You are tasked with selecting an asymmetric encryption method that allows for the same level of encryption strength, but with a lesser key length than is typically necessary. Which encryption method fulfills your requirements?

You are tasked with selecting an asymmetric encryption method that allows for the same level of encryption strength, but with a lesser key length than is typically necessary. Which encryption method fulfills your requirements?


a. Twofish
b. ECC
c. DHE
d. RSA


Answer: b. ECC

What is/are the characteristics of the hash function?

What is/are the characteristics of the hash function?


a. It must be one-way
b. Variable-length input produces fixed length output
c. The algorithm must have few or no collisions
d. All of the above


Answer: d. All of the above

Which algorithm is similar functionality to RSA but uses smaller key sizes to obtain the same level of security, It uses points on a curve combined with a point at infinity and the difficulty of solving discrete logarithm problems.

Which algorithm is similar functionality to RSA but uses smaller key sizes to obtain the same level of security, It uses points on a curve combined with a point at infinity and the difficulty of solving discrete logarithm problems.


a. RSA
b. Diffie-Hellman
c. Elliptic Curve Cryptography
d. ElGamal


Answer: c. Elliptic Curve Cryptography

What algorithm is used for exchanging keys over an insecure medium. Used primarily to send keys across public networks. The process isn't used to encrypt or decrypt messages but merely used for the creation of a symmetric key between two parties.

What algorithm is used for exchanging keys over an insecure medium. Used primarily to send keys across public networks. The process isn't used to encrypt or decrypt messages but merely used for the creation of a symmetric key between two parties.


a. RSA
b. Diffie-Hellman
c. Elliptic Curve Cryptography
d. ElGamal


Answer: b. Diffie-Hellman

What are the Asymmetric keys referred ?

What are the Asymmetric keys referred ?


a. Public key and Private key
b. PKI and PII
c. TCP and SSL


Answer: a. Public key and Private key

Which encryption standard use the Rijndael algorithm and supports key sizes of 128, 192, and 256 bits, with 128 bits being the default.

Which encryption standard use the Rijndael algorithm and supports key sizes of 128, 192, and 256 bits, with 128 bits being the default.


a. AES (Advanced Encryption Standard)
b. BES (Bit Encryption Standard)
c. 3DES (Triple-Data Encryption Standard)
d. DES (Data Encryption Standard)


Answer: a. AES (Advanced Encryption Standard)

What are the three areas modern cryptography is divided into?

What are the three areas modern cryptography is divided into?


a. Symmetric Cryptography
b. Asymmertic Cryptography
c. Bsymmertic Cryptography
d. Hashing Algorithms


Answer:

a. Symmetric Cryptography
b. Asymmetric Cryptography
d. Hashing Algorithms

What is the most common way of Steganography?

What is the most common way of Steganography?


a. Multi-Alphabet Substitution
b. Transportation Ciphers
c. Substitution Ciphers
d. Least significant bit (Isb)


Answer: d. Least significant bit (Isb)

Which cipher involves transporting or scrambling the letters in a certain manner. Typically, a message is broken into blocks of equal size, and each block is then scrambled.

Which cipher involves transporting or scrambling the letters in a certain manner. Typically, a message is broken into blocks of equal size, and each block is then scrambled.


a. Multi-Alphabet Substitution
b. Transportation Ciphers
c. Substitution Ciphers
d. Steganography


Answer: b. Transportation Ciphers

You've been instructed to suspend a key. Which of the following statements is true?

You've been instructed to suspend a key. Which of the following statements is true?


a. In order to be used, suspended keys must be revoked.
b. Suspended keys don't expire.
c. Suspended keys can be reactivated.
d. Suspending keys is a bad practice.


Answer: c. Suspended keys can be reactivated.

MAC is an acronym for what as it relates to cryptography?

MAC is an acronym for what as it relates to cryptography?


a. Media access control
b. Mandatory access control
c. Message authentication code
d. Multiple advisory committees


Answer: c. Message authentication code

Mary claims that she didn't make a phone call from her office to a competitor and tell them about developments at her company. Telephone logs, however, show that such a call was placed from her phone, and time clock records show that she was the only person working at the time. What do these records provide?

Mary claims that she didn't make a phone call from her office to a competitor and tell them about developments at her company. Telephone logs, however, show that such a call was placed from her phone, and time clock records show that she was the only person working at the time. What do these records provide?


a. Integrity
b. Confidentiality
c. Authentication
d. Nonrepudiation


Answer: d. Nonrepudiation