Asymmetric encryption utilizes only a public key for encryption and decryption. FALSE Asymmetric encryption can be used for con dentiality but not for authentication. FALSE Asymmetric encryption transforms plaintext into ciphertext. TRUE Plaintext is transformed into ciphertext using two keys and a decryption algorithm. FALSE A major advance in symmetric cryptography occurred with the development of the rotor encryption/decryption machine. TRUE Public-key encryption is more secure from cryptanalysis than symmetric encryption. FALSE Much of the theory of public-key cryptosystems is based on number theory.公钥密码 系统的许多理论都是基于数论的。 TRUE Asymmetric algorithms rely on one key for encryption and a di erent but related key for decryption. TRUE The encryption algorithm performs various transformation on the ciphertext. FALSE If the authenticator is encrypted with the sender's private key, it serves as a signature that veri es origin, content, and sequencing.如果验证器是⽤发送者的私钥加密的,那 么它将⽤作验证来源、内容和顺序的签名。 TRUE A trap-door one-way function is easy to calculate in one direction and infeasible to calculate in the other direction unless certain additional information is known. TRUE A public-key encryption scheme is not vulnerable to a brute-force attack. FALSE Before the application of the public-key cryptosystem each participant must generate TRUE a pair of keys. The defense against the brute-force approach for RSA is to use a large key space. TRUE Timing attacks are ciphertext attacks that are only applicable to RSA. FALSE Asymmetric encryption is also known as A)digital-key encryption B)private-key encryption C)public-key encryption D)optimal encryption Public-key encryption is also known as ___________ . A)optimal-key encryption B)one way time exchange encryption C)asymmetric encryption D)digital-key encryption Asymmetric encryption can be used for __________ . A)neither con dentiality nor authentication B)both con dentiality and authentication C)authentication D)con dentiality Plaintext is recovered from the ciphertext using the paired key and a _____________ . A)recovery encryption B)encryption algorithm C)decryption algorithm D)digital signature ff fi fi fi fi fi The most widely used public-key cryptosystem is __________ . A)optimal asymmetric encryption B)RSA C)asymmetric encryption D)DES Public-key algorithms are based on __________ . A)substitution B)mathematical functions C)symmetry D)permutation __________ are two related keys, a public key and a private key that are used to perform complementary operations, such as encryption and decryption or signature generation and signature veri cation. A)Asymmetric keys B)Key exchanges C)Symmetric keys D)Cipher keys The __________ indicates that the subscriber identi ed in the certi cate has sole control and access to the private key.表示证书中标识的订户对私钥拥有唯⼀的控制权和访问权。 A)Public Key Certi cate B)Digital Signature C)PKI D)OAEP A __________ is a cryptographic algorithm that uses two related keys, a public key and a private key. The two keys have the property that deriving the private key from the public key is computationally infeasible. A)Public Key (Asymmetric) Cryptographic Algorithm B)Private Key (Symmetric) Cryptographic Algorithm C)RSA Digital Cryptographic Algorithm D)Key Exchange Cryptographic Algorithm A public-key encryption scheme has __________ ingredients. A)two B)six C)fourterm-23 D)eight The key used in symmetric encryption is referred to as a __________ key. A)secret B)private C)public D)decryption The readable message or data that is fed into the algorithm as input is the ____________ . A)exchange B)ciphertext C)plaintext D)encryption Two issues to consider with the computation required to use RSA are encryption/decryption and __________ . A)asymmetric encryption padding B)key generation C)time complexity D)trap-door one-way functions fi fi fi fi __________ depend on the running time of the decryption algorithm. A)Timing attacks B)Mathematical attacks C)Chosen ciphertext attacks D)Brute-force attacks We de ne the ___________ of an algorithm to be f(n) if, for all n and all inputs of length n the execution of the algorithm takes at most f(n) steps. This is a common measure of the e ciency of an algorithm. A)one-way function B)OAEP C)timing attack D)time complexity Message authentication is a mechanism or service used to verify the integrity of a message. TRUE A considerably larger key size can be used for ECC compared to RSA FALSE The Di e-Hellman key exchange is a simple public-key algorithm TRUE The security of ElGamalis based on the di culty of computing discrete logarithms. TRUE For purposes of ECC, elliptic curve arithmetic involves the use of an elliptic curve equation de ned over an in nite eld. FALSE The Di e-Hellman algorithm depends on the di culty of computing discrete logarithms for its e ectiveness. TRUE There is not a computational advantage to using ECC with a shorter key length than a FALSE comparably secure TSA. Most of the products and standards that use public-key cryptography for encryption and digital signatures use RSA TRUE ECC is fundamentally easier to explain than either RSA or Di e-Hellman. FALSE A number of public-key ciphers are based on the use of an abelian group阿⻉尔群 TRUE Elliptic curves are ellipses. FALSE For determining the security of various elliptic curve ciphers it is of some interest to know the number of points in a nite abelian group de ned over an elliptic curve. TRUE The form of cubic equation appropriate for cryptographic applications for elliptic curves is somewhat di erent for GF(2m) than for Zp. TRUE The security of ECC depends on how di cult it is to determine k given kP and P. TRUE An encryption/decryption system requires that point Pm be encrypted as a plaintext. FALSE Since a symmetric block cipher produces an apparently random output it can serve as the basis of a pseudorandom number generator. TRUE A considerably larger key size can be used for ECC compared to RSA. FALSE _________ can be used to develop a variety of elliptic curve cryptography schemes. ffi ffi fi ffi ffi ffi fi fi fi ff ff fi fi ffi ffi A. Elliptic curve arithmetic B. Binary curve C. Prime curve D. Cubic equation The key exchange protocol is vulnerable to a __________ attack because it does not authenticate the participants. A. one-way function B. time complexity C. chosen ciphertext D. man-in-the-middle The __________ cryptosystem is used in some form in a number of standards including DSS and S/MIME. A. Rabin B. Rijnedel C. Hillman D. ElGamal A(n) __________ is de ned by an equation in two variables with coe cients. A. abelian group B. binary curve C. cubic equation D. elliptic curve __________ are best for software applications. A. Binary curves B. Prime curves C. Bit operations D. Abelian groups An encryption/decryption system requires a point G and an elliptic group _________ as parameters. A. Eb(a,q) B. Ea(q,b) C. En(a,b) D. Eq(a,b) For cryptography the variables and coe cients are restricted to elements in a __________ eld. A. primitive B. in nite C. public D. nite If three points on an elliptic curve lie on a straight line their sum is __________ . A. 0 B. 1 C. 6 D. 3 ___________ makes use of elliptic curves in which the variables and coe cients are all restricted to elements of a nite eld. A. Prime curve B. Elliptic curve cryptography(ECC) C. abelian group D. Micali-Schnorr For a ___________ de ned over GF(2m), the variables and coe cients all take on values in GF(2m) and in calculations are performed over GF(2m). fi ffi ffi ffi ffi fi fi fi fi fi fi A. cubic equation B. prime curve C. binary curve D. abelian group A. K = nB x PA B. K = nA x PB C. K = nP x BA D. K = nA x PA Included in the de nition of an elliptic curve is a single element denoted O and called the point at in nity or the __________ . A. prime point B. zero point C. abelian point D. elliptic point The principal object of a hash function is___________ data integrity A ___________ accepts a variable length block of data as input and produces a xed size hash value h = H(M) hash function The Secure Hash Algorithm design closely models, and is based on, the hash function __________ MD4 A ___________ is an algorithm for which it is computationally infeasible to nd either (a) a data object that maps to a pre-speci ed hash result or (b) two data objects that map to the same hash result. cryptogr aphic hash function The cryptographic hash function requirement that guarantees that it is impossible to nd an alternative message with the same hash value as a given message and prevents forgery when an encrypted hash code is used is the second preimage resistant __________ is a mechanism or service used to verify the integrity of a message. message authentc ation Message authentication is achieved using a __________ mac __________ are measures of the number of potential collisions for a given hash value. preimage A hash function that satis es the properties of variable input size, xed output size, e ciency, preimage resistant and second preimage resistant is referred to as a _________ weak hash function The e ort required for a collision resistant attack is explained by a mathematical result referred birthdayp to as the ___________ aradox A pseudorandom number generator takes as input a xed value called the __________ and produces a sequence of output bits using a deterministic algorithm. A. seed B. xed skew C. entropy source D. keystream The best that can be done to determine if a PRNG generates numbers that have the characteristic of randomness is on the basis of multiple tests. These tests should seek to establish uniformity, scalability, and __________ . fi ffi fi fi fi fi fi fi ffi ff fi A. consistency B. authentication C. frequency D. sequencing fi fi The Di e-Hellman key exchange formula for calculation of a secret key by User A is: The __________ test is the most basic test of randomness and must be included in any test suite. A. frequency B. runs C. unpredictability D. Maurer The Blum, Blum, Shub generator is referred to as a ____________ . A. TRNG B. OFB PRNG C. QRN D. CSPRBG Two approaches that use a block cipher to build a PNRG and have gained widespread acceptance are: A. CTR mode and CFB mode B. CTR mode and OFB mode C. CBC mode and CFB mode D. OFB mode and ECB mode A __________ uses a nondeterministic source to produce randomness. A. CSPRBG B. TRNG C. PRNG D. BBS __________ is an open source project for creating truly random numbers using inexpensive cameras, open source code, and inexpensive hardware. A. LavaRnd B. Blum, Blum, Shub C. Maurer's statistics D. Entropy Various methods of modifying a bit stream to reduce or eliminate a bias have been developed. These are referred to as ___________ algorithms. A. backward B. deskewing 偏移校正 C. forward D. keystream The Linux operating system uses _________ entropy sources for generating random numbers. A. four B. three C. one D. two In key distribution and reciprocal authentication schemes two communicating parties cooperate by exchanging messages to distribute keys and/or authenticate each other. In many cases ___________ are used for handshaking to prevent replay attacks. A. session keys B. nonces. 暂时 C. RC4's D. entropies The distribution of bits in a random number sequence should be ___________ , therefore the frequency of occurrence of ones and zeros should be approximately equal. A. independent B. uniform C. reversed D. streamed Public-key encryption is also known as ___________ . A. digital-key encryption B. asymmetric encryption C. one way time exchange encryption D. optimal-key encryption Asymmetric encryption can be used for __________ . A. both con dentiality and authentication B. neither con dentiality nor authentication C. con dentiality D. authentication Plaintext is recovered from the ciphertext using the paired key and a _____________ . A. digital signature B. recovery encryption C. decryption algorithm D. encryption algorithm The most widely used public-key cryptosystem is __________ . A. optimal asymmetric encryption B. asymmetric encryption C. RSA D. DES Public-key algorithms are based on __________ . A. permutation B. mathematical functions C. substitution D. symmetry __________ are two related keys, a public key and a private key that are used to perform complementary operations, such as encryption and decryption or signature generation and signature veri cation. A. Asymmetric keys B. Key exchanges C. Symmetric keys D. Cipher keys The __________ indicates that the subscriber identi ed in the certi cate has sole control and access to the private key. A. OAEP B. Public Key Certi cate C. Digital Signature D. PKI A __________ is a cryptographic algorithm that uses two related keys, a public key and a private key. The two keys have the property that deriving the private key from the public key is computationally infeasible. A. Private Key (Symmetric) Cryptographic Algorithm B. Key Exchange Cryptographic Algorithm C. Public Key (Asymmetric) Cryptographic Algorithm D. RSA Digital Cryptographic Algorithm A public-key encryption scheme has __________ ingredients. fi fi fi fi fi fi fi A. six B. four C. eight D. two The readable message or data that is fed into the algorithm as input is the ____________ . A. ciphertext B. exchange C. plaintext D. encryption Two issues to consider with the computation required to use RSA are encryption/decryption and __________ . A. time complexity B. trap-door one-way functions C. key generation D. asymmetric encryption padding __________ depend on the running time of the decryption algorithm. A. Mathematical attacks B. Timing attacks C. Chosen ciphertext attacks D. Brute-force attacks We de ne the ___________ of an algorithm to be f(n) if, for all n and all inputs of length n the execution of the algorithm takes at most f(n) steps. This is a common measure of the e ciency of an algorithm. A. time complexity B. one-way function C. timing attack D. OAEP The SSL Internet standard version is called _________ TLS The most complex part of TLS is the __________ Handshake protocol _______ provides secure, remote logon and other secure client/server facilities. SSH The ______ is used to convey TLS-related alerts to the peer entity. Alert protocol The _______ approach is vulnerable to man-in-the-middle attacks. Anonymous Di e-Hellman Cloud computing gives you the ability to expand and reduce resources according to your speci c service requirement. TRUE In a public cloud model the provider is responsible both for the cloud infrastructure and for the control of data and operations within the cloud. TRUE The term platform as a service has generally meant a package of security services o ered by a service provider that o oads much of the security responsibility from an enterprise to the security service provider FALSE The major advantage of the public cloud is cost. FALSE The security module for openStack is Keystone. FALSE An arbitrary byte sequence chosen by the server to identify an active or resumable session state is a _________ session identi er De ned as a Proposed Internet Standard in RFC 2246, _________ is an IETF standardization initiative whose goal is to produce an Internet standard version of SSL. TLS Phase _________ of the Handshake Protocol establishes security capabilities. ffi ffl ffi fi fi fi fi fi ff The nal message in phase 2, and one that is always required, is the ___________ message, which is sent by the server to indicate the end of the server hello and associated messages. 1 server_d one The symmetric encryption key for data encrypted by the client and decrypted by the server is a _________ . client write key With each element of the list de ning both a key exchange algorithm and a CipherSpec, the list that contains the combination of cryptographic algorithms supported by the client in decreasing order of preference is the __________ . CipherS uite _________ attacks include impersonating another user, altering messages in transit between client and server and altering information on a Web site. Active _________ is organized as three protocols that typically run on top of TCP for secure network communications and are designed to be relatively simple and inexpensive to implement. SSH _________ provides secure, remote logon and other secure client/server facilities. SSH IaaS provides service to customers in the form of software, speci cally application software, running on and accessible in the cloud. TRUE There is an increasingly prominent trend in many organizations to move a substantial portion or even all IT operations to enterprise cloud computing. TRUE Measured service and rapid elasticity are essential characteristics of _________. A. resource pooling B. cloud computing C. broad network access D. resource pooling A __________ cloud provides service to customers in the form of a platform on which the Customer's applications can run. A. broad network access B. infrastructure as a service C. platform as a service D. resource pooling The use of __________ avoids the complexity of software installation, maintenance, upgrades, and patches. A. SaaS B. MaaS C. PaaS D. IaaS A __________ infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services. A. community cloud B. private cloud C. hybrid cloud D. public cloud Examples of services delivered through the __________ include database on demand, e-mail on demand, and storage on demand. A. hybrid cloud B. public cloud C. private cloud D. community cloud The core of ___________ is the implementation of intrusion detection systems and intrusion prevention systems at entry points to the cloud and on servers in the cloud. A. Intrusion management B. SIEM C. security assessments D. web security A __________ interconnects the IoT-enabled devices with the higher-level communication networks. A. microcontroller B. gateway C. carrier D. sensor fi ff fi fi fi cloud computing____Is De ned as "a model for enabling ubiquitous, convenient, on demand network access to a shared pool of con gurable computing resources that can be rapidly provisioned and released with minimal management e ort or service provider interaction . NIST SP 800-145 de nes three service models: software as a service, platform as a service, and _Infrastructure____ as a service. The four most prominent deployment models for cloud computing are public cloud, community cloud, hybrid cloud and _private___ cloud. The _hybrid__ cloud infrastructure is a composition of two or more clouds that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability. A cloud __auditor审核员__ is a party that can conduct independent assessment of cloud services, information system operations, performance, and security of the cloud implementation. __IAM___ includes people, processes and systems that are used to manage access to enterprise resources by assuring that the identity of an entity is veri ed, then granting the correct level of access based on this assured identity. The __IoT___ is a term that refers to the expanding interconnection of smart devices, ranging from appliances to tiny sensors. With reference to the end systems supported, the Internet has gone through roughly four generations of deployment culminating in the IoT: information technology, operational technology, _Personal Technology___, and sensor/actuator technology. The core network, also referred to as a ___backBone__ network, connects geographically dispersed fog networks as well as provides access to other networks that are not part of the enterprise network. Kerberos provides a trusted third party authentication service that enables clients and TRUE servers to establish authenticated communication. Examples of dynamic biometrics include recognition by ngerprint, retina, and face. F/静态 (dynamic biometrics):Examples include recognition by voice pattern,handwriting characteristics,and typing rhythm. 动态⽣物 识别 User authentication is the basis for most types of access control and for user accountability. TRUE For network based user authentication the most important methods involve cryptographic keys and something the individual possesses, such as a smart card. TRUE There are a variety of problems including dealing with false positives and false negatives, user acceptance, cost, and convenience with respect to biometric authenticators. TRUE Any timestamp based procedure must allow for a window of time su ciently large enough to accommodate network delays yet su ciently small to minimize the opportunity for attack TRUE An e-mail message should be encrypted such that the mail handling system is not in possession of the decryption key. TRUE Because there are no potential delays in the e-mail process timestamps are extremely F useful. The operating system cannot enforce access-control policies based on user identity. F The security of the Kerberos server should not automatically be assumed but must be TRUE guarded carefully by taking precautions such as placing the server in a locked room. ffi fi fi TRUE ffi It is the ticket that proves the client's identity. fi F fi Once the server veri es that the user ID in the ticket is the same as the unencrypted user ID in the message it considers the user authenticated and grants the requested service. 1. __________ is an authentication service designed for use in a distributed environment. A. Kerberos B. PCBC C. Toklas D. X.509 4. The overall scheme of Kerberos is that of a trusted third party authentication service that uses a protocol based on a proposal by __________ . A. Needham and Schroeder B. Kehn C. Denning D. Gong Presenting an identi er to the security system is the __________ step. A. authentication B. veri cation C. identi cation D. clari cation Presenting or generating authentication information that corroborates the binding between the entity and the identi er is the ___________ step. A. identi cation B. veri cation C. clari cation D. authentication The __________ is unsuitable for a connectionless type of application because it requires the overhead of a handshake before any connectionless transmission e ectively negating the chief characteristic of a connectionless transaction. A. timestamp approach B. challenge-response approach C. simple replay approach D. one-way authentication approach Kerberos relies exclusively on __________ . A. symmetric encryption B. asymmetric encryption C. private key encryption D. public key encryption ff fi fi fi fi fi fi fi fi fi A __packet ltering_irewall applies a set of rules to each incoming and outgoing IP packet and then forwards or discards the packet