Review Questions
1. The areas of a file in which steganography can hide data including all of the
following except ______.
A. in data that is used to describe the content or structure of the actual data
B. in the file header fields that describe the file
C. in areas that contain the content data itself
D. in the directory structure of the file system
2. Data that is to be encrypted by inputting into an algorithm is called ______.
A. clear text
B. open text
C. ciphertext
D. plaintext
3. Each of the following is a basic security protection over information that
cryptography can provide except ______.
A. confidentiality
B. stop loss
C. integrity
D. authenticity
4. Proving that a user sent an e-mail message is known as ______.
A. non-repudiation
B. reverse confidentiality
C. integrity
D. availability
5. A(n) _____ is never intended to be decrypted but is only used for comparison
purposes.
A. plaintext
B. algorithm
C. key
D. digest
6. Each of the following is an example of how hashing is used except ______.
A. bank automatic teller machine (ATM)
B. verifying a user password entered on a Linux system
C. determining the integrity of a message
D. encrypting and decrypting e-mail attachments
7. Which of the following is NOT a characteristic of a secure hash algorithm?
A. The results of a hash function should not be reversed.
B. The hash should always be the same fixed size.
C. A message cannot be produced from a predefined hash.
D. Collisions should be rare.
8. The data added to a section of text when using the Message Digest (MD)
algorithm is called ______.
A. filler
B. extender
C. padding
D. byte extensions
9. Which of the following is a protection provided by hashing?
A. confidentiality
B. integrity
C. availability
D. authenticity
10. Symmetric cryptographic algorithms are also called ______.
A. cipherkey cryptography
B. public/private key cryptography
C. public key cryptography
D. private key cryptography
11. Monoalphabetic substitution ciphers and homoalphabetic substitution ciphers are
examples of ______.
A. symmetric stream ciphers
B. generic block ciphers
C. asymmetric block ciphers
D. hash ciphers
12. Which of the following is the strongest symmetric cryptographic algorithm?
A. Data Encryption Standard
B. Triple Data Encryption Standard
C. Advanced Encryption Standard
D. Rivest Cipher (RC) 1
13. When Bob wants to send a secure message to Alice using an asymmetric
cryptographic algorithm, which key does he use to encrypt the message?
A. Bob’s public key
B. Alice's public key
C. Bob’s private key
D. Alice’s private key
14. A digital signature can provide each of the following benefits except ______.
A. Verify the receiver
B. Verify the sender
C. Enforce non-repudiation
D. Prove the integrity of the message
15. Which of the following asymmetric cryptographic algorithms is the most secure?
A. RSA
B. MD-17
C. SHA-2
D. ERFGA
16. _____ uses the Windows NTFS file system to automatically encrypt all files.
A. Encrypting File System (EFS)
B. GNU PGP
C. IDEA
D. MD-1
17. The Microsoft Windows BitLocker whole disk encryption cryptography
technology can protect each of the following except ______.
A. Windows system files
B. User files
C. Temporary files
D. Domain name system files
18. The Trusted Platform Module (TPM) _____.
A. is only available on Windows computers running BitLocker
B. includes a pseudorandom number generator (PRNG)
C. provides cryptographic services in hardware instead of software
D. allows the user to boot a corrupted disk and repair it
19. Most security experts recommend that _____ be replaced with a more secure
algorithm.
A. DES
B. RSA
C. AES-256
D. MD-17
20. The Microsoft Windows LAN Manager hash ______.
A. is part of BitLocker
B. is required to be present when using TPM
C. is weaker than NTLMv2
D. is the same as MD-5
E. Behavior-based monitoring

get an essay or any other
homework writing help
for a fair price!
check it here!