1. Unlike a Certification Authority (CA), a/an _____ does not issue certificates. A. Web of trust B.
1. Unlike a Certification Authority (CA), a/an _____ does not issue certificates.
A. Web of trust
B. Key escrow
C. Registration Authority (RA)
D. Public key
2. _____ contains the public key and information about the organization. It is used to send a request to the CA asking for an X.509 certificate.
A. CN
B. OCSP
C. CRL
D. CSR
3. _____ is a list of revoked certificates that contains the serial number and the revocation date of the revoked certificates.
A. CRL
B. OCSP
C. CER
D. CSR
4. _____ are never shared.
A. CAs
B. certificates
C. public keys
D. private keys
5. _____ issues certificates to end devices or users.
A. Root CA
B. DSA
C. Intermediate CA
D. Object identifiers
6. _____ is NOT another name for a certificate.
A. cipher certificate
B. identity certificate
C. digital certificate
D. public key certificate
7. The companies Comodo (Sectigo), IdenTrust, Symantec, GoDaddy, and GlobalSign are examples of _____.
A. private keys
B. certificates
C. public keys
D. CAs
8. Some larger Certification Authorities (CAs) may delegate the task of registering certificates to a/an _____.
A. Registration Authority (RA)
B. Public key
C. Key escrow
D. Web of trust
9. _____ is the process, procedures, and steps used to make sure digital certificates are up to date and stored securely.
A. CN
B. Key management
C. CRL
D. CSR
10. The root CA is often _____, so it is more difficult for hackers to gain access over a network to the CA.
A. pinned
B. stapled
C. an offline CA
D. an online CA
11. What is quantum communication?
A. cannot copy data in a quantum state without changing the data
B. the qubits can be in more than one state at the same time (zero and one)
C. the value of the qubits can depend on the value of other entangled qubits
D. digital communication using photos to send data over fiber-optic lines
12. _____ is an asymmetric encryption algorithm that is strong. It uses large prime numbers to calculate public and private keys.
A. SHA
B. ECC
C. RSA
D. AES
13. Which of the following is a strong, symmetric encryption algorithm that is in the public domain? It uses a key of 32 to 448 bits.
A. Blowfish
B. DES
C. PGP
D. AES
14. How do we support data integrity?
A. by using obfuscation
B. by using hashing
C. by using encryption
D. by salting passwords
15. How do we support integrity, authentication, and non-repudiation for a document?
A. by using encryption
B. by using digital signatures
C. by salting passwords
D. by using obfuscation
16. What is superposition?
A. cannot copy data in a quantum state without changing the data
B. the value of the qubits can depend on the value of other entangled qubits
C. the qubits can be in more than one state at the same time (zero and one)
D. digital communication using photos to send data over fiber-optic lines
17. What is superposition?
A. cannot copy data in a quantum state without changing the data
B. the value of the qubits can depend on the value of other entangled qubits
C. the qubits can be in more than one state at the same time (zero and one)
D. digital communication using photos to send data over fiber-optic lines
18. What are cryptographic functions using limited power and low-end CPU?
A. Lightweight cryptography
B. Quantum cryptography
C. Symmetric cryptography
D. Asymmetric cryptography
19. Bob uses a digital signature to make sure that Alice can verify that he sent the file. Bob encrypts the hash of a file with _____ and sends it to Alice with the file.
A. Bob's public key
B. Bob's private key
C. Alice's public-key
D. Alice's private key
20. _____ is a starting number used as input into a cryptographic algorithm. Ideally, this should be large, random or pseudorandom number that is never repeated.
A. Key
B. Salt
C. Message digest
D. IV
21. _____ encrypt each bit or byte of data in a continuous stream.
A. SHA
B. ECC
C. Stream ciphers
D. Block ciphers
22. _____ is hiding data within data.
A. nonce
B. steganography
C. digital signature
D. secret algorithm
23. In blockchain technology, what is a block also known as?
A. digital signature
B. key stretching
C. hash collision
D. record
24. What is unencrypted text that will be encrypted or that was decrypted?
A. Key
B. Plaintext
C. Ciphertext
D. Cleartext
25. What of the following is an example of a weak encryption algorithm?
A. AES
B. ECC
C. DH
D. DES
26. _____ keeps the data encrypted while processing the data.
A. Homomorphic encryption (HE)
B. Symmetric encryption
C. Asymmetric encryption
D. Advanced Encryption Standard (AES)
27. What is high resiliency?
A. hiding data in other data
B. even if the attacker gets part of the key, the encryption key is still secure
C. proves that data has not been changed
D. unauthorized people cannot access the data
28. _____ is a cipher mode used by many block ciphers. It combines the Galois mode of operation and a counter. It provides confidentiality and integrity.
A. GCM
B. CTR
C. ECB
D. CBC
29.
_____ is strong encryption software. It is used to encrypt, decrypt, and digitally sign emails using hashing, data compression, symmetric cryptography, and asymmetric cryptography.
A. PGP
B. ECC
C. RSA
D. DHE
30. A cipher uses a private key to convert plaintext into ciphertext. It is possible to convert this ciphertext back to the original plaintext by using the matching public key and the same cipher again. What type of algorithm is this?
A. symmetric encryption
B. key exchange
C. asymmetric encryption
D. hashing
31. What do DES, WEP, and SSL have in common?
A. they use public and private keys
B. they are weak algorithms
C. they output a message digest
D. they take more processing power than other cryptographic algorithms
32. What kind of cryptography should be used by low power devices?
A. asymmetric cryptography
B. secret algorithms
C. cryptography with large key sizes
D. elliptic curve cryptography
33. What is NOT provided by cipher suites?
A. Authorization
B. Authentication
C. Integrity
D. Confidentiality
34. Before storing a password, some random data is added to the password. A hash is taken of the password and the random data. The message digest is stored in a file. What is this an example of?
A. collision
B. integrity
C. obfuscation
D. salting
35. _____ is a way to generate public and private key pairs at random, so we cannot determine future key pairs from the current key pair.
A. key stretching
B. perfect forward secrecy (PFS)
C. salting
D. security through obscurity
36. Which of the following is the strongest key?
A. 24-bit key
B. 3,072-bit key
C. 128-bit key
D. 56-bit key
37. What is a distributed and decentralized public ledger?
A. digital signature
B. hash collision
C. cipher suite
D. blockchain
38. We want to use this kind of encryption for cloud computing, because the data is never decrypted, even when processing the data.
A. Hashing
B. Digital signatures
C. Homomorphic encryption (HE)
D. Diffie-Hellman (DH) key exchange
39. What is entanglement?
A. cannot copy data in a quantum state without changing the data
B. the value of the qubits can depend on the value of other entangled qubits
C. the qubits can be in more than one state at the same time (zero and one)
D. digital communication using photos to send data over fiber-optic lines
40. What kind of cryptography is often used by mobile devices?
A. elliptic curve
B. hashing
C. steganography
D. quantum
41. What is an algorithm that is used to encrypt the plaintext or decrypt the ciphertext?
A. Digital signature
B. Cryptography
C. Cleartext
D. Cipher
42. Weak keys can be made stronger through a process called _____.
A. authentication
B. security through obscurity
C. perfect forward secrecy (PFS)
D. key stretching
43. What is an example of a RADIUS Federation for higher education institutions?
A. EAP
B. eduroam
C. SSO
D. IEEE 802.1X
44. Which of the following wireless cryptographic protocols replaced WPA2?
A. EAP
B. WPA3
C. WPS
D. CCMP
45. A/an _____ shows the wireless signal strength at a particular point.
A. WiFi analyzer
B. Heat map
C. Stand-alone access point (AP)
D. Channel overlay
46. What does WPA3 use for the encryption algorithm?
A. RSA
B. ECC
C. DES
D. AES
47. To configure a/an _____ device, we press a button or enter an 8-digit PIN.
A. EAP
B. IEEE 802.1x server
C. Captive portal
D. WPS
48. Which of the following WPA/WPA2/WPA3 modes is the LEAST secure?
A. Enterprise mode
B. WPS
C. Personal mode
D. Open mode
49. Which of the following WPA/WPA2 modes does NOT authenticate the user, but does authorize the user?
A. Personal mode
B. WPS
C. Enterprise mode
D. Open mode
50. _____ is a network device that must be configured individually.
A. Stand-alone access point (AP)
B. Controller-based access point (AP)
C. Directional antenna
D. Omnidirectional (omni) antenna
Step by Step Solution
3.41 Rating (151 Votes )
There are 3 Steps involved in it
Step: 1
The detailed answer for the above question is provided below General Principles CryptographyThe science of securing information using mathematical algorithms and techniquesIt involves two main operati...See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started