CCSF CRYPTOGRAPHY TEST

An ecosystem which contains all elements to perform cryptgraphic function is called.....
Cryptosystem
Cryptographic Ecosystem
Secure Encryption System
Protected Key Management Framework
Which of the following determine the strength of an encryption method(Choose all that apply)
An fairly strong algorithm
The secrecy of the key
A short-sized key
The initialization vectors
Match the items on the left with the most approriate description on the right
0%
0
The range of values that can be used to construct a key.
0%
0
Key Space
0%
0
A template containing bit-wise key values which are usually XORed with the plaintext in order to produce a ciphertext
0%
0
The information that is to be concealed and transmitted
0%
0
Which cipher type is described in the picture?
0%
0
One-Time Pad
0%
0
During steganography, the payload is ...
0%
0
One-Time Pad
SCENARIO 1: A server needs to communicate with thousands of clients over the internet. Since the server handles financial transaction, there is a regulatory requirement that the communication between the server and the clients must be secured in transit. Given the time-sensitive nature of financial transactions, the IT Security team XYZ company recommends that a symmetric encryption method be used. Hence, a master key is created and stored with the server which creates multiple sub-keys from the master key. You are required to use this scenario to answer all relevant questions that follows.
Using Scanerio 1, What is the mechanisms used by the server to create sub-keys called
Key Initialization
Initialization Vector
Key Derivative Function
Key Initialization Function.
Using Scenario 1, why do you think the IT Security team of XYZ preffered to use symmetric encryption for this scenario
It is more secured
It has smaller key sizes which is easier for the server to handle
The financial transactions are time sensitive
All of the above
The public and private keys of an asymmetric cryptosystem are mathematically related, but if someone gets another person’s public key, she should be able to figure out the corresponding private key.
False
True
If Bob encrypts a message with his private key, choose which security property are rendered
Authentication
Non-repudiation
Integrity
Confidentiality
If Sally encrypts a message with Bob's public key, identify which types of attack can be protected against
Man-in-the-middle
Spoofing attack
Unathorized modification
Unathorized view of the message
Which of the following can be reffered to as 'Secret keys'
Symmetric encryption
Symmetric keys
Asymmetric encryption
Asymmetric keys
{"name":"CCSF CRYPTOGRAPHY TEST", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"An ecosystem which contains all elements to perform cryptgraphic function is called....., Which of the following determine the strength of an encryption method(Choose all that apply), Match the items on the left with the most approriate description on the right","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Make your own Survey
- it's free to start.