Which requirement of secure communications is ensured by the implementation of MD5 or SHA hash generating algorithms?

C6 - Quiz

Quiz
•
Instructional Technology
•
Professional Development
•
Easy

Instructor Instructor
Used 1+ times
FREE Resource
23 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
confidentiality
authentication
integrity
nonrepudiation
Answer explanation
Integrity is ensured by implementing either MD5 or SHA hash generating algorithms. Many modern networks ensure authentication with protocols, such as HMAC. Data confidentiality is ensured through symmetric encryption algorithms, including DES, 3DES, and AES. Data confidentiality can also be ensured using asymmetric algorithms, including RSA and PKI.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is another name for confidentiality of information?
privacy
accuracy
consistency
trustworthiness
Answer explanation
Privacy is another name for confidentiality. Accuracy, consistency, and trustworthiness describe integrity of data.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
As data is being stored on a local hard disk, which method would secure the data from unauthorized access?
data encryption
a duplicate hard drive copy
deletion of sensitive files
two factor authentication
Answer explanation
Data encryption is the process of converting data into a form where only a trusted, authorized person with a secret key or password can decrypt the data and access the original form.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What popular encryption algorithm requires that both the sender and receiver know a pre-shared key?
PKI
MD5
HMAC
AES
Answer explanation
MD5 is a hashing algorithm that guarantees that no one intercepted the message and altered it. Advanced Encryption Standard (AES) is a popular symmetric encryption algorithm where each communicating party needs to know the pre-shared key. Public key infrastructure (PKI) is an asymmetric encryption algorithm based on the assumption that the two communicating parties have not previously shared a secret key. HMAC is a hash message authentication code that guarantees that the message is not a forgery and actually comes from the authentic source.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
The following message was encrypted using a Caesar cipher with a key of 2:
fghgpf vjg ecuvng
What is the plaintext message?
defend the region
invade the castle
defend the castle
invade the region
Answer explanation
The Caesar cipher was a simple substitution cipher. In this example, if the key is 2, the letter d was moved two spaces to the right, resulting in an encoded message that used the letter f in place of the letter d . The letter g would be the substitute for the letter e , and so on. So, the resulting plaintext is f= d , g= e , h= f , g= e , p= n , f= d , v= t , j= h , g= e , e= c , c= a , u= s , v= t , n= l , g= e .
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is an example of the one-time pad cipher?
RC4
Rail Fence
Caesar
Vigenere
Answer explanation
RC4 is an example of the one-time pad cipher, and it is widely used on the Internet. The Caesar cipher is a simple substitution cipher, and the Vigenère cipher is based on the Caesar cipher. An example of a transposition cipher is the rail fence cipher.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
In which method used in cryptanalysis does the attacker know a portion of the plaintext and the corresponding ciphertext?
brute-force
ciphertext
chosen-plaintext
meet-in-the-middle
Answer explanation
There are several methods used in cryptanalysis:
Brute-force - The attacker tries every possible key knowing that eventually one of them will work.
Ciphertext - The attacker has the ciphertext of several messages encrypted but no knowledge of the underlying plaintext.
Known-Plaintext - The attacker has access to the ciphertext of several messages and knows something about the plaintext underlying that ciphertext.
Chosen-Plaintext - The attacker chooses which data the encryption device encrypts and observes the ciphertext output.
Chosen-Ciphertext - The attacker can choose different ciphertext to be decrypted and has access to the decrypted plaintext.
Meet-in-the-Middle - The attacker knows a portion of the plaintext and the corresponding ciphertext.
Create a free account and access millions of resources
Similar Resources on Quizizz
20 questions
Security Plus 1-02

Quiz
•
Professional Development
20 questions
Module 1 - Modern Management

Quiz
•
Professional Development
20 questions
Google Professional Architect 8 - 141 to 160

Quiz
•
Professional Development
20 questions
Core 1 Test Review

Quiz
•
Professional Development
20 questions
API Design Basic

Quiz
•
Professional Development
26 questions
SEC+ set 1

Quiz
•
Professional Development
20 questions
MD 100 Review

Quiz
•
Professional Development
20 questions
Malware/ IOC

Quiz
•
10th Grade - Professi...
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade