Sec 6.2, 6.3
![]() |
![]() |
![]() |
Title of test:![]() Sec 6.2, 6.3 Description: Sec 6.2, 6.3 |




New Comment |
---|
NO RECORDS |
Allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure channel. This key can then be used to encrypt subsequent communications using a symmetric key cipher. What is this?. Diffie-Hellman Key Exchange. SHA-2. MD5. RIPEMD. What is this?. Algorithm is a widely used hash function producing a 128-bit hash value. Although initially designed to be used as a cryptographic hash function, it has been found to suffer from extensive vulnerabilities. MD5. SHA-2. RIPEMD. HMAC. Hashing method Developed by the National Security Agency (NSA) and is a US Federal Information Processing Standard. Can go up to 512 bit digests. SHA-2. MD5. SHA-1. RIPEMD. Cryptographic hash function based upon the Merkle–Damgård construction. It is used in the Bitcoin standard. RIPEMD. MD5. HMAC. SHA-2. What is this? • Combine a hash with a secret key • Verify data integrity and authenticity • No fancy asymmetric encryption required • Used in network encryption protocols, ie IPsec, TLS. MD5. SHA-1. RIPEMD. HMAC. A symmetric key encryption algorithm that uses block cipher and is strong but is in limited used because of a short key length. DES. AES. HMAC. Blowfish. Latest symmetrical block cipher that is used today. AES. RC4. 3DES. DES. Stream cipher algorithm that is commonly implemented in commercial applications. RC4. RC6. AES. DES. What does this describe? • Asymmetrical • Does not itself encrypt or authenticate • It’s an anonymous key-agreement protocol • Used for Perfect Forward Secrecy. Diffie-Hellman. RSA. AES. RC4. Asymmetrical method of cryptography used in encryption and digital signatures. It's widely used as the standard today in encryption and the core technology in securing organizations doing business over the internet. RSA. AES. DES. RC4. The only form of cryptography that is totally unbreakable. However, the key itself must be as long as the message, therefore, it presents a huge storage tradeoff. One-time Pad. PGP. PAP. RC4. Encrypts email and is used as an alternative to S/MIME. Anyone can use it. PGP. One-time Pad. RSA. HMAC. Line these up. Hashing Technology. Encryption Technology. Name the internet transport encryption algorithms. Set of security protocols used to support VPNs. It provides for the secure exchange of packets at OSI model layer 3. Line these up. Strong. Weak. Which of the following are key stretching libraries? (Pick TWO). bcrypt. PBKDF2. NTLM. PGP. PKI. Set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. RC4 - strong or weak?. Strong. Weak. Certificates are used for: (Select TWO). Client authentication. WEP encryption. Access control lists. Code signing. Password hashing. Some customers have reported receiving an untrusted certificate warning when visiting the company’s website. The administrator ensures that the certificate is not expired and that customers have trusted the original issuer of the certificate. Which of the following could be causing the problem?. The intermediate CA certificates were not installed on the server. The certificate is not the correct type for a virtual server. The encryption key used in the certificate is too short. The client’s browser is trying to negotiate SSL instead of TLS. Digital certificates can be used to ensure which of the following? (Select TWO). Availability. Confidentiality. Verification. Authorization. Non-repudiation. What prevents one party from denying actions they carried out and is one thing that certificates ensure?. A system administrator wants to enable WPA2 CCMP. Which of the following is the only encryption used?. RC4. DES. 3DES. AES. |