














Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
Introduction to Cryptography - D334 Questions with Solutions
Typology: Exams
1 / 22
This page cannot be seen from the preview
Don't miss anything!
combined with the plaintext message to produce the ciphertext to see how long the key goes before it starts to repeat? A Linear cryptanalysis B Frequency analysis C Algebraic attacks D Keystream analysis: Keystream analysis
and the ciphertext at the same time. Which type of attack is the intruder using? A Frequency analysis B Linear cryptanalysis C Differential cryptanalysis D Double DES attack: Double DES attack
validating and approving encryption devices for deployment? A FIPS 199 B SP 800- 53 C FISMA
case of a loss, someone who finds the laptop cannot easily bypass the operating system access controls by placing the hard drive in another computer system. Which encryption method can the company use for this scenario? A Self-encrypting drive B File encryption C Trusted Platform Module D Full disk encryption: Full disk encryption
to do an online banking transaction. How can this customer make sure the bank is authentic and someone else is not pretending to be the bank? A Choosing a symmetric session key B Sending a Client Hello C Receiving a Server Hello D Verifying that the public key belongs to the bank through the bank's digital- : Verifying that the public key belongs to the bank through the bank's digital
transported back and forth is almost always the same. This makes the transaction very susceptible to attacks. How can a bank customer make sure that each banking session
A Gas B Hyperledger C Block mining D Smart contracts: Smart contracts
transaction defines the number of bitcoins to be transferred to the receiver with the receiver's public key ID? A The IN part of the transaction B The LOG part of the transaction C The PROOF OF WORK part of the transaction D The OUT part of the transaction: The OUT part of the transaction
added to the cryptocurrency blockchain. Which technique can the miner use to mine the block? A Chain linking B Record of transaction C Smart contracts D Proof of work: Proof of work
transaction or execute a contract on the Ethereum blockchain? A Proof of work
B Hyperledger C Record of transaction D Gas: Gas
standards can the network device use to authenticate the client? A WPA- 2 B WEP C WPA D LEAP: LEAP
secure communications to the government for an ongoing investigation. Which cryptographic backdoor will allow only the government agents to crack the encryption, but no one else? A RSA cracking B Encryption by default C Key escrow D NOBUS backdoor: NOBUS backdoor
transaction. How can the customer verify that the bank's digital certificate is trustworthy and has not been canceled by the issuing certificate authority (CA)? A Submit a request to the certification a uthority
ciphertext to decode the original message. How can the developer make sure that the ciphertext does not give the original plaintext if played back? A Use shift row transformation B Use electronic code book C Use RC5 cipher D Add salt with an initialization vector: Add salt with an initialization vector
plaintext message? A Vigenère cipher B BIFID cipher C Pigpen cipher D Caesar cipher: Vigenère cipher
A Sir Francis Bacon and Alan Turin B Will Friedman and Ron Rivest C Whitfield Diffie and Martin Hellman D Thomas Jefferson and Blaise de Vigenère: Whitfield Diffie and Martin Hellman
the crypto device and wants to run plaintexts through the device to see how its encryption process works. What method is the attacker using to break the message? A Known plaintext attack B Man-in-the-middle attack C Ciphertext-only attack D Chosen attack: Chosen attack
key and has over 17 rounds with a complicated mangler function? A Blowfish B RC C Skipjack D International Data Encryption Algorithm (IDEA): International Data Encryption Algorithm (IDEA)
in an attempt to break passwords? A Known plaintext attack B Rainbow table attack
D Hash-based message authentication code (HMAC): Hash-based message authentication code (HMAC)
manufacturer. Which cryptographic algorithm can the developer use to trust that the software truly came from the vendor and that the patch has not been altered or manipulated? A Public-key algorithm B Secret-key algorithm C Hashing function D Digital signature algorithms: Digital signature algorithms
(PKI) to define the format of public-key certificates? A FIPS 199 B Digital Signature Standard (DSS) C FIPS 140- 2 D X.509 standard: X.509 standard
cipher that reorders the plaintext characters to create the ciphertext. Which cipher meets this requirement? A Playfair cipher B Transposition cipher
C Shift cipher D Substitution cipher: Transposition cipher
encrypt the data in such a way that the cipher method encrypts the individual bits. Which cipher method can the developer use to meet this requirement? A Key entropy B Cipher block chaining C Block cipher D Stream cipher: Stream cipher
generating a hash value for the message. The developer is also afraid that a third party might be able to reverse the derived cipher back to the original message. Which attack method is commonly used to map the hashed values back to the original message? A Man-in-the-middle attack B Dictionary attack C Brute-force attack D Rainbow table attack: Rainbow table attack
are both requirements. The developer wants to use a cipher method that can operate on the data stream to encrypt the individual bit of the message one by one. Which encryption method meets these requirements?
password each time based on an initial seed value? A HMAC B One-time passwords (OTP) C Salting D LM hashing: One-time passwords (OTP)
intruder to determine the password. Which method is used in Microsoft Windows to store users' hashed passwords for computers that connect to an Active Directory domain? A Bcrypt B SYSKEY
C NTLMv D LM: NTLMv
A Secret-key protection and identity checking B Secret and public-key protection C Data encryption and identity checking D Data encryption and public-key protection: Secret-key protection and identity checking
and uses a system administrator's email address to generate the public key. Which encryption method is a developer using in this process? A Elliptic-curve cryptography B Knapsack encryption C Homomorphic encryption D Identity-based encryption: Identity-based encryption
exchange are not compromised even if the server's long-term encryption key is compromised? A Elliptic-curve ciphers B Perfect Forward Secrecy
C Certificate authority D Digital certificate: PKI
A Integrity, non-repudiation, and proof of origin B Non-repudiation, integrity, and confidentiality C Proof of origin, confidentiality, and non-repudiation D Confidentiality, integrity, and proof of origin: Integrity, non-repudiation, and proof of origin
signatures based on the U.S. Digital Signature Standards? A SHA-2 and AES B SHA-1 and AES C AES and RSA D SHA-2 and RSA: SHA-2 and RSA
A Session key method B Symmetric key method C Hashing method D Asymmetric key method: Symmetric key method
RSA key exchange in HTTPS connections? A Neither the server nor the client B The client C The server and the client D The server: The server
key that law enforcement agents could use if they require access to the data? A Key escrow B Encryption by default C RSA cracking D NOBUS backdoor: Key escrow
message into the network at some future time? A Time attack B Cut-and-paste C Chosen-ciphertext D Replay system: Replay system
the crypto device, the attacker first runs a plaintext through the device to see how its encryption process works. Then the intruder alters the plaintext to see how the alteration affects the ciphertext that is being generated. What attack method is the
proof of work when calculating the block address needed to add a block to a blockchain? A Hyperledger B Smart contracts
C Block address D Block mining: Block mining
A Bitcoin and Ethereum B Hyperledger and smart contracts C Ethereum and cryptocurrency D Block address E Hyperledger and Ethereum: Hyperledger and Ethereum
A Chain Block Ciphers (CBC), 512-bit private key, 256-bit public key B Elliptic curve ciphers (ECC), 512-bit private key, 256-bit public key C Chain Block Ciphers (CBC), 256-bit private key, 512-bit public key D Elliptic curve ciphers (ECC), 256-bit private key, 512-bit public key: Elliptic curve ciphers (ECC), 256-bit private key, 512-bit public key
transaction involves the Bitcoin receiver sending their public key to the sender, and the sender then uses their private key to create a signature for the transaction, and also adds a public key?