click below
click below
Normal Size Small Size show me how
cryptographic concep
CompTIA+ topic
Question | Answers |
---|---|
one way of confirming that software app comes from a trusted source is the verification of its digital signature. digitally signed soft. proves the identity of developer & guarantees that the application code hasnt been tampered since it was signed... | a. true |
Digital signatures provide: (Select 3 answers) | a. integrity b. authentication e. non-repudiation |
In cryptography, the number of bits in a key used by a cryptographic algorithm is referred to as a key size or key length... | a. true |
In cryptography, the term "Key stretching" refers to a mechanism for extending the length of a cryptographic key to make it more secure against brute-force attacks. | a. true |
Examples of key stretching algorithms include: (Select 2 answers) | c. bcrypt e. pbkdf2 |
Which of the following answers refers to a type of additional input that increases password complexity and provides better protection against brute-force, dictionary, and rainbow table attacks? | c. salt |
Pseudo-random data added to a password before hashing is called: | b. salt |
What are the characteristic features of Elliptic Curve Cryptography (ECC)? (Select 3 answers) | a. asymmetric encryption b. low processing power requirements c. suitable for small wireless devices |
Which of the following answers refers to a solution designed to strengthen the security of session keys? | b. pfs |
An emerging field of advanced computing technologies based on the principles of physics is known as: | c. quantum computing |
According to predictions, the most future-proof cryptographic solution should be: | c. post-quantum cryptography |
An asymmetric encryption key designed to be used only for a single session or transaction is known as: | b. ephemeral key |
What are the characteristic features of a session key? (Select 2 answers) | a. used during a single session d. symmetric key |
The term "Blockchain" refers to a decentralized digital ledger system (i.e. a specific type of a distributed database) stored across multiple computers in a P2P network. | a. true |
Unlike stream ciphers which process data by encrypting individual bits, block ciphers divide data into separate fragments and encrypt each fragment separately. | a. true |
Which of the following block cipher modes is the simplest/weakest and therefore not recommended for use? | c. ecb |
Which of the block cipher modes listed below provides both data integrity and confidentiality? | b. gcm |
Examples of techniques used for encrypting information include symmetric encryption (also called public-key encryption) and asymmetric encryption (also called secret-key encryption, or session-key encryption.) | b. false |
A type of encryption scheme where the same key is used to encrypt and decrypt data is referred to as: (Select 3 answers) | a. session key encryption c. symmetric encryption e. secret key encryption |
Symmetric encryption algorithms require large amounts of processing power for both encryption and decryption of data which makes them much slower in comparison to asymmetric encryption ciphers. | b. false |
In asymmetric encryption, any message encrypted with the use of a public key can only be decrypted by applying the same algorithm and a matching private key (and vice versa). | a. true |
Which of the algorithms listed below does not belong to the category of symmetric ciphers? | c. rsa |
Which of the algorithms listed below does not fall into the category of asymmetric encryption? | d. aes |
Which of the following terms illustrate the security through obscurity concept? (Select all that apply) | a. code obfuscation b. steganography c. ssid broadcast suppression |
What is the purpose of steganography? | c. hiding data within another piece of data |
Which of the following enables processing data in an encrypted form? | b. homomorphic encryption |
Which cryptographic solution would be best suited for low-power devices? | a. ecc |
Which of the following terms applies to the concept of confidentiality? | b. encyrption |
Which of the following terms applies to the concept of data integrity? | c. hashing |
Which of the following terms applies to the concept of obfuscation? | b. security through obscurity |
Which of the following terms applies to the authentication process? | b. mfa |
Which of the following terms applies to the concept of non-repudiation? | b. digital certificate |
The lack of entropy in the process of generating cryptographic keys improves the security of cryptographic algorithms. | b. false |