Which of the following is the type of algorithm used by MD5?
a. Block cipher algorithm
b. Hashing algorithm
c. Asymmetric encryption algorithm
d. Cryptographic algorithm
Answer: B
Although the message digest (MD) series of algorithms is classified globally as a symmetric key encryption algorithm, the correct answer is hashing algorithm, which is the method that the algorithm uses to encrypt data. Answer A in incorrect because a block cipher divides the message into blocks of bits. Answer C is incorrect because MD5 is a symmetric key algorithm, not an asymmetric encryption algorithm (examples of this include RC6, Twofish, and Rijndael). Answer D is incorrect because cryptographic algorithm is a bogus term.
Learn More :
Cryptography Basics
- Which of the following best describes the process of encrypting and decrypting data using an asymmetric encryption algorithm?
- Which of the following algorithms is not an example of a symmetric encryption algorithm?
- Which authorization protocol is generally compatible with TACACS?
- What is the acronym for the de facto cryptographic message standards developed by RSA Laboratories?
- Which of the following is a hybrid cryptosystem?
- Which of the following is not one of the four main types of trust models used with PKI?
- Certificate revocation is the process of revoking a certificate before it:
- A Certificate Practice Statement (CPS) is a detailed statement the CA uses to issue certificates and ______ of the CA.
- The process of requiring interoperability is called:
- The most popular certificate used is version 3 of:
- The primary difference between an RA and _____ is that the latter can be used to identify or establish the identity of an individual.
- A registration authority (RA) can do all the following except:
- A certificate authority (CA) is an organization that is responsible for issuing, revoking, and distributing:
- PKI (Public Key Infrastructure) is a key-asymmetric system utilizing how many keys?
- A brainstorming session has been called. The moderator tells you to pull out a sheet of paper and write down your security concerns based on the technologies that your company uses. If your company uses public keys, what should you write as the primary security concern?
- Which of the following is similar to Blowfish but works on 128-bit blocks?
- Which set of specifications is designed to allow XML-based programs access to PKI services?
- The CRL takes time to be fully disseminated. Which protocol allows a certificate's authenticity to be immediately verified?
- After returning from a conference in Jamaica, your manager informs you that he has learned that law enforcement has the right, under subpoena, to conduct investigations using keys. He wants you to implement measures to make such an event run smoothly should it ever happen. What is the process of storing keys for use by law enforcement called?
- What document describes how a CA issues certificates and what they are used for?
- Kristin, from Payroll, has left the office on maternity leave and won't return for at least six weeks. You've been instructed to suspend her key. Which of the following statements is true?
- Which organization can be used to identify an individual for certificate issue in a PKI environment?
- Due to a breach, a certificate must be permanently revoked, and you don't want it to ever be used again. What is often used to revoke a certificate?
- What is the primary organization for maintaining certificates called?