
Security+ Lesson 3
Authored by Alejandro Hidalgo
Computers
Professional Development

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
6 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an extension of the Diffie-Hellman key exchange into a complete discrete logarithm cryptosystem, allowing for tasks like general encryption?
RIPEMD
RSA
MD5
ElGamal
Answer explanation
ElGamal is an extension of the Diffie-Hellman key exchange designed by Taher Elgamal in 1985. It extends DH into a complete discrete logarithm cryptosystem, allowing for tasks like general encryption. Elgamal released his technique into the public domain, while at the time, RSA was proprietary, so the royalty-free nature gained its popularity. One disadvantage is that it generates ciphertext twice as long as the plaintext, so it increases the consumption of storage and bandwidth.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is the correct sequence of encryption ciphers from the weakest to the strongest?
DES > 3DES > Blowfish > AES
DES > Blowfish > AES > 3DES
3DES > DES > AES > Blowfish
3DES > DES > Blowfish > AES
Answer explanation
The correct sequence of encryption ciphers from the weakest to the strongest is as follows:
1 - Data Encryption Standard (DES)
2 - TripleDES (3DES)
3 - Blowfish
4 - Advanced Encryption Standard (AES)
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following is a certificate backed by a stricter identity validation process than the CA’s default?
Extended Validation
Domain validation
Machine authentication
Answer explanation
Extended Validation (EV) is a certificate backed by a stricter identity validation process than the CA’s default. It provides the highest available level of assurance. The CA issuing an EV certificate certifies that they have verified the identity and authenticity of the certificate subject. For SSL certificates used on the web, sites with a valid EV certificate show a distinct green color in the browser’s address bar. Generally, an EV certificate cannot also be a wildcard, but it might be multi-domain.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of cryptography is best suited for key generation?
Hashing
One-Time Pad
Symmetric encryption
Asymmetric encryption
Answer explanation
Since the output of a cryptographic hash is pseudorandom, it can be used anywhere pseudorandom data of a fixed length is desired. For example, you can securely generate a new key by hashing an existing key, arbitrary data, or some combination of the two. Hashing is particularly valuable for creating cryptographic keys from passwords created by humans. Since these passwords are often shorter and less random than modern keys, it’s a good idea to add a key stretching algorithm that makes brute force decryption more difficult.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a NIST standard that uses a discrete logarithm and is faster for data encryption and signature verification?
DSA
DH
HMAC
ECC
Answer explanation
Digital Signature Algorithm (DSA) is created by a former NSA employee in 1991 and soon adopted as a NIST standard. It uses a different one-way problem called a discrete logarithm. It is similar in overall strength to RSA at the same key length, but different in performance. DSA allows faster key generation and decryption and RSA is faster for data encryption and signature verification. RSA is more popular, and current DSA standards require 1024-bit keys, which are no longer considered secure.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following makes the mathematical relationship between the plaintext and the key as complex as possible, so that a partially correct key is useless to an attacker?
Transposition
Confusion
Diffusion
One-Time Pad
Answer explanation
Confusion makes the mathematical relationship between the plaintext and the key as complex as possible, so that a partially correct key is useless to an attacker. Every bit or character of the plaintext should be acted upon by more than one bit or character of the key. In a cipher with very strong confusion, changing a single bit of the key might change half the bits of the entire ciphertext.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
2 ANO TEC PROGRAMAÇÃO MOBILE AV1
Quiz
•
Professional Development
10 questions
Public Key Infrastructure
Quiz
•
Professional Development
10 questions
System Ethical Hacking
Quiz
•
Professional Development
10 questions
Basic Python
Quiz
•
Professional Development
10 questions
HTML y CSS 1
Quiz
•
Professional Development
10 questions
Bootstrap
Quiz
•
Professional Development
10 questions
Hàm
Quiz
•
Professional Development
10 questions
Excel 365
Quiz
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade
Discover more resources for Computers
10 questions
How to Email your Teacher
Quiz
•
Professional Development
6 questions
3RD GRADE DECLARATION OF INDEPENDENCE EXIT TICKET
Quiz
•
Professional Development
19 questions
Black History Month Trivia
Quiz
•
6th Grade - Professio...
22 questions
Multiplying Exponents with the Same Base
Quiz
•
9th Grade - Professio...
40 questions
Flags of the World
Quiz
•
KG - Professional Dev...