Beruflich Dokumente
Kultur Dokumente
IT SECURITY
TRUE/FALSE QUESTIONS:
1. The one way hash function is important not only in
message authentication but also in digital
signatures.
Ans: True
functions.
Ans: True
Ans: False
6. The appeal of HMAC is that its designers have been able to prove
an exact relationship between the strength of the embedded hash
function and the strength of HMAC.
Ans: True
Page 2 of 7
9. The Diffie-Hellman algorithm depends for its effectiveness on
the difficulty of computing discrete logarithms.
Ans: True
exchange.
Ans: True
and RSA.
Ans: False
13. SHA-3 algorithms must be designed to resist any potentially successful attack on
SHA-2 functions.
Ans: True
15. A hash function such as SHA-1 was not designed for use as a MAC and cannot
be used directly for that purpose because it does not rely on a secret key.
Ans: True
A. 256 B. 160
C. 384 D. 180
Ans: B. 160
Page 3 of 7
2. In 2005, NIST announced the intention to phase out approval of
and move to a reliance on the other SHA versions by 2010.
A. SHA-1 B. SHA-512
D. SHA-256 D. SHA-2
Ans: A. SHA-1
A. RSA B. SHA-3
C. DSS D. HMAC
Ans: D. HMAC
A. SHA-1
B. HMAC C. MD5
D. RSA
Ans: D. RSA
A. mathematical B. timing
C. brute-force D. chosen ciphertext
Page 4 of 7
Ans:C. brute-force
A. Mathematical B. Brute-force
Ans: A. Mathematical
A. mathematical B. timing
A. timing B. brute-force
Page 5 of 7
C. chosen cipher text D. mathematical
Ans: C. chosen cipher text
Ans: A. timing
A. NIST B. Diffie-Hellman
D. RC4 D. RSA
Ans: B. Diffie-Hellman
12. The National Institute of Standards and Technology has published Federal
Information Processing Standard FIPS PUB 186, known as the _.
A. XOR B. MD5
D. MAC D. DSS
Ans: D. DSS
A. ECC
Page 6 of 7
B. RSA C. DSS
D. XOR
Ans: C. DSS
A. ECC B. MD5
Ans: A. ECC
A. HMAC B. XOR
C. RSA D. SHA-1
Ans: D. SHA-1
Ans: SHA - 2
3. The evaluation criteria for the new hash function are: security,
, and algorithm and implementation characteristics.
Ans: cost
Ans: HMAC
Ans: RSA
Ans: Mathematical
Page 8 of 7
Ans: Digital Signature Standard (DSS)
Ans: SHA-3
Ans: MD5
Ans: Cryptographic
Page 9 of 7
15. Perhaps the most widely used public-key algorithms are
and Diffie-Hellman.
Ans: RSA
Page 10 of
7