\. 394\ | | H1: Encryption Methods\ | | H2: Book-Based Ciphers | | | | *QUESTION TYPE: * Modified True / False | | | | *HAS VARIABLES: * False | | | | *STUDENT ENTRY MODE: * Basic | | | | *LEARNING OBJECTIVES: * POIS.WHMA.22.10.2 - Explain the basic pr | | inciples of cryptography | | | | *DATE CREATED: * 9/14/2016 10:46 AM | | | | *DATE MODIFIED: * 6/27/2021 12:05 PM | | -------------------------- ---------------------------------------- | | -------------------------- | +-----------------------------------------------------------------------+ +-----------------------------------------------------------------------+ | 37. A [multipart] authentication code (MAC) is a | | key-dependent, one-way hash function that allows only specific | | recipients (symmetric key holders) to access the message digest. | | \_\_\_\_\_ | | | | -------------------------- ---------------------------------------- | | -------------------------- | | *ANSWER: * False - message | | | | *POINTS: * 1 | | | | *REFERENCES: * p\. 394\ | | H1: Encryption Methods\ | | H2: Book-Based Ciphers | | | | *QUESTION TYPE: * Modified True / False | | | | *HAS VARIABLES: * False | | | | *STUDENT ENTRY MODE: * Basic | | | | *LEARNING OBJECTIVES: * POIS.WHMA.22.10.2 - Explain the basic pr | | inciples of cryptography | | | | *DATE CREATED: * 9/14/2016 10:46 AM | | | | *DATE MODIFIED: * 6/6/2021 4:00 PM | | -------------------------- ---------------------------------------- | | -------------------------- | +-----------------------------------------------------------------------+ +-----------------------------------------------------------------------+ | 38. Encryption methodologies that require the same secret key to | | encipher and decipher the message are using [public]-key | | encryption. \_\_\_\_\_ | | | | -------------------------- ---------------------------------------- | | -------------------------- | | *ANSWER: * False - private | | | | *POINTS: * 1 | | | | *REFERENCES: * p\. 396\ | | H1: Cryptography Algorithms\ | | H2: Symmetric Encryption | | | | *QUESTION TYPE: * Modified True / False | | | | *HAS VARIABLES: * False | | | | *STUDENT ENTRY MODE: * Basic | | | | *LEARNING OBJECTIVES: * POIS.WHMA.22.10.2 - Explain the basic pr | | inciples of cryptography | | | | *DATE CREATED: * 9/14/2016 10:46 AM | | | | *DATE MODIFIED: * 6/27/2021 12:06 PM | | -------------------------- ---------------------------------------- | | -------------------------- | +-----------------------------------------------------------------------+ +-----------------------------------------------------------------------+ | 39. [PKI] is the a federal information processing | | standard that specifies a cryptographic algorithm developed to | | replace both DES and 3DES. \_\_\_\_\_ | | | | +--------------------------------+--------------------------------+ | | | *ANSWER: * | False - AES | | | | | | | | | | False - Advanced Encryption | | | | | Standard | | | | | | | | | | False - Advanced Encryption | | | | | Standard (AES) | | | +--------------------------------+--------------------------------+ | | | *POINTS: * | 1 | | | +--------------------------------+--------------------------------+ | | | *REFERENCES: * | p\. 396\ | | | | | H1: Cryptography Algorithms\ | | | | | H2: Symmetric Encryption | | | +--------------------------------+--------------------------------+ | | | *QUESTION TYPE: * | Modified True / False | | | +--------------------------------+--------------------------------+ | | | *HAS VARIABLES: * | False | | | +--------------------------------+--------------------------------+ | | | *STUDENT ENTRY MODE: * | Basic | | | +--------------------------------+--------------------------------+ | | | *LEARNING OBJECTIVES: * | POIS.WHMA.22.10.2 - Explain | | | | | the basic principles of | | | | | cryptography | | | +--------------------------------+--------------------------------+ | | | *DATE CREATED: * | 9/14/2016 10:46 AM | | | +--------------------------------+--------------------------------+ | | | *DATE MODIFIED: * | 6/27/2021 12:07 PM | | | +--------------------------------+--------------------------------+ | +-----------------------------------------------------------------------+ +-----------------------------------------------------------------------+ | 40. AES implements a block cipher called the [Rijndael] | | Block Cipher with a variable block length and a key length of 128, | | 192 or 256 bits. \_\_\_\_\_ | | | | -------------------------- ---------------------------------------- | | -------------------------- | | *ANSWER: * True | | | | *POINTS: * 1 | | | | *REFERENCES: * p\. 397\ | | H1: Cryptography Algorithms\ | | H2: Symmetric Encryption | | | | *QUESTION TYPE: * Modified True / False | | | | *HAS VARIABLES: * False | | | | *STUDENT ENTRY MODE: * Basic | | | | *LEARNING OBJECTIVES: * POIS.WHMA.22.10.2 - Explain the basic pr | | inciples of cryptography | | | | *DATE CREATED: * 9/14/2016 10:46 AM | | | | *DATE MODIFIED: * 6/27/2021 12:08 PM | | -------------------------- ---------------------------------------- | | -------------------------- | +-----------------------------------------------------------------------+ +-----------------------------------------------------------------------+ | 41. [Symmetric] encryption uses two different but related | | keys, and either key can be used to encrypt or decrypt the message. | | \_\_\_\_\_ | | | | -------------------------- ---------------------------------------- | | -------------------------- | | *ANSWER: * False - Asymmetric | | | | *POINTS: * 1 | | | | *REFERENCES: * p\. 396\ | | H1: Cryptography Algorithms\ | | H2: Asymmetric Encryption | | | | *QUESTION TYPE: * Modified True / False | | | | *HAS VARIABLES: * False | | | | *STUDENT ENTRY MODE: * Basic | | | | *LEARNING OBJECTIVES: * POIS.WHMA.22.10.2 - Explain the basic pr | | inciples of cryptography | | | | *DATE CREATED: * 9/14/2016 10:46 AM | | | | *DATE MODIFIED: * 6/6/2021 4:00 PM | | -------------------------- ---------------------------------------- | | -------------------------- | +-----------------------------------------------------------------------+ +-----------------------------------------------------------------------+ | 42. Within a PKI, a(n) [registration] authority issues, | | manages, authenticates, signs, and revokes users' digital | | certificates, which typically contain the user name, public key, and | | other identifying information. \_\_\_\_\_ | | | | -------------------------- ---------------------------------------- | | ------------------------------------------------------- | | *ANSWER: * False - certificate | | | | *POINTS: * 1 | | | | *REFERENCES: * p\. 401\ | | H1: Cryptographic Tools\ | | H2: Public Key Infrastructure (PKI) | | | | *QUESTION TYPE: * Modified