Info Security Chapter 3

A modern and visually appealing illustration of digital security concepts, featuring cryptography symbols, secure locks, and computer screens with security interfaces.

Info Security Challenge: Test Your Knowledge!

Welcome to the Info Security Chapter 3 Quiz! This quiz will test your understanding of fundamental concepts in information security, cryptography, and data protection. Dive into a variety of questions covering topics from hashing algorithms to key exchanges.

Whether you are a beginner or have some experience, this quiz challenges your knowledge with interesting questions and multiple-choice answers.

  • Multiple choice questions
  • Test your knowledge on cryptography
  • Learn while you challenge yourself
20 Questions5 MinutesCreated by GuardingData321
The Hashed Message Authentication Code (HMAC) _____.
Encrypts only the message
Encrypts only the key
Encrypts the key and the message
Encrypts the DHE key only
What is the latest version of the Secure Hash Algorithm?
SHA-2
SHA-3
SHA-4
SHA-5
Alexei was given a key to a substitution cipher. The key showed that the entire alphabet was rotated 13 steps. What type of cipher is this?
AES
XAND13
ROT13
Alphabetic
Abram was asked to explain to one of his coworkers the XOR cipher. He showed his coworker an example of adding two bits, 1 and 1. What is the result of this sum?
2
1
0
16
Which of the following key exchanges uses the same keys each time?
Diffie-Hellman-RSA (DHRSA)
Diffie-Hellman Ephemeral (DHE)
Diffie-Hellman (DH)
Elliptic Curve Diffie-Hellman (ECDH)
Public key systems that generate random public keys that are different for each session are called _____.
Public Key Exchange (PKE)
Perfect forward secrecy
Elliptic Curve Diffie-Hellman (ECDH)
Diffie-Hellman (DH)
What is data called that is to be encrypted by inputting it into a cryptographic algorithm?
Opentext
Plaintext
Cleartext
Ciphertext
Which of these is NOT a basic security protection for information that cryptography can provide?
Authenticity
Risk loss
Integrity
Confidentiality
Which areas of a file cannot be used by steganography to hide data?
In areas that contain the content data itself
In the file header fields that describe the file
In data that is used to describe the content or structure of the actual data
In the directory structure of the file system
Proving that a user sent an email message is known as _____.
Non-repudiation
Repudiation
Integrity
Availability
A(n) _____ is not decrypted but is only used for comparison purposes.
Key
Stream
Digest
Algorithm
Which of these is NOT a characteristic of a secure hash algorithm?
Collisions should be rare.
A message cannot be produced from a predefined hash.
The results of a hash function should not be reversed.
The hash should always be the same fixed size.
Alyosha was explaining to a friend the importance of protecting a cryptographic key from cryptoanalysis. He said that the key should not relate in a simple way to the cipher text. Which protection is Alyosha describing?
Diffusion
Confusion
Integrity
Chaos
Which of these is the strongest symmetric cryptographic algorithm?
Data Encryption Standard
Triple Data Encryption Standard
Advanced Encryption Standard
RC 1
If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message?
Alice’s private key
Bob’s public key
Alice’s public key
Bob’s private key
Egor wanted to use a digital signature. Which of the following benefits will the digital signature not provide?
Verify the sender
Prove the integrity of the message
Verify the receiver
Enforce nonrepudiation
Illya was asked to recommend the most secure asymmetric cryptographic algorithm to his supervisor. Which of the following did he choose?
SHA-2
ME-312
BTC-2
RSA
At a staff meeting one of the technicians suggested that the enterprise protect its new web server by hiding it and not telling anyone where it is located. Iosif raised his hand and said that security through obscurity was a poor idea. Why did he say that?
It is an unproven approach and has never been tested.
It would be too costly to have one isolated server by itself.
It would be essentially impossible to keep its location a secret from everyone
It depends too heavily upon non-repudiation in order for it to succeed.
What is a characteristic of the Trusted Platform Module (TPM)?
It provides cryptographic services in hardware instead of software
It allows the user to boot a corrupted disk and repair it
It is available only on Windows computers running BitLocker
It includes a pseudorandom number generator (PRNG)
Which of these has an onboard key generator and key storage facility, as well as accelerated symmetric and asymmetric encryption, and can back up sensitive material in encrypted form?
Trusted Platform Module (TPM)
Hardware Security Module (HSM)
Self-encrypting hard disk drives (SED)
Encrypted hardware-based USB devices
{"name":"Info Security Chapter 3", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Welcome to the Info Security Chapter 3 Quiz! This quiz will test your understanding of fundamental concepts in information security, cryptography, and data protection. Dive into a variety of questions covering topics from hashing algorithms to key exchanges.Whether you are a beginner or have some experience, this quiz challenges your knowledge with interesting questions and multiple-choice answers.Multiple choice questionsTest your knowledge on cryptographyLearn while you challenge yourself","img":"https:/images/course3.png"}
Powered by: Quiz Maker