Key Terms Quiz Use terms from the Key Terns list to complete the sen- 5. cryptosystem to is the
evaluation of a tences that follow. Don't use the same term more than once. Not all terms will be
used. 6. referens to every possible value 1. Making two inputs result in the exact same 7. is the
function most commonly cryptiggaphic hash is called a(n) 2. A simple way to hide information
the 8. The measure of randomness in a data stream is moves a letter a set number called of places
down the alphabet. 9. Processing through an algorithm more than once 3. To provide for perfect
forward security, one with different keys is called 4. is required for symmetric 10. The basis for
symmetric cryptography is the principle of a(n) Multiple-Choice Quiz 1. When a message is sent,
no matter what its format, why do we care about its integrity? 2. How is 3DES different from
many other types of A. To ensure proper formatting encryption described in this chapter? B. To
show that the encryption keys are undamaged A. It only encrypts the hash. C. To show that the
message has not been edited B. It hashes the message before encryption. in transit C. It uses three
keys and multiple encryption D. To show that no one has viewed the message and/or decryption
sets. D. It can display the key publicly. 3. It a messege has a hasty hon tivat aprotect the
myessago in transit? A. If the message is editid, the hath witl irs P: Ifintuing longer match. What
algurithin can be used to provide for bulk. 5. Hashing destroys the messages to that if cincryption
of data? cannot be nead by anyone. A. kifs C. Hashing encrypts the message se that only 13.
1264 the private key holder can read it. C. RI'EMA D. The hash makes the mestage uneditable.
D. ElGamal 4. What is the biggeat drawback to symmetric 8. A good hash function is resistant to
what? encryption? A. Beute-forcing A. It is too easily broken. B. Rainbow tablest B. It is too
slow to beeasily used on mobile C. Lnterceptian devices. D. Collisions C. It requires a key to be
securely shared. 9. How is 3DES an improvement over normal EES? D. It is available only on
UNIX. A. It uses public and private keys. 5. What is Diffie-Hellman most comimonly used for?
B. It hashes the message before encryption. A. Symmetric encryption key exehange C. It uses
throe keys and multiple encryption D. Sigrung digital contracts. and/or decryption sets. C. Sectre
e-mail D. It is faster than DES. D. Storing encrypted passwords: 10. What is the best kind of key
to have? 6. What is public key cryptography a more A. Easy to remember cokmmon name for?
B. Long and random Key Terms Quiz Use terms from the Key Terms list to complete the
sentences that follow. Don't use the same term more than once. Not all terms will be used. 6.
Emails and their attachments can be secuked i. is a protocol used to secune DNS 7. The use of
multiple nearly identical messages can packets during transmission across a network: lead to the
cryptographic altack. 2. A common encryption method designed to 8. The is a network protocol
for encrypt above the network layer, enabling secure securely delivering audio and video over IP
sessions between hosts, is called networks. 3. is the use of special encoding to 9. Reusing
previous user input to bypass security is hide messages within other messages, 4. The use of
precomputed answers to a problem is 10. an example of a attack. called that has the ability to
encrypt and digitally sign 5. A is a software library that e-mail and files. implements
cryptographic functions. - Multiple-Choice Quiz C. The crypto module performs encryption
muob 1. Which of the following is used streng then passwords from brute-force attacks? faster
than general-purpose computing devican A. Bcrypt 2 D. None of the above. B. PBKDF2 5.
Which of the following is a detailed standard for C. DNSSEC creating and implementing
security policies? D. SSH-enabled logins A. PKIX 2. Why is LSB encoding the preferred method
for B. 15 O / IEC 27002 steganography? C. FIPS A. It uses much stronger encryption. D. X.509
B. It applies a digital signature to the message. 6. Why does ECC work well on low-power
devices? C. It alters the picture the least amount possible. A. Less entropy is needed for a given
key D. It adds no additional entropy. strength. 3. Transport Layer Security consists of which two
B. Less computational power is needed for a protocols? given key strength. A. The TLS Record
Protocol and TLS Handshake C. Less memory is needed for a given key Protocol strength. B.
The TLS Record Protocol and TLS Certificate D. None of the above. Protocol C. The TLS
Certificate Protocol and TLS 7. What makes a digitally signed message different Handshake
Protocol from an encrypted message? D. The TLS Key Protocol and TLS Handshake A. The
digitally signed message has encryption Protocol protections for integrity and nonrepudiation. B.
A digitally signed message uses much 4. What is the advantage of using a crypto module?
stronger encryption and is harder to break. A. Custom hardware adds key entropy. C. The
encrypted message only uses symmetric B. It performs operations and maintains the key
encryption. material in a physical or logical boundary. D. There is no difference. 8. Which of the
following is a secuntismais 10. Transport Layer Security for HTTP uses what standard? port to
communicate? A. POP3 A. 53 B. IMAP B. 80 C. SMTP C. 143 D. S/MIME D. 443 9. Which of
the following is a joint set of security processes and standards used by approved laboratories to
award an Evaluation Assurance Level (EAL) from EAL1 to EAL7? A. Common Criteria B. FIPS
C. ISO 17700 D. IEEE X.509

Key Terms Quiz Use terms from the Key Terns list to complete the sen-.docx

  • 1.
    Key Terms QuizUse terms from the Key Terns list to complete the sen- 5. cryptosystem to is the evaluation of a tences that follow. Don't use the same term more than once. Not all terms will be used. 6. referens to every possible value 1. Making two inputs result in the exact same 7. is the function most commonly cryptiggaphic hash is called a(n) 2. A simple way to hide information the 8. The measure of randomness in a data stream is moves a letter a set number called of places down the alphabet. 9. Processing through an algorithm more than once 3. To provide for perfect forward security, one with different keys is called 4. is required for symmetric 10. The basis for symmetric cryptography is the principle of a(n) Multiple-Choice Quiz 1. When a message is sent, no matter what its format, why do we care about its integrity? 2. How is 3DES different from many other types of A. To ensure proper formatting encryption described in this chapter? B. To show that the encryption keys are undamaged A. It only encrypts the hash. C. To show that the message has not been edited B. It hashes the message before encryption. in transit C. It uses three keys and multiple encryption D. To show that no one has viewed the message and/or decryption sets. D. It can display the key publicly. 3. It a messege has a hasty hon tivat aprotect the myessago in transit? A. If the message is editid, the hath witl irs P: Ifintuing longer match. What algurithin can be used to provide for bulk. 5. Hashing destroys the messages to that if cincryption of data? cannot be nead by anyone. A. kifs C. Hashing encrypts the message se that only 13. 1264 the private key holder can read it. C. RI'EMA D. The hash makes the mestage uneditable. D. ElGamal 4. What is the biggeat drawback to symmetric 8. A good hash function is resistant to what? encryption? A. Beute-forcing A. It is too easily broken. B. Rainbow tablest B. It is too slow to beeasily used on mobile C. Lnterceptian devices. D. Collisions C. It requires a key to be securely shared. 9. How is 3DES an improvement over normal EES? D. It is available only on UNIX. A. It uses public and private keys. 5. What is Diffie-Hellman most comimonly used for? B. It hashes the message before encryption. A. Symmetric encryption key exehange C. It uses throe keys and multiple encryption D. Sigrung digital contracts. and/or decryption sets. C. Sectre e-mail D. It is faster than DES. D. Storing encrypted passwords: 10. What is the best kind of key to have? 6. What is public key cryptography a more A. Easy to remember cokmmon name for? B. Long and random Key Terms Quiz Use terms from the Key Terms list to complete the sentences that follow. Don't use the same term more than once. Not all terms will be used. 6. Emails and their attachments can be secuked i. is a protocol used to secune DNS 7. The use of multiple nearly identical messages can packets during transmission across a network: lead to the cryptographic altack. 2. A common encryption method designed to 8. The is a network protocol for encrypt above the network layer, enabling secure securely delivering audio and video over IP sessions between hosts, is called networks. 3. is the use of special encoding to 9. Reusing previous user input to bypass security is hide messages within other messages, 4. The use of precomputed answers to a problem is 10. an example of a attack. called that has the ability to encrypt and digitally sign 5. A is a software library that e-mail and files. implements cryptographic functions. - Multiple-Choice Quiz C. The crypto module performs encryption muob 1. Which of the following is used streng then passwords from brute-force attacks? faster than general-purpose computing devican A. Bcrypt 2 D. None of the above. B. PBKDF2 5. Which of the following is a detailed standard for C. DNSSEC creating and implementing security policies? D. SSH-enabled logins A. PKIX 2. Why is LSB encoding the preferred method for B. 15 O / IEC 27002 steganography? C. FIPS A. It uses much stronger encryption. D. X.509 B. It applies a digital signature to the message. 6. Why does ECC work well on low-power devices? C. It alters the picture the least amount possible. A. Less entropy is needed for a given key D. It adds no additional entropy. strength. 3. Transport Layer Security consists of which two
  • 2.
    B. Less computationalpower is needed for a protocols? given key strength. A. The TLS Record Protocol and TLS Handshake C. Less memory is needed for a given key Protocol strength. B. The TLS Record Protocol and TLS Certificate D. None of the above. Protocol C. The TLS Certificate Protocol and TLS 7. What makes a digitally signed message different Handshake Protocol from an encrypted message? D. The TLS Key Protocol and TLS Handshake A. The digitally signed message has encryption Protocol protections for integrity and nonrepudiation. B. A digitally signed message uses much 4. What is the advantage of using a crypto module? stronger encryption and is harder to break. A. Custom hardware adds key entropy. C. The encrypted message only uses symmetric B. It performs operations and maintains the key encryption. material in a physical or logical boundary. D. There is no difference. 8. Which of the following is a secuntismais 10. Transport Layer Security for HTTP uses what standard? port to communicate? A. POP3 A. 53 B. IMAP B. 80 C. SMTP C. 143 D. S/MIME D. 443 9. Which of the following is a joint set of security processes and standards used by approved laboratories to award an Evaluation Assurance Level (EAL) from EAL1 to EAL7? A. Common Criteria B. FIPS C. ISO 17700 D. IEEE X.509