Loading provider exams...
Sign Up & unlock 100% of Exam Questions
No Strings Attached!
Updated
Tom is explaining historical cryptography to a class of security students. Which of the following ciphers is a subset of the Vigenère cipher?
What is a variation of DES that uses a technique called Key Whitening?
In order to understand RSA, you must understand the key generation algorithm as well as the encryption and decryption algorithms. Which one of the following equations describes the encryption process for RSA?
In a __________________, the attacker discovers a functionally equivalent algorithm for encryption and decryption but without learning the key.
John works as a cryptography consultant. He finds that people often misunderstand the reality of breaking a cipher. What is the definition of breaking a cipher?
Want a break from the ads?
Become a Supporter and enjoy a completely ad-free experience, plus unlock Learn Mode, Exam Mode, AstroTutor AI, and more.
Which one of the following is an algorithm that uses variable-length key from 1 to 256 bytes, which constitutes a state table that is used for subsequent generation of pseudorandom bytes and then a pseudorandom string of bits, which is XORed with the plaintext to produce the ciphertext?
Which one of the following uses three different keys, all of the same size?
Modern symmetric ciphers all make use of one or more s-boxes. Both Feistel and non-Feistel ciphers use these s-boxes. What is an s-box?
What best describes the shifting of each letter a fixed number of spaces to the left or right?
Ahlen is using a set of pre-calculated hashes to attempt to derive the passwords from a Windows SAM file. What is a set of pre-calculated hashes used to derive a hashed password called?
You are studying classic ciphers. You have been examining the difference between single substitution and multi-substitution. Which one of the following is an example of a multi-alphabet cipher?
Which one of the following wireless standards uses AES using the Counter Mode-Cipher Block Chaining (CBC)-Message Authentication Code (MAC) Protocol (CCMP)?
Jane is looking for an algorithm to ensure message integrity. Which of the following would be an acceptable choice?
Denis is looking at an older system that uses DES encryption. A colleague has told him that DES is insecure due to its short key size. What is the key length used for DES?
You have been tasked with selecting a digital certificate standard for your company to use. Which one of the following is an international standard for the format and information contained in a digital certificate?
John is trying to explain the basics of cryptography to a group of novice security students. Which one of the following most accurately defines encryption?
In steganography, ______ is the data to be covertly communicated (in other words, it is the message you wish to hide.)
Juanita is attempting to hide some text into a jpeg file. Hiding messages inside another medium is referred to as which one of the following?
Sheryl is explaining PKI to a group of non-technical executives. She first wants to identify the specific components of PKI. Which one of the following is a component of the PKI?
Terrance oversees the key escrow server for his company. All employees use asymmetric cryptography to encrypt all emails. How many keys are needed for asymmetric cryptography?
Which one of the following is an example of a symmetric key algorithm?
What is the name of the attack where the attacker obtains the ciphertexts corresponding to a set of plaintexts of his own choosing?
You are trying to find a modern method for security web traffic for use in your company’s e-commerce web site. Which one of the following is used to encrypt web pages and uses bilateral authentication?
Which one of the following terms describes two numbers that have no common factors?
Collision resistance is an important property for any hashing algorithm. Joan wants to find a cryptographic hash that has strong collision resistance. Which one of the following is the most collision-resistant?