Which one of the following was an international standard for the format and information contained in a digital certificate?
You have been tasked with selecting a digital certificate standard for your company to use . Which one of the following was an international standard for the format and information contained in a digital certificate?A . CA B. X.509 C. CRL D. RFC 2298View AnswerAnswer: B Explanation: X.509 https://en.wikipedia.org/wiki/X.509 X.509...
What is Kerchoff's principle?
What is Kerchoff's principle?A . A minimum of 15 rounds is needed for a Feistel cipher to be secure B. Only the key needs to be secret, not the actual algorithm C. Both algorithm and key should be kept secret D. A minimum key size of 256 bits is necessary...
Protocol suite provides a method of setting up a secure channel for protected data exchange between two devices.
Protocol suite provides a method of setting up a secure channel for protected data exchange between two devices.A . CLR B. OCSP C. TLS D. IPSecView AnswerAnswer: D Explanation: IPSec https://en.wikipedia.org/wiki/IPsec Internet Protocol Security (IPsec) is a secure network protocol suite that authenticates and encrypts the packets of data to...
Encryption of the same plain text with the same key results in the same cipher text. Use of an IV that is XORed with the first block of plain text solves this problem.
Encryption of the same plain text with the same key results in the same cipher text. Use of an IV that is XORed with the first block of plain text solves this problem.A . CFB B. GOST C. ECB D. RC4View AnswerAnswer: C Explanation: ECB https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation The simplest of the...
Software for maintaining an on-the-fly-encrypted volume. Data is automatically encrypted right before it is saved, then decrypted right after it is loaded, all w/o user intervention.
Software for maintaining an on-the-fly-encrypted volume. Data is automatically encrypted right before it is saved, then decrypted right after it is loaded, all w/o user intervention.A . VPN B. PGP C. Cryptool D. VeraCryptView AnswerAnswer: D Explanation: VeraCrypt https://en.wikipedia.org/wiki/VeraCrypt VeraCrypt is a source-available freeware utility used for on-the-fly encryption (OTFE)....
The portion of AES where round keys are derived from the cipher key using Rijndael's key schedule is called what?
You are explaining the details of the AES algorithm to cryptography students. You are discussing the derivation of the round keys from the shared symmetric key. The portion of AES where round keys are derived from the cipher key using Rijndael's key schedule is called what?A . The key expansion...
Which of following would be an acceptable choice?
Jane is looking for an algorithm to ensure message integrity . Which of following would be an acceptable choice?A . RSA B. AES C. RC4 D. SHA-1View AnswerAnswer: D Explanation: Integrity. In information security, data integrity means maintaining and assuring the accuracy and completeness of data over its entire lifecycle....
Cylinder tool. Wrap leather around to decode. The diameter is the key. Used in 7th century BC by greek poet Archilochus.
Cylinder tool. Wrap leather around to decode. The diameter is the key. Used in 7th century BC by greek poet Archilochus.A . Cipher disk B. Caesar cipher C. Scytale D. Enigma machineView AnswerAnswer: C Explanation: Scytale https://en.wikipedia.org/wiki/Scytale A scytale is a tool used to perform a transposition cipher, consisting of...
During the process of encryption and decryption, what keys are shared?
During the process of encryption and decryption, what keys are shared?A . Public keys B. Public and private keys C. User passwords D. Private keysView AnswerAnswer: A Explanation: Public keys https://en.wikipedia.org/wiki/Public-key_cryptography Public-key cryptography, or asymmetric cryptography, is a cryptographic system that uses pairs of keys: public keys, which may be...
This is a 128 bit hash that is specified by RFC 132 1. It was designed by Ron Rivest in 1991 to replace an earlier hash function.
This is a 128 bit hash that is specified by RFC 132 1. It was designed by Ron Rivest in 1991 to replace an earlier hash function.A . SHA1 B. SHA-256 C. RSA D. MD5View AnswerAnswer: D Explanation: MD5 https://en.wikipedia.org/wiki/MD5 The MD5 message-digest algorithm is a widely used hash function...