Term
Select below the type of certificate that is often issued from a server to a client, with the purpose of ensuring the authenticity of the server:
|
|
Definition
|
|
Term
Which of the following key exchanges uses the same keys each time?
|
|
Definition
|
|
Term
The simplest type of stream cipher, one in which one letter or character is exchanged for another, is known as what?
|
|
Definition
|
|
Term
When two individuals trust each other because of the trust that exists between the individuals and a separate entity, what type of trust has been established?
|
|
Definition
|
|
Term
What type of certificate is typically used by an individual to secure e-mail transmissions?
|
|
Definition
|
|
Term
Which type of cryptographic algorithm takes an input string of any length, and returns a string of any requested variable length?
|
|
Definition
|
|
Term
Select below the term that is used to describe a trusted third-party agency that is responsible for issuing digital certificates:
|
|
Definition
|
|
Term
The Hashed Message Authentication Code (HMAC)
|
|
Definition
encrypts the key and the message
|
|
|
Term
|
Definition
|
|
Term
The original cryptographic algorithms for encrypting and decrypting documents are _________________ cryptographic algorithms. |
|
Definition
|
|
Term
The Data Encryption Standard is a(n) ______________ cipher. |
|
Definition
|
|
Term
Elliptic Curve Diffie-Hellman (ECDH) is an example of
|
|
Definition
|
|
Term
Select below the hashing algorithm that takes plaintext of any length and generates a digest 128 bits in length:
|
|
Definition
|
|
Term
What is the name of the cryptographic hash function that creates a digest of 512 bits, will not be subject to patents, has international recognition and has been adopted by standards organizations such as the ISO?
|
|
Definition
|
|
Term
What type of trust model has a single CA that acts as a facilitator to interconnect all other CAs?
|
|
Definition
|
|
Term
Which protection is provided by hashing?
|
|
Definition
|
|
Term
What cryptographic method, first proposed in the mid-1980s, makes use of sloping curves instead of large prime numbers?
|
|
Definition
|
|
Term
The SHA-1 hashing algorithm creates a digest that is how many bits in length?
|
|
Definition
|
|
Term
Which of the following would you use in order to ensure a secure cryptographic connection between a web browser and a web server?
|
|
Definition
Server digital certificate
|
|
|
Term
|
Definition
|
|
Term
A(n) _______________ trust model can be used in an organization where one CA is responsible for only the digital certificates for that organization. |
|
Definition
|
|
Term
_________________ may be defined as confidence in or reliance on another person or entity. |
|
Definition
|
|
Term
What is the block cipher algorithm that operates on 64-bit blocks and can have a key length from 32 to 448 bits known as?
|
|
Definition
|
|
Term
If using the MD5 hashing algorithm, what is the length to which each message is padded?
|
|
Definition
|
|
Term
|
Definition
|
|
Term
In information technology, ____________ is the process of proving that a user performed an action, such as sending an e-mail message or a specific document. |
|
Definition
|
|
Term
The Authentication Header (AH) protocol is a part of what encryption protocol suite below?
|
|
Definition
|
|
Term
The latest version of the Secure Hash Algorithm is
|
|
Definition
|
|
Term
The NTRUEncrypt cryptographic algorithm makes use of which of the following cryptographic techniques?
|
|
Definition
|
|
Term
|
Definition
|
|
Term
Key ______________ dates prevent an attacker who may have stolen a private key from being able to decrypt messages for an indefinite period of time. |
|
Definition
|
|
Term
Which protocol, developed by Netscape in 1994, is designed to create an encrypted data path between a client and server that could be used on any platform or operating system?
|
|
Definition
|
|
Term
Because of the limitations of a hierarchical trust model, what type of trust model is used for CAs on the Internet?
|
|
Definition
|
|
Term
What is the name of the open source asymmetric cryptography system that runs on Windows, UNIX and Linux systems and is compatible with PGP?
|
|
Definition
|
|
Term
A sensitive connection between a client and a web server uses what class of certificate?
|
|
Definition
|
|
Term
A key that is generated by a symmetric cryptographic algorithm is said to be a:
|
|
Definition
|
|
Term
Which of the following is used to enforce non-repudiation of an e-mail message?
|
|
Definition
|
|
Term
The asymmetric cryptography algorithm most commonly used is:
|
|
Definition
|
|
Term
A ________________ involves combining plaintext with a random key to create ciphertext that cannot be broken mathematically. |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
Public key infrastructure (PKI) ____________.
|
|
Definition
is the management of digital certificates |
|
|