3.3 – Flashcard
25 test answers
Unlock all answers in this set
Unlock answers 25question
Which of the following can be classified as a "stream cipher"? Twofish Blowfish AES RC4
answer
RC4
Unlock the answer
question
Blowfish, Twofish, and AES are all _______ ciphers.
answer
block
Unlock the answer
question
You want to encrypt data on a removable storage device. Which encryption method would you choose to use the strongest method possible? AES 3DES SHA1 RSA
answer
AES
Unlock the answer
question
SHA1 is a _______algorithm, not an encryption algorithm
answer
hashing
Unlock the answer
question
Which of the following algorithms are used in symmetric encryption? (Select three.) ElGamal Blowfish DiffieHellman 3DES AES
answer
Blowfish 3DES AES
Unlock the answer
question
Which of the following are true of Triple DES (3DES)? (Select two.) Is used in IPSec Can easily be broken Uses a 168bit key Uses the Rijndael block cipher Uses 64bit blocks with 128bit keys
answer
Is used in IPSec Uses a 168bit key
Unlock the answer
question
Advanced Encryption Standard (AES) uses the_______ ___________ cipher
answer
Rijndael block
Unlock the answer
question
Which of the following are true concerning the Advanced Encryption Standard (AES) symmetric block cipher? (Select two.) AES uses a variablelength block and key length (128, 192, or 256bit keys). AES uses the Rijndael block cipher. AES uses up to 16 rounds of substitution and transposition. AES uses 8'128 bit keys in steps of 8 bits.
answer
AES uses a variablelength block and key length (128, 192, or 256bit keys). AES uses the Rijndael block cipher.
Unlock the answer
question
Which of the following symmetric block ciphers does not use a variable block length? International Data Encryption Algorithm (IDEA) Advanced Encryption Standard (AES) Elliptic Curve (EC) Ron's Cipher v5 (RC5)
answer
International Data Encryption Algorithm (IDEA)
Unlock the answer
question
Which of the following encryption mechanisms offers the least security because of weak keys? TwoFish AES DES IDEA
answer
DES (AES (128, 192, 256 bit keys), TwoFish (up to 256 bit keys), and IDEA (128 bit keys) all support stronger keys than that of DES. )
Unlock the answer
question
Which version of the Rivest Cipher is a block cipher that supports variable bit length keys and variable bit block sizes? RSA RC4 RC5 RC2
answer
RC5
Unlock the answer
question
He used 32 bit blocks, a 64 bit key, and he only used the selected key once. He moved the key onto a USB hard drive which was stored in a safety deposit box. Bob's notebook was stolen. Within a few days Bob discovered the contents of his encrypted file on the Internet. What is the primary reason why Bob's file was opened so quickly? Too small of a block size A birthday attack was used Weak key The decryption key was used to decrypt the files
answer
Weak key
Unlock the answer
question
You are concerned about the strength of your cryptographic keys, so you implement a system that does the following: The initial key is fed into the input of the bcrypt utility on a Linux workstation. The bcrypt utility produces an enhanced key that is 128 bits long. The resulting enhanced key is much more difficult to crack than the original key. Which kind of encryption mechanism was used in this scenario? Ephemeral keys Perfect forward secrecy Key stretching DHE Explanation
answer
Key stretching
Unlock the answer
question
Which of the following is considered an outofband distribution method for privatekey encryption? Copying the key to a USB drive Using a key distribution algorithm Sending a secured email Using a private fiber network
answer
Copying the key to a USB drive
Unlock the answer
question
_________ distribution involves manually distributing the key, such as copying the key to a USB drive and sending it to the other party.
answer
Outofband
Unlock the answer
question
_______ distribution can use a key distribution algorithm, such as DiffieHellman, to send the key to the recipient. It can also use asymmetric encryption technology to encrypt the key for distribution.
answer
In-band
Unlock the answer
question
Match the symmetric key distribution mechanism on the left with the appropriate description on the right. Each distribution mechanism may be used once, more than once, or not at all. The sender's key is sent to a recipient using a DiffieHellman key exchange. The sender's key is copied to a USB drive and handed to the recipient. The sender's key is sent to the recipient using publickey cryptography. The sender's key is burned to a CD and handed to the recipient.
answer
Inband distribution Outofband distribution Inband distribution Outofband distribution
Unlock the answer
question
some of the more commonly used hashing algorithms include SHA-1, MD5 and RIPEMD usually the-_____bit version
answer
160
Unlock the answer
question
Symmetric encryption is well suited for_______encryption of less sensitive data because it is less CPU-intensive than other encryption methods.
answer
bulk
Unlock the answer
question
common symmetric cyptography methods include-
answer
block rc 2, rc5 idea des 3des aes blowfish twofish stream rc4
Unlock the answer
question
_______________________embeds a symmetric key into a message before the message is hashed. When the message is received, the recipient's symmetric key is added back into the message before hashing the message.
answer
Keyed-hash Message Authentication Code (HMAC)
Unlock the answer