merkow_tb_11

merkow_tb_11 - CHAPTER 11: CRYPTOGRAPHY Multiple Choice: 1....

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
CHAPTER 11: CRYPTOGRAPHY Multiple Choice: 1. Cryptographic keys are used to do all of the following except: A. Keep messages private B. Authenticate the sender C. Test the integrity of messages D. Maintain the receiver’s privacy Answer: D Reference: Introduction Difficulty: moderate 2. Which of the following is NOT a principle of the U.S. encryption export policy? A. Review encryption products prior to sale B. Postexport reporting C. Break cryptosystems to eavesdrop into foreign communications D. License review of exports and re-exports of strong encryption to foreign governments Answer: C Reference: Applying Cryptography to Information Systems Difficulty: moderate 3. The science of breaking a cryptosystem is known as ____________. A. Cryptography B. Cryptanalysis C. Encryption D. Decryption Answer: B Reference: Basic Terms and Concepts Difficulty: moderate 4. Cryptographers rely on which of the following to disguise messages? A. Transposition B. Substitution C. Both A and B D. None of the above
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Answer: C Reference: Basic Terms and Concepts Difficulty: easy 5. ____________ is the message passed through (a) ____________ to become ____________. A. Plaintext, cipher, ciphertext B. Ciphertext, cipher, plaintext C. Cipher, plaintext, ciphertext D. Cipher, ciphertext, plaintext Answer: A Reference: Basic Terms and Concepts Difficulty: moderate 6. Which of the following is NOT a characteristic of common commercial cryptosystems? A. Algorithms made readily available to the public B. A key is used to encrypt messages C. Keys and algorithms are published D. A key is used to decrypt messages Answer: C Reference: Strength of Cryptosystems Difficulty: moderate 7. Computers are ____________ and at some point a random number generator becomes ____________. A. Periodic, deterministic B. Deterministic, periodic C. Pseudorandom, deterministic D. Deterministic, pseudorandom Answer: B Reference: FYI: Random Number Requirements Difficulty: moderate 8. Which of the following is NOT true for strong cryptosystems? A. Ciphertext always appears random to statistical tests B. Resists known attacks on cryptosystems C. Brutally tested to ensure integrity D. Only the keys are made public Answer: D Reference: Strength of Cryptosystems Difficulty: moderate 9. Which of the following uses symmetric key or shared secret cryptography? A. DES
Background image of page 2
B. RSA C. PGP D. ROT Answer: A Reference: The Role of Keys in Cryptosystems Difficulty: moderate 10. Adopted as a Federal Information Processing Standard, ____________ was developed by IBM for use with unclassified government communications. A.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 10

merkow_tb_11 - CHAPTER 11: CRYPTOGRAPHY Multiple Choice: 1....

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online