Question: Answer all for a thumbs up! QUESTION 1 A person demonstrates anonymity when posting information to a web discussion site without authorities knowing who he







Answer all for a thumbs up!
QUESTION 1 A person demonstrates anonymity when posting information to a web discussion site without authorities knowing who he or she is. True False QUESTION 2 The term certificate authority (CA) refers to a trusted repository of all public keys. True False QUESTION 3 Product cipher is an encryption algorithm that has no corresponding decryption algorithm. True False QUESTION 4 A substitution cipher replaces bits, characters, or blocks of information with other bits, characters, or blocks. True False QUESTION 5 The hash message authentication code (HMAC) is a hash function that uses a key to create a hash, or message digest. True False QUESTION 6 The financial industry created the ANSI X9.17 standard to define key management procedures. O True False QUESTION 7 Digital signatures require asymmetric key cryptography. True False QUESTION 8 The Diffie-Hellman (DHE) algorithm is the basis for several common key exchange protocols, including Diffie-Hellman in Ephemeral mode (DHE) and Elliptic Curve DHE (ECDHE). True False QUESTION 9 Message authentication confirms the identity of the person who started a correspondence. True False QUESTION 10 An algorithm is a repeatable process that produces the same result when it receives the same input. O True False QUESTION 11 What is the only unbreakable cipher when it is used properly? Rivest-Shamir-Adelman (RSA) Vernam Elliptic Curve Diffie-Hellman in Ephemeral mode (ECDHE) Blowfish QUESTION 12 Betty receives a cipher text message from her colleague Tim. What type of function does Betty need to use to read the plaintext message? Encryption Hashing Decryption Validation QUESTION 13 Which cryptographic attack offers cryptanalysts the most information about how an encryption algorithm works? Chosen plaintext Ciphertext only Known plaintext Chosen ciphertext QUESTION 14 What is NOT a symmetric encryption algorithm? Rivest-Shamir-Adelman (RSA) Data Encryption Standard (DES) International Data Encryption Algorithm (IDEA) Carlisle Adams Stafford Tavares (CAST) QUESTION 15 Which type of cipher works by rearranging the characters in a message? Substitution Steganographic Transposition Asymmetric QUESTION 16 Which information security objective allows trusted entities to endorse information? Validation Authorization Certification Witnessing QUESTION 17 What standard is NOT secure and should never be used on modern wireless networks? Wired Equivalent Privacy (WEP) Wi-Fi Protected Access (WPA) Wi-Fi Protected Access version 2 (WPA2) 802.11ac QUESTION 18 Alice would like to send a message to Bob securely and wishes to encrypt the contents of the message. What key does she use to encrypt this message? Alice's public key Alice's private key Bob's public key Bob's private key QUESTION 19 Alice would like to send a message to Bob using a digital signature. What cryptographic key does Alice use to create the digital signature? Alice's public key Alice's private key Bob's public key Bob's private key QUESTION 20 What is NOT a valid encryption key length for use with the Blowfish algorithm? 32 bits 64 bits 256 bits 512 bits
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
