Information Security Chapter 9

  1. T/F: A digitized signature is a combination of a strong hash of a message and a secret key.
    False
  2. T/F: A keyword mixed alphabet cipher uses a cipher alphabet that consists of a keyword, minus duplicates, followed by the remaining letters of the alphabet.
    True
  3. T/F: A person demonstrates anonymity when posting information to a web discussion site without authorities knowing who he or she is.
    True
  4. T/F: A physical courier delivering an asymmetric key is an example of in-band key exchange.
    False
  5. T/F: A private key cipher is also called an asymmetric key cipher.
    False
  6. T/F: A salt value is a set of random characters you can combine with an actual input key to create the encryption key.
    True
  7. T/F: A substitution cipher replaces bits, characters, or blocks of information with other bits, characters, or blocks.
    True
  8. T/F: An algorithm is a repeatable process that produces the same result when it receives the same input.
    True
  9. T/F: Cryptographic key distribution is typically done by phone.
    False
  10. T/F: Digital signatures require asymmetric key cryptography.
    True
  11. T/F: In a chosen-ciphertext attack, cryptanalysts submit data coded with the same cipher and key they are trying to break to the decryption device to see either the plaintext output or the effect the decrypted message has on some system.
    True
  12. T/F: In a known-plaintext attack (KPA), the cryptanalyst has access only to a segment of encrypted data, and has no choice as to what that data might be.
    False
  13. T/F: Integrity-checking tools use cryptographic methods to make sure nothing and no one has modified the software.
    True
  14. T/F: Message authentication confirms the identity of the person who started a correspondence.
    True
  15. T/F: Product cipher is an encryption algorithm that has no corresponding decryption algorithm.
    False
  16. T/F: The Diffie-Hellman (DHE) algorithm is the basis for several common key exchange protocols, including Diffie-Hellman in Ephemeral mode (DHE) and Elliptic Curve DHE (ECDHE).
    True
  17. T/F: The financial industry created the ANSI X9.17 standard to define key management procedures.
    True
  18. T/F: The hash message authentication code (HMAC) is a hash function that uses a key to create a hash, or message digest.
    True
  19. T/F: The term certificate authority (CA) refers to a trusted repository of all public keys.
    False
  20. T/F: You must always use the same algorithm to encrypt information and decrypt the same information.
    False
  21. ________ offers a mechanism to accomplish four security goals: confidentiality, integrity, authentication, and nonrepudiation.



    A) Cryptography
  22. T/F: A strong hash function is designed so that a message cannot be forged that will result in the same hash as a legitimate message.
    True
  23. The act of scrambling plaintext into ciphertext is known as ________.



    D) Encryption
  24. An algorithm used for cryptographic purposes is known as a ________.



    C) Cipher
  25. T/F: Encryption ciphers fall into two general categories: symmetric (private) key and asymmetric (public) key.
    True
  26. An encryption cipher that uses the same key to encrypt and decrypt is called a ________ key.



    A) Symmetric (private)
  27. ________ corroborates the identity of an entity, whether the sender, the sender's computer, some device, or some information.



    A) Authentication
  28. Which of the following is one of the four basic forms of a cryptographic attack?




    B) All of these
  29. T/F: The two basic types of ciphers are transposition and substitution.
    True
  30. A ________ is used to detect forgeries.



    B) Hash value
  31. DES, IDEA, RC4, and WEP are examples of ________.



    D) Symmetric algorithms (or standards)
  32. A ________ signature is a representation of a physical signature stored in a digital format.



    B) Digitized
Author
jerk7600
ID
335922
Card Set
Information Security Chapter 9
Description
IS Chapter 9
Updated