How does rsa algorithm differ from data encryption standard

Assignment Help Computer Engineering
Reference no: EM131184947

1. Which operation is performed on text encrypted with Caesar cipher?
Conversion 0 Permutation
Transposition
Substitution

2. Which cryptographic standard were RC5, Blowfish, and CASTS based on?
DES
AES
3DES
RC2

3. Several IT consultants are discussing work factor as a criterion for selecting the cryptosystem of an application within a client organization Which phrase accurately defines work factor?
A comparison of symmetric key algorithms
The amount of time required to break a cryptographic key
The most effective authentication method for a given situation 0 The number of resources required to break a cryptography key

4. Which term describes a procedure that is used for encrypting information?
Work factor
Algorithm
Cryptotext
Decipher

5. How does entity authentication contribute to security?
It confirms the computer that received a message.
It verifies the identity of the sender of a message.
It determines the level of access a user has to the system.
It guarantees the timeliness and uniqueness of an item.

6. Peers decide to derive a cryptographic key from a book known to both parties. Which term describes the key type?
Running
Block
Permutation
Stream

7. Which type of cipher applies mathematical functions to fixed size collections of bits?
Substitution
Stream
Block
Concealment

8. Which statement best describes an SSL session?
It defines the content of messages exchanged between a client and a server.
It defines the sequence of messages exchanged between a client and server.
It specifies the security parameters that apply to an associated client and server.
It is a transient client/server transport that provides a negotiated type of service.

9. The SSL record protocol provides confidentiality and message integrity services.
Which other SSL protocol provides the keys the SSL record protocol uses for these purposes?
Change cipher spec protocol :1 Handshake protocol
Key exchange protocol
Alert protocol

10. At which layer of the 051 model do SSL and TLS run?
Application
Link
Transport
Network

11. A legacy application used by a small workgroup needs to have its network communications secured. Which protocol will require the least amount of effort to add security?
S/MIME
SSL
I Psec
Kerberos

12. Which of the following statements is accurate concerning digital signature?
It can be used as a signature system and a cryptosystem
It is the art of transferring handwritten signature to electronic media.
It is a method used to encrypt confidential data
It allows the recipient of data to prove the source and integrity of data.

13. A sales professional submits a contract to an inter-office cipher before sending it as an email attachment to an attorney in another branch office. Which security objective does the sales professional's action represent?
Reliability
Non-repudiation
Accountability
Confidentiality

14. An accountant is sending an email and wants to ensure non-repudiation. Which security mechanism should the accountant use?
One-way hash
Certificate authority
Digital signature
Authentication exchange

15. What is non-repudiation?
Proving a user performed a transaction that did not change
Proving a transaction has been authenticated
Proving a transaction did not change
Proving a user performed a transaction

16. An attacker executes a denial of service (DoS) attack against a government.
Which tenet of information security is this attacker compromising?
Confidentiality
Availability
Integrity
Authentication

17. Professor needs to send a short, confidential message to a student. Before transmitting the message, the professor's computer encrypts the message with the student's public key.
What is the purpose of this activity?
To ensure that onlythe professor has sent the message
To ensure that onlythe student can read the message
To ensure that the student received the message
To ensure that the professor has sent a secure message

18. A security engineer uses a digital certificate and Pretty Good Privacy (PGP) when sending an e-mail. What is the digital certificate used for?
Integrity of the message
Availability of the system
Non-repudiation of the sender
Confidentiality of the receiver

19. How does the RSA algorithm differ from the Data Encryption Standard (DES)?
RSA cannot produce a digital signature.
RSA uses a public key for encryption.
RSA is based on a symmetric algorithm.
RSA eliminates the need for a key-distribution center.

20. A cryptographer wants to encrypt a data file. She wants the cryptography method to be fast and difficult to break when a large key size is used. Using this method. the secret key is securely shared.
Which cryptographic mechanism should she use?
Digital hashing
Public key cryptography
Symmetric cryptography
One-time pad

21. An executive needs to send a secure e-mail to a client about a request for proposals,
Which cryptographic system will ensure that the executive's keys are secure?
Asymmetric encryption
Stream cipher
Symmetric encryption
Block cipher

22. DA developer is running a hash function against a new message to compare it to the old message. Which security principle is the developer verifying?
Non-repudiation
Confidentiality
Authenticity
Integrity

23. What are the properties of message authentication codes?
They are exchanged between two parties that share a secret key to authenticate information exchanged between those parties.
They are exchanged between two parties that share a public key to authenticate information exchanged between those parties.
They are substituted between two parties that share a secret key to authenticate information exchanged between those parties.
They are substituted between two parties that share a public key to authenticate information exchanged between those parties.

24. Which security principle is provided by a message authentication code, but is not provided by a message digest?
Availability
Integrity
Authenticity
Confidentiality

25. Which protocol is most commonly used to send messages between mail servers on the Internet?
SNMP
P0P3
MIME
SMTP

26. A diplomat wants to send a secure e-mail message to another diplomat about a potential terrorist attack. Which cryptosystem should be used to accomplish this goal?
Symmetric cryptosystem
Block cipher
Hash algorithm
PGP

27. A chief security officer is using communication based on interfaces between atoms and photons to establish a shared key between him and his chief executive officer. Which type of cryptography is being used?
Quantum cryptography
Block cryptography
Symmetric cryptography
Asymmetric cryptography

28. Quantum cryptography uses two separate channels to connect the sender and receiver. Is either channel secure enough to send information in clear text?
Yes. One channel carries the session key in clear text as photon pulses, and the other channel carries only ciphertext.
Yes. The clear text data stream is equally distributed over both channels.
No. One channel carries ciphertext encrypted by the recipient's public key, and the other channel carries message ciphertext encrypted by the session key.
No. Both channels carry encrypted message traffic. One link is chosen as the active link and the other channel acts as the standby.

29. A Pretty Good Privacy user chooses to distribute a public key to senders. What is the reason for this type of distribution?
To allow senders to encrypt information to the user
To allow senders to transmit keys confidentially
To allow receivers to share keys
To allow receivers to encrypt information from the user

30. A chief executive officer uses symmetric cryptography but is worried about the secret key getting into industrial spies' hands. Which cryptographic mechanism should this persons use?
Shared key cryptography
Single key cryptography
Symmetric encryption
Asymmetric encryption

31. An attacker is using a computer to attack an encrypted cipher text repeatedly until all keys are found. Which cryptographic attack does this scenario depict?
Brute force attack
Denial of service (DoS) attack
Birthday attack
Dictionary attack

32. An information technology analyst is worried about speed of encryption but not the protection of secret keys. Which cryptography method should the analyst use?
Symmetric encryption
Public key encryption
Pretty Good Privacy
Asymmetric encryption

33. A computer science student wants to use a weak encryption algorithm to do cryptanalysis and break the ciphers. Which encryption algorithm should the student use as a test case?
Advanced Encryption Standard
Data Encryption Standard
Skip Jack Algorithm
Triple Data Encryption Standard

34. Which cryptographic algorithm uses a 64-bit block cipher with the largest variable key size?
Blowfish
Advanced Encryption Standard
Triple Data Encryption Standard
RC2

35. Which encryption algorithm is considered slow in performance due to a large number of computational rounds?
Advanced Encryption Standard
Triple Data Encryption Standard
RC2
in Data Encryption Standard

36. Which authentication framework is used by WPA2?
Address Resolution Protocol (ARP)
Password Authentication Protocol (PAP)
Extensible Authentication Protocol (EAP)
Challenge-Handshake Authentication Protocol (CHAP)

37. What is the protocol for authentication in wireless security?
Extensible authentication protocol
Address resolution protocol
Wired equivalent protocol
Transport layer protocol

38. Which wireless encryption algorithm has the client extract the server's public key from the received certificate, thus generating a secret value, encrypting it with the public key, and sending it to the server?
SET
RSA
PGP
WEP

39. Why is identity-based encryption for wireless networks important?
It ensures the confidentiality of data.
It secures the integrity of data.
It prevents hackers from spoofing another user.
It allows for the availability of data.

40. A network administrator needs to choose an asymmetric key exchange algorithm but is worried about man-in-the-middle attacks.
Which algorithm contains that vulnerability?
RSA
Elliptical Curve
ElGamal
Diffie-Hell ma n

41. Which is not a symmetric block cipher?
0 AES
IDEA
DES
RSA

42. An engineer needs to determine how large a key must be in order for an algorithm to minimize the possibility of an item being brute-forced within a certain time. What can the algorithm/key size be called in this application?
Computationally secure
Conditionally secure
Minimally secure
Unconditionally secure

43. A cryptanalyst captures an encrypted block of data that is known to be a particular image, and wishes to attempt recovery of the key that sent the message. Which kind of attack does this scenario exemplify?
Chosen plaintext
Ciphertext only
Chosen text
Known plaintext

44. A researcher creates an encrypted block of data and decrypts it to retrieve the plaintext. The researcher hopes to use the information to uncover the secret key. What kind of attack is being performed?
Chosen text
Chosen ciphertext
Known ciphertext
Known plaintext

45. An attacker encrypts a known plain-text message with every possible key. while the equivalent ciphertext is decrypted using every possible key. exhausting all possible key combinations. Which kind of cryptographic attack is being used?
Man-in-the-middle
Birthday
Meet-in-the-middle
Timing

46. A hashing algorithm can be vulnerable to the birthday paradox principle if it demonstrates which attribute?
The algorithm produces many collisions.
It is easy to recover the prei mage.
The output is not a fixed size.
The algorithm uses a small encryption key.

47. A critical government information system requires that both the server and the user be authenticated to each other. Which type of identity system will fulfill the requirements?
Passwords
X.509 certificates
Tokens
Biometrics

48. A photography business wishes to only share images on their website with people who have paid for them. Which combined method meets this requirement?
Account Management and Provisioning
Accounting and Audit Logging
Authorization and Authentication
Provisioning and Accounting

49. A consultant needs to choose a hash algorithm to be used with a new application for a client, One of the requirements is that it must output a 160-bit message digest value. Which algorithm can you eliminate from consideration?
MD5
RIPEMD-160
HAVAL
SHA-1

50. Identify one of the five basic requirements for a cryptographic hash function, according to RSA Security?
The message digest must be 128 bits or smaller.
The output has a variable length.
The shorter the message digest, the more reliable its verification of integrity.
The hash function is collision free.

51. CBC-MAC and HMAC are used for message authentication control.
What differentiates them?
CBC-MAC provides data origin authentication; HMAC provides data origin authentication and data confidentiality.
CBC-MAC uses the last block of the message as the MAC value; HMAC uses a hash algorithm to generate a MAC.
CBC-MAC is a block cipher; HMAC is a stream cipher.
CBC-MAC uses a symmetric key: HMAC uses an asymmetric key.

52. Messages secured with a digital signature usually include a nonce or a timestamp to thwart which kind of attack?
Man-in-the-middle
Key-only attack
Forgery attack
Replay attack

53. What is an advantage of the Web of Trust?
Endorsing a new certificate
Flexibility
Start time of building trust
Centralized management

54. Password-Authenticated Key Exchange (PAKE) is a family of protocols that affords a reasonable level of security using short memorized passwords for protecting information over insecure channels. Two parties share a secret that is used to obtain a session key in which PAKE?
Exponential key exchange (EKE)
Secure remote password (SRP)
Encrypted key exchange (EKE)
Simplified password-authenticated exponential key exchange (SPEKE)

55. A network manager lowers the amount of time a session key is valid. Which statement is true about this procedure?
Network applications will run faster.
Network traffic will decrease correspondingly.
Fewer key exchanges will be needed.
The time period an attacker can launch an attack is minimized.

56. An end-user is trying to verify a certificate he has received from a partner company. His computer responds that the certificate is from an unknown certificate authority and that it cannot be verified. What does this response mean?
The encryption scheme used on the certificate is not supported.
The certificate is likely counterfeit.
The certificate was corrupted and should be reissued.
The user needs to acquire the issuing certificate authority's certificate.

57. A user who has recently married and changed her name has found that her X.509 certificate, which listed her maiden name, is now on a certificate revocation list. Which characteristic of certificates is the administrator who performed the revocation enforcing?
The certificate's private key must remain secret.
The name on certificates must match the user originators authentication. u The key length is incorrect due to the name change.
The user now has two active certificates.

58. What is an example activity the two administrators might undertake after creating the key?
Breaking the key into pieces amongst themselves
Creating a unique key for each administrator
Having all the administrators generate a backup key
Giving each administrator a copy of the key

59. A security administrator is considering using the current symmetric key shared between two parties to send a new key. What is the danger in doing so?
Sharing keys could cause a compromise.
Keys are at risk of being corrupted in transit.
If the current key is compromised, the future key will be too.
Changing keys generally leads to less security.

60. A security administrator generated extra keys that have gone unused. What should the administrator do with the keys?
Return them to the issuing authority
Destroy them
Use them when new keys are needed
Back them up

61. A software developer is creating a system that encrypts and sends large amounts of data between two systems. The systems each have X.509 certificates. How should the developer ensure the system is efficient?
By lowering the key size of each system
By creating digital signatures
By using the certificates to create a symmetric key 0 By extending the validity of the certificates

62. Two network administrators are trying to encrypt their new dedicated link to each other because a secure electronic channel is not available. What offline key distribution method is used to exchange keys?
Self-signed certificates
XKMS
Out-of-band exchange
PKI

Reference no: EM131184947

Questions Cloud

Offered some securities for sale to the public : In March 2012, Daniela Motor Financing (DMF), offered some securities for sale to the public. Under the terms of the deal, DMF promised to repay the owner of one of these securities $400 in March 2052, but investors would receive nothing until then. ..
Financial statements for Accor and NH Hotels comparable : Are the financial statements for Accor and NH Hotels comparable? What are the main differences in 4 accounting policies of the two Hotel Groups? how to find the present value of Accors operating lease payment.
Why has this skepticism remained so strong : Today, this skepticism remains and has changed little since the founding of the managerial class a century ago, and new laws concerning appropriate governance, such as Sarbanes-Oxley, continue to be introduced. Why has this skepticism remained so ..
What other factors besides size contribute to longevity : What other factors besides size contribute to longevity?
How does rsa algorithm differ from data encryption standard : How does the RSA algorithm differ from the Data Encryption Standard (DES)? A security engineer uses a digital certificate and Pretty Good Privacy (PGP) when sending an e-mail. What is the digital certificate used for?
Is it doomed to such a large cost disparity : What would be the average fixed costs if the cereal maker captured a 2 percent market share? What would be its cost disadvantage if it only achieved a 1 percent share? If, prior to entering the market, the firm contemplates achieving only a 1 perc..
Discuss how instructional design principles and theory : Discuss how instructional design principles and theory influence the ability to make informed decisions regarding the use of technology in support of learning and, especially, leadership. Use additional resources in addition to those provided with..
What are the potential diseconomies of scale : How can hypermarts fend off competition from web-based retailing?
How can learning firms ever hope to make a profit : Explain why learning reduces the effective marginal cost of production. If firms set prices in proportion to their marginal costs, as suggested by the Economics Primer, how can learning firms ever hope to make a profit?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Taskanswer the question below in an academically rigorous

taskanswer the question below in an academically rigorous manner using business report style with claims supported by

  Design a project to allow a student to access current grades

Design a project to allow a student to access current grades and/or create a "What-if" situation on a continuing basis to understand where they are at any given point in the semester. You will need to calculate multiple grades for exams, quizzes a..

  Question1 explain how a packet is encapsulated and

question1. explain how a packet is encapsulated and decapsulated as it moves from source to destination across a

  Find functions as well as the array addressing methods

Find functions as well as the array addressing methods, and the functions, operators, and control structures to create your own version of the max for a row array as input. This function will return two values:

  What is data distribution strategy

The corporation hires and fires store managers and control all information about store managers; store managers hire and fire all store employees and control all information about employees in store.

  Boolean expressions using four-variable maps

Simplify the subsequent Boolean expressions using four-variable maps - simplify the Boolean expression using the four-variable maps

  Distributed data processing

Explain how has the increasing availability of the inexpensive yet powerful personal computers and workstations generated an increasing trend towards distributed data processing (DDP).

  Apple inc is known for its state-of-the-art designs for

apple inc. is known for its state-of-the-art designs for products such as the iphone but most are unaware that apple

  System analysis and design

In the System Analysis and Design: Mixing Techniques – The question “Whether the structured techniques and object-oriented techniques can be mixed.

  Draw all of the different maximally oriented heaps

Draw all of the different maximally oriented heaps that can be made from the five keys A B C D E, then draw all of the different maximally oriented heaps that can be made from the five keys A A A B B.

  Write a class called "deck" with the traits

Write a class called "Card" with the following traits: it holds 2 private variables, a suit and a value (ace is high). It has public functions that randomly generate and build the suit, value and print out the suit/value to the screen. Write a suit..

  Questioninformation representationa security camera in an

questioninformation representationa security camera in an office building has 1000 x 1000 pixels. each pixel shows a

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd