You are tasked with selecting an asymmetric encryption method that allows for the same level of encryption strength, but with a lesser key length than is typically necessary. Which encryption method fulfills your requirements?
What is the working group formed by the IETF to develop standards and models for the PKI environment?
a. Public-Key infrastructure X.509 (PKIX)
b. Public-Key Cryptography Standards (PKCS)
c. Public-Key and Private Key (PPK)
d. Public -Key Infrastructure and Systems (PKIS)
What algorithm was designed to ensure the integrity of a message and is a one-way hash that provides a has value that can be used with an encryption protocol. This algorithm produces a 160-bit hash value.
Which algorithm is similar functionality to RSA but uses smaller key sizes to obtain the same level of security, It uses points on a curve combined with a point at infinity and the difficulty of solving discrete logarithm problems.
a. RSA
b. Diffie-Hellman
c. Elliptic Curve Cryptography
d. ElGamal
What algorithm is used for exchanging keys over an insecure medium. Used primarily to send keys across public networks. The process isn't used to encrypt or decrypt messages but merely used for the creation of a symmetric key between two parties.
a. RSA
b. Diffie-Hellman
c. Elliptic Curve Cryptography
d. ElGamal
What algorithm is an early public-key encryption system that uses large integers as the basis for the process. It works with both encryption and digital signatures.
a. RSA
b. Diffie-Hellman
c. Elliptic Curve Cryptography
d. ElGamal
Which algorithm use 128-bit key and is similar in speed and capability to DES but is more secure. It is used in Pretty Good Privacy (PGP) a public domain encryption system.
a. IDEA
b. Blowfish
c. One-Time Pads
d. Twofish
Answer: a. IDEA (International Data Encryption Algorithm)
Which encryption system performs a 64-bit block cipher at very fast speeds. It is a symmetric block cipher that can use variable-length keys (32 bits - 448 bits)
Which cipher involves transporting or scrambling the letters in a certain manner. Typically, a message is broken into blocks of equal size, and each block is then scrambled.
a. Multi-Alphabet Substitution
b. Transportation Ciphers
c. Substitution Ciphers
d. Steganography
Which process allows all users and interested parties to comment on proposed standards for the internet. The editor manages the process and is responsible for cataloging, updating, and tracking?
You've been instructed to suspend a key. Which of the following statements is true?
a. In order to be used, suspended keys must be revoked.
b. Suspended keys don't expire.
c. Suspended keys can be reactivated.
d. Suspending keys is a bad practice.
Mary claims that she didn't make a phone call from her office to a competitor and tell them about developments at her company. Telephone logs, however, show that such a call was placed from her phone, and time clock records show that she was the only person working at the time. What do these records provide?
a. Integrity
b. Confidentiality
c. Authentication
d. Nonrepudiation
Which government agency should you mention is primarily responsible for establishing government standards involving cryptography for general-purpose government use?
a. NSA
b. NIST
c. IEEE
d. ITY
Answer: b. NIST (National Institute of Standards and Technology )