Chapter 5 NSS

Is this your test? Login to manage it. If not, you can develop an exam just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
Which protection is provided by hashing?
2.
1 point
Which of these is the strongest symmetric cryptographic algorithm?
3.
1 point
What is the latest version of the Secure Hash Algorithm?
4.
1 point
The areas of a file in which steganography can hide data include all of the following EXCEPT _______.
5.
1 point
A digital signature can provide each of the following benefits EXCEPT _______.
6.
1 point
What is data called that is to be encrypted by inputting it into an cryptographic algorithm?
7.
1 point
Which of these has an onboard key generator and key storage facility, as well as accelerated symmetric and asymmetric encryption, and can back up sensitive material in encrypted form?
8.
1 point
Which of the following key exchanges uses the same keys each time?
9.
1 point
Which of these is NOT a basic security protection for information that cryptography can provide?
10.
1 point
Public key systems that generate random public keys that are different for each session are called _______.
11.
1 point
Proving that a user sent an email message is known as _______.
12.
1 point
Elliptic Curve Diffie–Hellman (ECDH) is an example of _________.
13.
1 point
All of the following can be broken mathematically EXCEPT _______.
14.
1 point
Which of these is NOT a characteristic of a secure hash algorithm
15.
1 point
Which asymmetric encryption algorithm uses prime numbers?
16.
1 point
The Hashed Message Authentication Code (HMAC) ____________.
17.
1 point
If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message?
18.
1 point
Which asymmetric cryptographic algorithm is the most secure?
19.
1 point
The Trusted Platform Module (TPM) _________.
20.
1 point
A(n) ________ is not decrypted but is only used for comparison purposes.