Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

The Secure Hash Algorithm (SHA-1) creates:

A.

a fixed length message digest from a fixed length input message

B.

a variable length message digest from a variable length input message

C.

a fixed length message digest from a variable length input message

D.

a variable length message digest from a fixed length input message

Which of the following statements is most accurate regarding a digital signature?

A.

It is a method used to encrypt confidential data.

B.

It is the art of transferring handwritten signature to electronic media.

C.

It allows the recipient of data to prove the source and integrity of data.

D.

It can be used as a signature system and a cryptosystem.

What algorithm has been selected as the AES algorithm, replacing the DES algorithm?

A.

RC6

B.

Twofish

C.

Rijndael

D.

Blowfish

In a Public Key Infrastructure, how are public keys published?

A.

They are sent via e-mail.

B.

Through digital certificates.

C.

They are sent by owners.

D.

They are not published.

Which of the following is defined as a key establishment protocol based on the Diffie-Hellman algorithm proposed for IPsec but superseded by IKE?

A.

Diffie-Hellman Key Exchange Protocol

B.

Internet Security Association and Key Management Protocol (ISAKMP)

C.

Simple Key-management for Internet Protocols (SKIP)

D.

OAKLEY

What level of assurance for a digital certificate verifies a user's name, address, social security number, and other information against a credit bureau database?

A.

Level 1/Class 1

B.

Level 2/Class 2

C.

Level 3/Class 3

D.

Level 4/Class 4

Which of the following is NOT an asymmetric key algorithm?

A.

RSA

B.

Elliptic Curve Cryptosystem (ECC)

C.

El Gamal

D.

Data Encryption System (DES)

Which of the following are suitable protocols for securing VPN connections at the lower layers of the OSI model?

A.

S/MIME and SSH

B.

TLS and SSL

C.

IPsec and L2TP

D.

PKCS#10 and X.509

Which of the following keys has the SHORTEST lifespan?

A.

Secret key

B.

Public key

C.

Session key

D.

Private key

Where parties do not have a shared secret and large quantities of sensitive information must be passed, the most efficient means of transferring information is to use Hybrid Encryption Methods. What does this mean?

A.

Use of public key encryption to secure a secret key, and message encryption using the secret key.

B.

Use of the recipient's public key for encryption and decryption based on the recipient's private key.

C.

Use of software encryption assisted by a hardware encryption accelerator.

D.

Use of elliptic curve encryption.

What is the primary role of smartcards in a PKI?

A.

Transparent renewal of user keys

B.

Easy distribution of the certificates between the users

C.

Fast hardware encryption of the raw data

D.

Tamper resistant, mobile storage and application of private keys of the users

What is the main problem of the renewal of a root CA certificate?

A.

It requires key recovery of all end user keys

B.

It requires the authentic distribution of the new root CA certificate to all PKI participants

C.

It requires the collection of the old root CA certificates from all the users

D.

It requires issuance of the new root CA certificate

Which type of encryption is considered to be unbreakable if the stream is truly random and is as large as the plaintext and never reused in whole or part?

A.

One Time Pad (OTP)

B.

One time Cryptopad (OTC)

C.

Cryptanalysis

D.

Pretty Good Privacy (PGP)

Which of the following offers confidentiality to an e-mail message?

A.

The sender encrypting it with its private key.

B.

The sender encrypting it with its public key.

C.

The sender encrypting it with the receiver's public key.

D.

The sender encrypting it with the receiver's private key.

What uses a key of the same length as the message where each bit or character from the plaintext is encrypted by a modular addition?

A.

Running key cipher

B.

One-time pad

C.

Steganography

D.

Cipher block chaining

Which of the following statements pertaining to Secure Sockets Layer (SSL) is false?

A.

The SSL protocol was developed by Netscape to secure Internet client-server transactions.

B.

The SSL protocol's primary use is to authenticate the client to the server using public key cryptography and digital certificates.

C.

Web pages using the SSL protocol start with HTTPS

D.

SSL can be used with applications such as Telnet, FTP and email protocols.

The DES algorithm is an example of what type of cryptography?

A.

Secret Key

B.

Two-key

C.

Asymmetric Key

D.

Public Key

The Clipper Chip utilizes which concept in public key cryptography?

A.

Substitution

B.

Key Escrow

C.

An undefined algorithm

D.

Super strong encryption

What is the effective key size of DES?

A.

56 bits

B.

64 bits

C.

128 bits

D.

1024 bits

What is the RESULT of a hash algorithm being applied to a message ?

A.

A digital signature

B.

A ciphertext

C.

A message digest

D.

A plaintext