Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1. Unlike a Certification Authority (CA), a/an _____ does not issue certificates. A. Web of trust B.

1.  Unlike a Certification Authority (CA), a/an _____ does not issue certificates.
    A.     Web of trust
    B.     Key escrow
    C.     Registration Authority (RA)
    D.     Public key

2.  _____ contains the public key and information about the organization. It is used to send a request to the CA asking for an X.509 certificate.
    A.     CN
    B.     OCSP
    C.     CRL
    D.     CSR

3.  _____ is a list of revoked certificates that contains the serial number and the revocation date of the revoked certificates.
    A.     CRL
    B.     OCSP
    C.     CER
    D.     CSR

4.  _____ are never shared.
    A.     CAs
    B.     certificates
    C.     public keys
    D.     private keys

 5. _____ issues certificates to end devices or users.
    A.     Root CA
    B.     DSA
    C.     Intermediate CA
    D.     Object identifiers

6.  _____ is NOT another name for a certificate.
    A.     cipher certificate
    B.     identity certificate
    C.     digital certificate
    D.     public key certificate

7.  The companies Comodo (Sectigo), IdenTrust, Symantec, GoDaddy, and GlobalSign are examples of _____.
    A.     private keys
    B.     certificates
    C.     public keys
    D.     CAs

8.  Some larger Certification Authorities (CAs) may delegate the task of registering certificates to a/an _____.
    A.     Registration Authority (RA)
    B.     Public key
    C.     Key escrow
    D.     Web of trust

9.  _____ is the process, procedures, and steps used to make sure digital certificates are up to date and stored securely.
    A.     CN
    B.     Key management
    C.     CRL
    D.     CSR

10. The root CA is often _____, so it is more difficult for hackers to gain access over a network to the CA.
    A.     pinned
    B.     stapled
    C.     an offline CA
    D.     an online CA

11.  What is quantum communication?
    A.     cannot copy data in a quantum state without changing the data
    B.     the qubits can be in more than one state at the same time (zero and one)
    C.     the value of the qubits can depend on the value of other entangled qubits
    D.     digital communication using photos to send data over fiber-optic lines

12.  _____ is an asymmetric encryption algorithm that is strong. It uses large prime numbers to calculate public and private keys.
    A.     SHA
    B.     ECC
    C.     RSA
    D.     AES

13.  Which of the following is a strong, symmetric encryption algorithm that is in the public domain? It uses a key of 32 to 448 bits.
    A.     Blowfish
    B.     DES
    C.     PGP
    D.     AES

14.  How do we support data integrity?
    A.     by using obfuscation
    B.     by using hashing
    C.     by using encryption
    D.     by salting passwords

15.  How do we support integrity, authentication, and non-repudiation for a document?
    A.     by using encryption
    B.     by using digital signatures
    C.     by salting passwords
    D.     by using obfuscation

16.  What is superposition?
    A.     cannot copy data in a quantum state without changing the data
    B.     the value of the qubits can depend on the value of other entangled qubits
    C.     the qubits can be in more than one state at the same time (zero and one)
    D.     digital communication using photos to send data over fiber-optic lines

 17. What is superposition?
    A.     cannot copy data in a quantum state without changing the data
    B.     the value of the qubits can depend on the value of other entangled qubits
    C.     the qubits can be in more than one state at the same time (zero and one)
    D.     digital communication using photos to send data over fiber-optic lines

18.  What are cryptographic functions using limited power and low-end CPU?
    A.     Lightweight cryptography
    B.     Quantum cryptography
    C.     Symmetric cryptography
    D.     Asymmetric cryptography

19.  Bob uses a digital signature to make sure that Alice can verify that he sent the file. Bob encrypts the hash of a file with _____ and sends it to Alice with the file.
    A.     Bob's public key
    B.     Bob's private key
    C.     Alice's public-key
    D.     Alice's private key

20.  _____ is a starting number used as input into a cryptographic algorithm. Ideally, this should be large, random or pseudorandom number that is never repeated.
    A.     Key
    B.     Salt
    C.     Message digest
    D.     IV

21.  _____ encrypt each bit or byte of data in a continuous stream.
    A.     SHA
    B.     ECC
    C.     Stream ciphers
    D.     Block ciphers

22.  _____ is hiding data within data.
    A.     nonce
    B.     steganography
    C.     digital signature
    D.     secret algorithm

23.  In blockchain technology, what is a block also known as?
    A.     digital signature
    B.     key stretching
    C.     hash collision
    D.     record

24.  What is unencrypted text that will be encrypted or that was decrypted?
    A.     Key
    B.     Plaintext
    C.     Ciphertext
    D.     Cleartext

25.  What of the following is an example of a weak encryption algorithm?
    A.     AES
    B.     ECC
    C.     DH
    D.     DES

26.  _____ keeps the data encrypted while processing the data.
    A.     Homomorphic encryption (HE)
    B.     Symmetric encryption
    C.     Asymmetric encryption
    D.     Advanced Encryption Standard (AES)

27.  What is high resiliency?
    A.     hiding data in other data
    B.     even if the attacker gets part of the key, the encryption key is still secure
    C.     proves that data has not been changed
    D.     unauthorized people cannot access the data

28.  _____ is a cipher mode used by many block ciphers. It combines the Galois mode of operation and a counter. It provides confidentiality and integrity.
    A.     GCM
    B.     CTR
    C.     ECB
    D.     CBC

29.

_____ is strong encryption software. It is used to encrypt, decrypt, and digitally sign emails using hashing, data compression, symmetric cryptography, and asymmetric cryptography.
    A.     PGP
    B.     ECC
    C.     RSA
    D.     DHE

30.  A cipher uses a private key to convert plaintext into ciphertext. It is possible to convert this ciphertext back to the original plaintext by using the matching public key and the same cipher again. What type of algorithm is this?
    A.     symmetric encryption
    B.     key exchange
    C.     asymmetric encryption
    D.     hashing

31.  What do DES, WEP, and SSL have in common?
    A.     they use public and private keys
    B.     they are weak algorithms
    C.     they output a message digest
    D.     they take more processing power than other cryptographic algorithms

32.  What kind of cryptography should be used by low power devices?
    A.     asymmetric cryptography
    B.     secret algorithms
    C.     cryptography with large key sizes
    D.     elliptic curve cryptography

33.  What is NOT provided by cipher suites?
    A.     Authorization
    B.     Authentication
    C.     Integrity
    D.     Confidentiality

34.  Before storing a password, some random data is added to the password. A hash is taken of the password and the random data. The message digest is stored in a file. What is this an example of?
    A.     collision
    B.     integrity
    C.     obfuscation
    D.     salting

35.  _____ is a way to generate public and private key pairs at random, so we cannot determine future key pairs from the current key pair.
    A.     key stretching
    B.     perfect forward secrecy (PFS)
    C.     salting
    D.     security through obscurity

36.  Which of the following is the strongest key?
    A.     24-bit key
    B.     3,072-bit key
    C.     128-bit key
    D.     56-bit key

37.  What is a distributed and decentralized public ledger?
    A.     digital signature
    B.     hash collision
    C.     cipher suite
    D.     blockchain

38.  We want to use this kind of encryption for cloud computing, because the data is never decrypted, even when processing the data.
    A.     Hashing
    B.     Digital signatures
    C.     Homomorphic encryption (HE)
    D.     Diffie-Hellman (DH) key exchange

39.  What is entanglement?
    A.     cannot copy data in a quantum state without changing the data
    B.     the value of the qubits can depend on the value of other entangled qubits
    C.     the qubits can be in more than one state at the same time (zero and one)
    D.     digital communication using photos to send data over fiber-optic lines

40.  What kind of cryptography is often used by mobile devices?
    A.     elliptic curve
    B.     hashing
    C.     steganography
    D.     quantum

41.  What is an algorithm that is used to encrypt the plaintext or decrypt the ciphertext?
    A.     Digital signature
    B.     Cryptography
    C.     Cleartext
    D.     Cipher

42.  Weak keys can be made stronger through a process called _____.
    A.     authentication
    B.     security through obscurity
    C.     perfect forward secrecy (PFS)
    D.     key stretching

43.  What is an example of a RADIUS Federation for higher education institutions?
    A.     EAP
    B.     eduroam
    C.     SSO
    D.     IEEE 802.1X

44.  Which of the following wireless cryptographic protocols replaced WPA2?
    A.     EAP
    B.     WPA3
    C.     WPS
    D.     CCMP

45.  A/an _____ shows the wireless signal strength at a particular point.
    A.     WiFi analyzer
    B.     Heat map
    C.     Stand-alone access point (AP)
    D.     Channel overlay

46.  What does WPA3 use for the encryption algorithm?
    A.     RSA
    B.     ECC
    C.     DES
    D.     AES

47.  To configure a/an _____ device, we press a button or enter an 8-digit PIN.
    A.     EAP
    B.     IEEE 802.1x server
    C.     Captive portal
    D.     WPS

48.  Which of the following WPA/WPA2/WPA3 modes is the LEAST secure?
    A.     Enterprise mode
    B.     WPS
    C.     Personal mode
    D.     Open mode

49.  Which of the following WPA/WPA2 modes does NOT authenticate the user, but does authorize the user?
    A.     Personal mode
    B.     WPS
    C.     Enterprise mode
    D.     Open mode

50.  _____ is a network device that must be configured individually.
    A.     Stand-alone access point (AP)
    B.     Controller-based access point (AP)
    C.     Directional antenna
    D.     Omnidirectional (omni) antenna

Step by Step Solution

3.41 Rating (151 Votes )

There are 3 Steps involved in it

Step: 1

The detailed answer for the above question is provided below General Principles CryptographyThe science of securing information using mathematical algorithms and techniquesIt involves two main operati... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Income Tax Fundamentals 2013

Authors: Gerald E. Whittenburg, Martha Altus Buller, Steven L Gill

31st Edition

1111972516, 978-1285586618, 1285586611, 978-1285613109, 978-1111972516

More Books

Students also viewed these Programming questions

Question

What-if anything-would you say to your other students?

Answered: 1 week ago