Which requirement of secure communications is ensured by the implementation of MD5 or SHA hash generating algorithms?

C6 - Quiz

Quiz
•
Instructional Technology
•
Professional Development
•
Easy

Instructor Instructor
Used 1+ times
FREE Resource
23 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
confidentiality
authentication
integrity
nonrepudiation
Answer explanation
Integrity is ensured by implementing either MD5 or SHA hash generating algorithms. Many modern networks ensure authentication with protocols, such as HMAC. Data confidentiality is ensured through symmetric encryption algorithms, including DES, 3DES, and AES. Data confidentiality can also be ensured using asymmetric algorithms, including RSA and PKI.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is another name for confidentiality of information?
privacy
accuracy
consistency
trustworthiness
Answer explanation
Privacy is another name for confidentiality. Accuracy, consistency, and trustworthiness describe integrity of data.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
As data is being stored on a local hard disk, which method would secure the data from unauthorized access?
data encryption
a duplicate hard drive copy
deletion of sensitive files
two factor authentication
Answer explanation
Data encryption is the process of converting data into a form where only a trusted, authorized person with a secret key or password can decrypt the data and access the original form.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What popular encryption algorithm requires that both the sender and receiver know a pre-shared key?
PKI
MD5
HMAC
AES
Answer explanation
MD5 is a hashing algorithm that guarantees that no one intercepted the message and altered it. Advanced Encryption Standard (AES) is a popular symmetric encryption algorithm where each communicating party needs to know the pre-shared key. Public key infrastructure (PKI) is an asymmetric encryption algorithm based on the assumption that the two communicating parties have not previously shared a secret key. HMAC is a hash message authentication code that guarantees that the message is not a forgery and actually comes from the authentic source.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
The following message was encrypted using a Caesar cipher with a key of 2:
fghgpf vjg ecuvng
What is the plaintext message?
defend the region
invade the castle
defend the castle
invade the region
Answer explanation
The Caesar cipher was a simple substitution cipher. In this example, if the key is 2, the letter d was moved two spaces to the right, resulting in an encoded message that used the letter f in place of the letter d . The letter g would be the substitute for the letter e , and so on. So, the resulting plaintext is f= d , g= e , h= f , g= e , p= n , f= d , v= t , j= h , g= e , e= c , c= a , u= s , v= t , n= l , g= e .
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is an example of the one-time pad cipher?
RC4
Rail Fence
Caesar
Vigenere
Answer explanation
RC4 is an example of the one-time pad cipher, and it is widely used on the Internet. The Caesar cipher is a simple substitution cipher, and the Vigenère cipher is based on the Caesar cipher. An example of a transposition cipher is the rail fence cipher.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
In which method used in cryptanalysis does the attacker know a portion of the plaintext and the corresponding ciphertext?
brute-force
ciphertext
chosen-plaintext
meet-in-the-middle
Answer explanation
There are several methods used in cryptanalysis:
Brute-force - The attacker tries every possible key knowing that eventually one of them will work.
Ciphertext - The attacker has the ciphertext of several messages encrypted but no knowledge of the underlying plaintext.
Known-Plaintext - The attacker has access to the ciphertext of several messages and knows something about the plaintext underlying that ciphertext.
Chosen-Plaintext - The attacker chooses which data the encryption device encrypts and observes the ciphertext output.
Chosen-Ciphertext - The attacker can choose different ciphertext to be decrypted and has access to the decrypted plaintext.
Meet-in-the-Middle - The attacker knows a portion of the plaintext and the corresponding ciphertext.
Create a free account and access millions of resources
Similar Resources on Quizizz
20 questions
Music Theory Including Chord Inversions

Quiz
•
Professional Development
20 questions
PM Overview and Integration

Quiz
•
Professional Development
20 questions
Google Professional Architect 5 - 81 to 100

Quiz
•
Professional Development
20 questions
Google Professional Architect 2 - 21 to 40

Quiz
•
Professional Development
20 questions
API Design Basic

Quiz
•
Professional Development
21 questions
CPA MS-Office Hotkeys Quiz

Quiz
•
8th Grade - Professio...
27 questions
C2 - Quiz

Quiz
•
Professional Development
26 questions
Sílabas

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade