encrypt and decrypt messages? -
answersSymmetric
Which algorithm is designated as a Type 2 product
by the National Security Agency (NSA)? -
answersSkipjack
What is the most commonly used format for
certificates? - answersX.509 v3
What is referenced to determine if a certificate has
been revoked? - answersCertificate revocation list
(CRL)
What needs to be installed on end users' computers
to allow them to trust applications that have been
digitally signed by the developer? - answersSender's
public key
,Which type of certificate must be certified by an
authority to verify it with other participants? -
answersPublic Certificate
What is an attribute of the Rivest Cipher 4 (RC4)
algorithm? - answersIt requires a unique nonce.
Which mode generates the key stream with a nonce
and incrementing value? - answersCounter (CTR)
Which mode is a stream algorithm that concatenates
an incrementing value with a nonce? -
answersCounter (CTR)
Which key would an administrator use to encrypt
data so only the CEO can decrypt it? -
answersCEO's public key
What is the result of a hash function? -
answersDigest
What is used to efficiently encrypt large files? -
answersSymmetric encryption
An administrator needs to encrypt the following word
with the Atbash cipher: security What is the correct
ciphertext? - answershvxfirgb
Which cryptographic algorithm has a 128-bit hash
size? - answersMessage Digest Algorithm 5 (MD5)
Which characteristic makes a hashing function
suitable for use in signature schemes? -
answersCollision resistance
Which attribute of a hashing function makes a
birthday attack possible? - answersPartial-message
collision
, Which hash algorithm produces a 160-bit output
value? - answersSHA-1
What does cipher block chaining (CBC) use with the
key to encrypt subsequent blocks of plaintext? -
answersPrevious generated ciphertext
Which mode produces the same ciphertext from two
identical plaintext blocks? - answersElectronic
codebook (ECB)
Which encryption mode is least secure? -
answersElectronic codebook (ECB)
What is the mathematical formula used for
symmetric decryption? - answersP = E (K,C)
Which algorithm relies on factoring the product of
large prime numbers? - answersRivest-Shamir-
Adleman
Which encryption technology is a serial combination
of hashing, data compression, symmetric-key
cryptography, and public key infrastructure (PKI) and
can be used for encrypting texts, emails, files, and
directories or for full disk encryption? -
answersPretty Good Privacy (PGP)
Which concept stipulates that algorithms should be
openly shared and scrutinized, but keys must be
absolutely secured? - answersKerckhoffs's principle
Which encryption process minimizes known plaintext
attacks against Advanced Encryption Standard
(AES)? - answersRandomizing the initialization
vector