Security+ Lesson 3
Quiz
•
Computers
•
Professional Development
•
Hard
Alejandro Hidalgo
FREE Resource
Enhance your content in a minute
6 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an extension of the Diffie-Hellman key exchange into a complete discrete logarithm cryptosystem, allowing for tasks like general encryption?
RIPEMD
RSA
MD5
ElGamal
Answer explanation
ElGamal is an extension of the Diffie-Hellman key exchange designed by Taher Elgamal in 1985. It extends DH into a complete discrete logarithm cryptosystem, allowing for tasks like general encryption. Elgamal released his technique into the public domain, while at the time, RSA was proprietary, so the royalty-free nature gained its popularity. One disadvantage is that it generates ciphertext twice as long as the plaintext, so it increases the consumption of storage and bandwidth.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is the correct sequence of encryption ciphers from the weakest to the strongest?
DES > 3DES > Blowfish > AES
DES > Blowfish > AES > 3DES
3DES > DES > AES > Blowfish
3DES > DES > Blowfish > AES
Answer explanation
The correct sequence of encryption ciphers from the weakest to the strongest is as follows:
1 - Data Encryption Standard (DES)
2 - TripleDES (3DES)
3 - Blowfish
4 - Advanced Encryption Standard (AES)
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following is a certificate backed by a stricter identity validation process than the CA’s default?
Extended Validation
Domain validation
Machine authentication
Answer explanation
Extended Validation (EV) is a certificate backed by a stricter identity validation process than the CA’s default. It provides the highest available level of assurance. The CA issuing an EV certificate certifies that they have verified the identity and authenticity of the certificate subject. For SSL certificates used on the web, sites with a valid EV certificate show a distinct green color in the browser’s address bar. Generally, an EV certificate cannot also be a wildcard, but it might be multi-domain.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of cryptography is best suited for key generation?
Hashing
One-Time Pad
Symmetric encryption
Asymmetric encryption
Answer explanation
Since the output of a cryptographic hash is pseudorandom, it can be used anywhere pseudorandom data of a fixed length is desired. For example, you can securely generate a new key by hashing an existing key, arbitrary data, or some combination of the two. Hashing is particularly valuable for creating cryptographic keys from passwords created by humans. Since these passwords are often shorter and less random than modern keys, it’s a good idea to add a key stretching algorithm that makes brute force decryption more difficult.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a NIST standard that uses a discrete logarithm and is faster for data encryption and signature verification?
DSA
DH
HMAC
ECC
Answer explanation
Digital Signature Algorithm (DSA) is created by a former NSA employee in 1991 and soon adopted as a NIST standard. It uses a different one-way problem called a discrete logarithm. It is similar in overall strength to RSA at the same key length, but different in performance. DSA allows faster key generation and decryption and RSA is faster for data encryption and signature verification. RSA is more popular, and current DSA standards require 1024-bit keys, which are no longer considered secure.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following makes the mathematical relationship between the plaintext and the key as complex as possible, so that a partially correct key is useless to an attacker?
Transposition
Confusion
Diffusion
One-Time Pad
Answer explanation
Confusion makes the mathematical relationship between the plaintext and the key as complex as possible, so that a partially correct key is useless to an attacker. Every bit or character of the plaintext should be acted upon by more than one bit or character of the key. In a cipher with very strong confusion, changing a single bit of the key might change half the bits of the entire ciphertext.
Similar Resources on Wayground
11 questions
ВебДиз4
Quiz
•
Professional Development
10 questions
HTML Introduction
Quiz
•
3rd Grade - Professio...
10 questions
Microsoft 365 for Teachers
Quiz
•
Professional Development
11 questions
Веб разработка Информатика
Quiz
•
Professional Development
10 questions
FP2: 02 - STRINGS
Quiz
•
Professional Development
10 questions
แบบทดสอบ การใช้งานโปรแกรม Microsoft Word
Quiz
•
Professional Development
10 questions
Bài 3 - Giới thiệu giao diện Photoshop
Quiz
•
Professional Development
10 questions
Web Development Quiz
Quiz
•
Professional Development
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
15 questions
4:3 Model Multiplication of Decimals by Whole Numbers
Quiz
•
5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
The Best Christmas Pageant Ever Chapters 1 & 2
Quiz
•
4th Grade
12 questions
Unit 4 Review Day
Quiz
•
3rd Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
