Jane is looking for an algorithm to ensure message integrity. Which of following would be an acceptable choice?
A. RSA
B. AES
C. RC4
D. SHA-1
You have been tasked with selecting a digital certificate standard for your company to use. Which one of the following was an international standard for the format and information contained in a digital certificate?
A. CA
B. X.509
C. CRL
D. RFC 2298
What best describes the shifting of each letter a fixed number of spaces to the left or right?
A. Single substitution
B. Multi substitution
C. XOR
D. Bit shifting
Which of the following areas is considered a strength of symmetric key cryptography when compared with asymmetric algorithms?
A. Key distribution
B. Security
C. Scalability
D. Speed
Uses a formula, M_n = 2^n 1 where n is a prime number, to generate primes. Works for 2, 3, 5, 7 but fails on 11 and on many other n values.
A. Fibonacci Numbers
B. Co-prime Numbers
C. Even Numbers
D. Mersenne Primes
Part of understanding cryptography is understanding the cryptographic primitives that go into any crypto system. A(n) _______ is a fixed-size input to a cryptographic primitive that is random or pseudorandom.
A. Key
B. IV
C. Chain
D. Salt
A symmetric block cipher designed in 1993 by Bruce Schneier. Was intended as a replacement for DES. Like DES it is a 16 round Feistel working on 64bit blocks. Can have bit sizes 32bits to 448bits.
A. Skipjack
B. Blowfish
C. MD5
D. Serpent
Early attempt to make substitution ciphers more robust, masks letter frequencies, plain text letters map to multiple cipher text symbols.
A. Scytale Cipher
B. Playfair Cipher
C. Homophonic Substitution
D. ADFVGX Cipher
A technique used to increase the security of block ciphers. It consists of steps that combine the data with portions of the key (most commonly using a simple XOR) before the first round and after the last round of encryption.
A. Whitening
B. Key Exchange
C. Key Schedule
D. Key Clustering
Which of the following is an asymmetric cipher?
A. RSA
B. AES
C. DES
D. RC4
Developed by Netscape and has been replaced by TLS. It was the preferred method used with secure websites.
A. OCSP
B. VPN
C. CRL
D. SSL
Created in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman at MIT. Most widely used public key cryptography algorithm. Based on relationships with prime numbers. This algorithm is secure because it is difficult to factor a large integer composed of two or more large prime factors.
A. PKI
B. DES
C. RSA
D. Diffie-Helmann
If you XOR 10111000 with 10101010, what is the result?
A. 10111010
B. 10101010
C. 11101101
D. 00010010
Ferris has been assigned the task of selecting security for his company's wireless network. It is important that he pick the strongest form of wireless security. Which one of the following is the strongest wireless security?
A. WEP
B. WPA
C. WPA2
D. TKIP