Question 1 0 out of 1 points A mathematical ____________________ is a “secret mechanism that enables you to easily accomplish the reverse function in a one-way function.” Selected Answer: [None Given] Correct Answer: Evaluation Method Correct Answer trapdoor Exact Match Case Sensitivity Question 2 1 out of 1 points A method of encryption that requires the same secret key to encipher and decipher the message is known as public key encryption. Selected Answer: Answers: False True False Question 3 0 out of 1 points A method of encryption that requires the same secret key to encipher and decipher the message is known as ____ encryption. Selected Answer: Answers: [None Given] asymmetric symmetric public private Question 4 0 out of 1 points A(n) ____________________ authority operates under the trusted collaboration of the certificate authority and can be delegated day-to-day certification functions, such as verifying registration information about new registrants, generating end-user keys, revoking certificates, and validating that users possess a valid certificate. Selected Answer: [None Given] Correct Answer: Evaluation Method Correct Answer registration Exact Match Case Sensitivity Question 5 0 out of 1 points A(n) ____________________ substitution uses one alphabet. Selected Answer: Correct Answer: [None Given] Evaluation Method Correct Answer monoalphabetic Exact Match Case Sensitivity Question 6 0 out of 1 points A(n) distinguished name uniquely identifies a certificate entity, to a user’s public key. Selected Answer: Answers: [None Given] True False Question 7 0 out of 1 points A(n) key is the programmatic steps used to convert an unencrypted message into an encrypted sequence of bits that represent the message. Selected Answer: Answers: [None Given] True False Question 8 0 out of 1 points A(n) man-in-the-middle attack attempts to intercept a public key or even to insert a known key structure in place of the requested public key. Selected Answer: Answers: [None Given] True False Question 9 0 out of 1 points A(n) registration authority issues, manages, authenticates, signs, and revokes users’ digital certificates, which typically contain the user’s name, public key, and other identifying information. Selected Answer: Answers: [None Given] True False Question 10 0 out of 1 points A(n) response attack is an attempt to resubmit a recording of the deciphered authentication to gain entry into a secure source. Selected Answer: Answers: [None Given] True False Question 11 0 out of 1 points Also known as the one-time pad, the ____________________ cipher, which was developed at AT&T, uses a set of characters only one time for each encryption process. Selected Answer: [None Given] Correct Answer: Evaluation Method Correct Answer Vernam Exact Match Case Sensitivity Question 12 0 out of 1 points An X.509 v3 certificate binds a(n) _____, which uniquely identifies a certificate entity, to a user’s public key. Selected Answer: Answers: [None Given] message digest fingerprint distinguished name digital signature Question 13 0 out of 1 points An attacker may obtain duplicate texts, one in ciphertext and one in plaintext, which enable the individual to reverse-engineer the encryption algorithm in a(n) knownplaintext attack scheme. Selected Answer: Answers: [None Given] True False Question 14 0 out of 1 points As DES became known as being too weak for highly classified communications, Double DES was created to provide a level of security far beyond that of DES. Selected Answer: Answers: [None Given] True False Question 15 0 out of 1 points Attackers may conduct an encrypted-plaintext attack by sending potential victims a specific text that they are sure the victims will forward on to others. Selected Answer: Answers: [None Given] True False Question 16 0 out of 1 points Bit stream methods most commonly use functions like the exclusive OR operation (_____). Selected Answer: [None Given] Answers: XOR EOR NOR OR Question 17 0 out of 1 points Common implementations of RA include: systems to issue digital certificates to users and servers; directory enrollment; key issuing systems; tools for managing the key issuance; and verification and return of certificates. Selected Answer: Answers: [None Given] True False Question 18 0 out of 1 points DES uses a 64-bit key. Selected Answer: Answers: [None Given] True False Question 19 0 out of 1 points DES uses a(n) _____-bit block size. Selected Answer: Answers: [None Given] 32 64 128 256 Question 20 Needs Grading Describe digital certificates. Selected Answer: Correct Answer: [None Given] Digital certificates are public-key container files that allow computer programs to validate the key and identify to whom it belongs. The certificate is often issued by a third party that certifies the authenticity of the information it contains. A digital signature attached to the certificate’s container file certifies the file’s origin and integrity. A certificate authority (CA) issues, manages, authenticates, signs, and revokes users’ digital certificates, which typically contain the user name, public key, and other identifying information. Response Feedback: [None Given] Question 21 Needs Grading Describe how hash functions work and what they are used for. Selected Answer: Correct Answer: [None Given] Response Feedback: [None Given] Hash functions are mathematical algorithms that generate a message summary or digest to confirm the identity of a specific message and to confirm that there have not been any changes to the content. While they do not create a ciphertext, hash functions confirm message identity and integrity, both of which are critical functions in e-commerce. Hashing functions do not require the use of keys, but it is possible to attach a message authentication code (MAC)—a key-dependent, one-way hash function—that allows only specific recipients (symmetric key holders) to access the message digest. Question 22 Needs Grading Describe symmetric and asymmetric encryptions. Selected Answer: Correct Answer: [None Given] Symmetric Encryption. Encryption methodologies that require the same secret key to encipher and decipher the message are using what is called private key encryption or symmetric encryption. Symmetric encryption methods use mathematical operations that can be programmed into extremely fast computing algorithms so that the encryption and decryption processes are executed quickly by even small computers. The primary challenge of symmetric key encryption is getting the key to the receiver, a process that must be conducted out of band (meaning through a channel or band other than the one carrying the ciphertext) to avoid interception. Asymmetric Encryption. Another category of encryption techniques is asymmetric encryption. Whereas the symmetric encryption systems are based on using a single key to both encrypt and decrypt a message, asymmetric encryption uses two different but related keys, and either key can be used to encrypt or decrypt the message. Asymmetric encryption can be used to provide elegant solutions to problems of secrecy and verification. This technique has its highest value when one key is used as a private key, which means that it is kept secret (much like the key of symmetric encryption), known only to the owner of the key pair, and the other key serves as a public key, which means that it is stored in a public location where anyone can use it. Response Feedback: [None Given] Question 23 0 out of 1 points Dictionary attacks are a collection of brute-force methods that attempt to deduce statistical relationships between the structure of the unknown key and the ciphertext that is the output of the cryptosystem. Selected Answer: Answers: [None Given] True False Question 24 0 out of 1 points Digital ____________________ are electronic documents that can be part of a process of identification associated with the presentation of a public key. Selected Answer: [None Given] Correct Answer: Evaluation Method Correct Answer certificates Exact Match Case Sensitivity Question 25 0 out of 1 points Digital ____________________ are encrypted messages that can be mathematically proven to be authentic. Selected Answer: [None Given] Correct Answer: Evaluation Method Correct Answer signatures Exact Match Case Sensitivity Question 26 0 out of 1 points Digital ____________________ are public key container files that allow computer programs to validate the key and identify to whom it belongs. Selected Answer: [None Given] Correct Answer: Evaluation Method Correct Answer certificates Exact Match Case Sensitivity Question 27 0 out of 1 points Digital signatures should be created using processes and products that are based on the ____. Selected Answer: [None Given] Answers: DSS NIST SSL HTTPS Question 28 0 out of 1 points ESP in transport mode can be used to establish a virtual private network, assuring encryption and authentication between networks communicating across the Internet. Selected Answer: Answers: [None Given] True False Question 29 0 out of 1 points Encryption is a process of hiding information and has been in use for a long time. Selected Answer: Answers: [None Given] True False Question 30 0 out of 1 points Encryption is the process of converting the ciphertext into a message that conveys readily understood meaning. Selected Answer: Answers: [None Given] True False Question 31 0 out of 1 points Hash algorithms are publicly known functions that create a value by converting variablelength messages into a single fixed-length value. Selected Answer: Answers: [None Given] True False Question 32 0 out of 1 points Hashing functions do not require the use of keys, but it is possible to attach a message ____________________ code. Selected Answer: [None Given] Correct Answer: Evaluation Method Exact Match Correct Answer Case Sensitivity authentication Question 33 0 out of 1 points Hashing functions require the use of keys. Selected Answer: Answers: [None Given] True False Question 34 0 out of 1 points In 1917, Gilbert S.Vernam, an AT&T employee, invented a polyalphabetic cipher machine that used a non-repeating random key. Selected Answer: Answers: [None Given] True False Question 35 0 out of 1 points In 1953, Giovan Batista Belaso introduced the idea of the passphrase (password) as a key for encryption. Selected Answer: Answers: [None Given] True False Question 36 0 out of 1 points In IPSEC ____________________ mode, only the IP data is encrypted, not the IP headers. Selected Answer: [None Given] Correct Answer: Evaluation Method Correct Answer transport Exact Match Case Sensitivity Question 37 0 out of 1 points In a(n) ____ attack, the attacker eavesdrops during the victim’s session and uses statistical analysis of the user’s typing patterns and inter-keystroke timings to discern sensitive session information. Selected Answer: Answers: [None Given] replay timing correlation dictionary Question 38 0 out of 1 points In a(n) ____________________ attack, the attacker eavesdrops during the victim’s session and uses statistical analysis of the user’s typing patterns and inter-keystroke timings to discern sensitive session information. Selected Answer: [None Given] Correct Answer: Evaluation Method Correct Answer timing Exact Match Case Sensitivity Question 39 0 out of 1 points In a(n) word attack, the attacker encrypts every word in a dictionary using the same cryptosystem as used by the target. Selected Answer: Answers: [None Given] True False Question 40 0 out of 1 points In transport mode the entire IP packet is encrypted and is then placed as the content portion of another IP packet. Selected Answer: Answers: [None Given] True False Question 41 0 out of 1 points Internet Protocol Security is designed to protect data integrity, user confidentiality, and authenticity at the IP packet level. Selected Answer: Answers: [None Given] True False Question 42 0 out of 1 points Julius Caesar was associated with an early version of the transposition cipher. Selected Answer: Answers: [None Given] True False Question 43 0 out of 1 points Netscape developed the ____________________ Layer protocol to use public key encryption to secure a channel over the public Internet, thus enabling secure communications. Selected Answer: [None Given] Correct Answer: Evaluation Method Correct Answer Exact Match Secure Socket Exact Match Secure Sockets Case Sensitivity Question 44 0 out of 1 points Nonrepudiation means that customers or partners can be held accountable for transactions, such as online purchases, which they cannot later deny. Selected Answer: Answers: [None Given] True False Question 45 0 out of 1 points Once the attacker has successfully broken an encryption, he or she may launch a replay attack, which is an attempt to resubmit a recording of the deciphered authentication to gain entry into a secure source. Selected Answer: Answers: [None Given] True False Question 46 0 out of 1 points One encryption method made popular by spy movies involves using the text in a book as the key to decrypt a message. Selected Answer: Answers: [None Given] True False Question 47 0 out of 1 points One of the most widely known cryptographic algorithms is the Data ____________________ Standard, which was developed by IBM and is based on the company’s Lucifer algorithm. Selected Answer: [None Given] Correct Answer: Evaluation Method Correct Answer Encryption Exact Match Case Sensitivity Question 48 0 out of 1 points PGP uses the freeware ZIP algorithm to compress the message after it has been digitally signed but before it is encrypted. Selected Answer: Answers: [None Given] True False Question 49 0 out of 1 points PKI systems are based on public key cryptosystems and include digital certificates and certificate authorities. Selected Answer: Answers: [None Given] True False Question 50 0 out of 1 points Plaintext or cleartext is the original unencrypted message that is encrypted; also the name given to the results of a message that has been successfully decrypted. Selected Answer: Answers: [None Given] True False Question 51 0 out of 1 points Popular cryptosystems use a hybrid combination of symmetric and asymmetric algorithms. Selected Answer: Answers: [None Given] True False Question 52 0 out of 1 points Privacy Enhanced Mail was proposed by the Internet Engineering Task Force as a standard to function with the public key cryptosystems. Selected Answer: Answers: [None Given] True False Question 53 0 out of 1 points SHA-1 produces a(n) _____-bit message digest, which can then be used as an input to a digital signature algorithm. Selected Answer: Answers: [None Given] 48 56 160 256 Question 54 0 out of 1 points SSL builds on the encoding format of the Multipurpose Internet Mail Extensions protocol by adding encryption and authentication through the use of digital signatures based on public key cryptosystems. Selected Answer: Answers: [None Given] True False Question 55 0 out of 1 points Secure Electronic Transactions was developed by MasterCard and VISA in 1997 to provide protection from electronic payment fraud. Selected Answer: Answers: [None Given] True False Question 56 0 out of 1 points Secure HTTP provides the Internet communication services between client and host without consideration for encryption of the data that is communicated over the connection between client and server. Selected Answer: Answers: [None Given] True False Question 57 0 out of 1 points Secure Multipurpose Internet Mail Extensions builds on the encoding format of the Multipurpose Internet Mail Extensions protocol by adding encryption and authentication through the use of digital signatures based on public key cryptosystems. Selected Answer: Answers: [None Given] True False Question 58 0 out of 1 points Sequence encryption is a series of encryptions and decryptions between a number of systems, wherein each system in a network decrypts the message sent to it and then reencrypts it using different keys and sends it to the next neighbor, and this process continues until the message reaches the final destination. Selected Answer: Answers: [None Given] True False Question 59 0 out of 1 points Standard-HTTP (S-HTTP) is an extended version of the Hypertext Transfer Protocol that provides for the encryption of individual messages between a client and server across the Internet. Selected Answer: Answers: [None Given] True False Question 60 0 out of 1 points Substitution ciphers that use two or more alphabets, and are referred to as ____ substitutions. Selected Answer: [None Given] Answers: multialphabetic monoalphabetic polyalphabetic polynomic Question 61 0 out of 1 points Symmetric encryption uses two different but related keys, and either key can be used to encrypt or decrypt the message. Selected Answer: Answers: [None Given] True False Question 62 0 out of 1 points The 3DES implements a block cipher with a variable block length and a key length of 128, 192, or 256 bits. Selected Answer: Answers: [None Given] True False Question 63 0 out of 1 points The AES algorithm was the first public key encryption algorithm. Selected Answer: Answers: [None Given] True False Question 64 0 out of 1 points The AES implements a block cipher called the Rijndael Block Cipher. Selected Answer: Answers: [None Given] True False Question 65 0 out of 1 points The CA periodically distributes a(n) ____ to all users that identifies all revoked certificates. Selected Answer: [None Given] Answers: CRL RA MAC AES Question 66 0 out of 1 points The SHTTP security solution provides six services: authentication by digital signatures, message encryption, compression, e-mail compatibility, segmentation, and key management. Selected Answer: Answers: [None Given] True False Question 67 0 out of 1 points The Secure ____________________ Standard is a standard issued by the National Institute of Standards and Technology. Selected Answer: [None Given] Correct Answer: Evaluation Method Correct Answer Hash Exact Match Case Sensitivity Question 68 0 out of 1 points The ____ algorithm was the first public key encryption algorithm developed (in 1977) and published for commercial use. Selected Answer: Answers: [None Given] DES RSA MAC AES Question 69 0 out of 1 points The ____ is essentially a one-way hash value that is encrypted with a symmetric key. Selected Answer: Answers: [None Given] signature MAC fingerprint digest Question 70 0 out of 1 points The ____ is responsible for the fragmentation, compression, encryption, and attachment of an SSL header to the cleartext prior to transmission. Selected Answer: Answers: [None Given] Standard HTTP SFTP S-HTTP SSL Record Protocol Question 71 0 out of 1 points The ____ protocol provides system to system authentication and data integrity verification, but does not provide secrecy for the content of a network communication. Selected Answer: Answers: [None Given] ESP AH HA SEP Question 72 0 out of 1 points The ____________________ OR operation is a function of Boolean algebra in which two bits are compared, and if the two bits are identical, the result is a binary 0. Selected Answer: [None Given] Correct Answer: Evaluation Method Correct Answer exclusive Exact Match Case Sensitivity Question 73 0 out of 1 points The ____________________ cipher simply rearranges the values within a block to create the ciphertext. Selected Answer: [None Given] Correct Answer: Evaluation Method Correct Answer Exact Match transposition Exact Match permutation Case Sensitivity Question 74 0 out of 1 points The application header protocol provides secrecy for the content of a network communication. Selected Answer: Answers: [None Given] True False Question 75 0 out of 1 points The asymmetric encryption systems are based on using a single key to both encrypt and decrypt a message. Selected Answer: Answers: [None Given] True False Question 76 0 out of 1 points The encapsulating security ____________________ protocol provides secrecy for the contents of network communications as well as system to system authentication and data integrity verification. Selected Answer: [None Given] Correct Answer: Evaluation Method Correct Answer payload Exact Match Case Sensitivity Question 77 0 out of 1 points The encapsulating security payload protocol provides confidentiality services for IP packets across insecure networks. Selected Answer: Answers: [None Given] True False Question 78 0 out of 1 points The message ____________________ is a fingerprint of the author’s message that is to be compared with the receiver’s locally calculated hash of the same message. Selected Answer: [None Given] Correct Answer: Evaluation Method Correct Answer digest Exact Match Case Sensitivity Question 79 0 out of 1 points The more common name for asymmetric encryption is ____________________ key encryption. Selected Answer: Correct Answer: [None Given] Evaluation Method Correct Answer public Exact Match Case Sensitivity Question 80 0 out of 1 points The most common hybrid system is based on the Diffie-Hellman Key Exchange method, which is a method for exchanging private keys using public key encryption. Selected Answer: Answers: [None Given] True False Question 81 0 out of 1 points The most popular modern version of steganography involves hiding information within files that appear to contain digital pictures or other images. Selected Answer: Answers: [None Given] True False Question 82 0 out of 1 points The number of horizontal and vertical pixels captured and recorded is known as the image’s depth. Selected Answer: Answers: [None Given] True False Question 83 0 out of 1 points The permutation cipher simply rearranges the values within a block to create the ciphertext. Selected Answer: Answers: [None Given] True False Question 84 0 out of 1 points The process of hiding messages is called ____________________. Selected Answer: [None Given] Correct Answer: Evaluation Method Correct Answer steganography Exact Match Case Sensitivity Question 85 0 out of 1 points The science of encryption is known as ____________________. Selected Answer: [None Given] Correct Answer: Evaluation Method Correct Answer cryptology Exact Match Case Sensitivity Question 86 0 out of 1 points The successor to 3DES is the ____________________ Encryption Standard. Selected Answer: [None Given] Correct Answer: Evaluation Method Correct Answer Advanced Exact Match Case Sensitivity Question 87 0 out of 1 points To ____________________ means to encrypt or convert plaintext into the equivalent ciphertext. Selected Answer: [None Given] Correct Answer: Evaluation Method Correct Answer encipher Exact Match Case Sensitivity Question 88 0 out of 1 points To encipher means to decrypt or convert ciphertext into the equivalent plaintext. Selected Answer: Answers: [None Given] True False Question 89 0 out of 1 points To perform the Caesar cipher encryption operation, pad values are added to numeric values that represent the plaintext that needs to be encrypted. Selected Answer: Answers: [None Given] True False Question 90 0 out of 1 points Two hundred and eighty five computers can crack a 56-bit key in one year, ten times as many would do it in a little over a month. Selected Answer: Answers: [None Given] True False Question 91 0 out of 1 points When an asymmetric cryptographic process uses the sender’s private key to encrypt a message, the sender’s public key must be used to decrypt the message. Selected Answer: Answers: [None Given] True False Question 92 0 out of 1 points When using a(n) ____________________ cipher, you replace one value with another. Selected Answer: [None Given] Correct Answer: Evaluation Method Correct Answer substitution Exact Match Case Sensitivity Question 93 0 out of 1 points With Diffie-Hellman, asymmetric encryption is used to exchange session keys. Selected Answer: Answers: [None Given] True False Question 94 0 out of 1 points You cannot combine the XOR operation with a block cipher operation. Selected Answer: Answers: [None Given] True False Question 95 0 out of 1 points ____ are encrypted messages that can be mathematically proven to be authentic. Selected Answer: [None Given] Answers: Digital signatures MAC Message certificates Message digests Question 96 0 out of 1 points ____ attacks are a collection of brute-force methods that attempt to deduce statistical relationships between the structure of the unknown key and the ciphertext that is the output of the cryptosystem. Selected Answer: Answers: [None Given] Timing Dictionary Correlation Man-in-the-middle Question 97 0 out of 1 points ____ functions are mathematical algorithms that generate a message summary or digest to confirm the identity of a specific message and to confirm that there have not been any changes to the content. Selected Answer: [None Given] Answers: Hash Map Key Encryption Question 98 0 out of 1 points ____ is a Federal Information Processing Standard that specifies a cryptographic algorithm that is used within the U.S. government to protect information at federal agencies that are not a part of the national defense infrastructure. Selected Answer: Answers: [None Given] DES 2DES AES 3DES Question 99 0 out of 1 points ____ is a hybrid cryptosystem originally designed in 1991 by Phil Zimmermann. Selected Answer: [None Given] Answers: PGP DES AH ESP Question 100 0 out of 1 points ____ is an integrated system of software, encryption methodologies, protocols, legal agreements, and third-party services that enables users to communicate securely. Selected Answer: Answers: [None Given] MAC PKI DES AES Question 101 0 out of 1 points ____ is an open source protocol to secure communications across any IP-based network such as LANs, WANs, and the Internet. Selected Answer: Answers: [None Given] PEM SSH IPSec SET Question 102 0 out of 1 points ____ is the amount of effort (usually in hours) required to perform cryptanalysis on an encoded message so that it may be decrypted when the key or algorithm (or both) are unknown. Selected Answer: Answers: [None Given] Code Algorithm Key Work factor Question 103 0 out of 1 points ____ is the entire range of values that can possibly be used to construct an individual key. Selected Answer: Answers: [None Given] Code Keyspace Algorithm Cryptogram Question 104 0 out of 1 points ____ is the information used in conjunction with an algorithm to create the ciphertext from the plaintext or derive the plaintext from the ciphertext. Selected Answer: Answers: [None Given] Password Cipher Key Passphrase Question 105 0 out of 1 points ____ is the process of converting an original message into a form that is unreadable to unauthorized individuals. Selected Answer: [None Given] Answers: Encryption Decryption Cryptology Cryptography Question 106 0 out of 1 points ____ was developed by Phil Zimmermann and uses the IDEA Cipher for message encoding. Selected Answer: Answers: [None Given] PEM PGP S/MIME SSL Question 107 0 out of 1 points ____________________ is the process of making and using codes to secure the transmission of information. Selected Answer: [None Given] Correct Answer: Evaluation Method Correct Answer Cryptography Exact Match Case Sensitivity Question 108 0 out of 1 points ____________________ or cryptosystem is an encryption method or process encompassing the algorithm, key(s) or cryptovariable(s), and procedures used to perform encryption and decryption. Selected Answer: [None Given] Correct Answer: Evaluation Method Exact Match Correct Answer Cipher Case Sensitivity