TestOut Quiz 3.4 – Flashcards

Unlock all answers in this set

Unlock answers
question
How many keys are used with asymmetric or public key cryptography?
answer
Two
question
A receiver wants to verify the integrity of a message received from a sender. A hashing value is contained within the digital signature of the sender. What must the receiver use to access the hashing value to verify the integrity of the transmission?
answer
Sender's public key
question
Which of the follow are characteristics of ECC? (Select two.)
answer
Uses a finite set of values within an algebraic field Asymmetric encryption
question
Which of the following algorithms are used in asymmetric encryption? (Select two.)
answer
RSA Diffie-Hellman
question
Above all else, what must be protected to maintain the security and benefit of an asymmetric cryptographic solution, especially if it is widely used for digital certificates?
answer
Private keys
question
Which of the following generates the key pair used in asymmetric cryptography?
answer
CSP
question
Mary wants to send a message to Sam so that only Sam can read it. Which key would be used to encrypt the message?
answer
Sam's public key
question
Mary wants to send a message to Sam. She wants to digitally sign the message to prove that she sent it. Which key would Mary use to create the digital signature?
answer
Mary's private key
question
The strength of a cryptosystem is dependent upon which of the following?
answer
Secrecy of the key
question
Which form of asymmetric cryptography is based upon Diffie-Hellman?
answer
El Gamal
question
Which cryptography system generates encryption keys that could be used with DES, AES, IDEA, RC5 or any other symmetric cryptography solution?
answer
Diffie-Hellman
question
Match each public-key cryptography key management mechanism on the left with the corresponding description on the right. Each mechanism may be used once, more than once, or not at all. Implements the Diffie-Hellman key exchange protocol using elliptic curve cryptography
answer
ECDH
question
Match each public-key cryptography key management mechanism on the left with the corresponding description on the right. Each mechanism may be used once, more than once, or not at all. Exist only for the lifetime of a specific communication session
answer
Ephemeral keys
question
Match each public-key cryptography key management mechanism on the left with the corresponding description on the right. Each mechanism may be used once, more than once, or not at all. Uses no deterministic algorithm when generating public keys
answer
Perfect forward secrecy
question
Match each public-key cryptography key management mechanism on the left with the corresponding description on the right. Each mechanism may be used once, more than once, or not at all. Can be reused by multiple communication sessions
answer
Static keys
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New