Which of the following identifies the encryption algorithm selected by NIST for the new Advanced Encryption Standard?
Which of the following is not a disadvantage of symmetric cryptography when compared with Asymmetric Ciphers?
Which of the following was not designed to be a proprietary encryption algorithm?
Which of the following ciphers is a subset on which the Vigenere polyalphabetic cipher was based on?
What is the key size of the International Data Encryption Algorithm (IDEA)?
Which of the following is defined as an Internet, IPsec, key-establishment protocol, partly based on OAKLEY, that is intended for putting in place authenticated keying material for use with ISAKMP and for other security associations?
Kerberos depends upon what encryption method?
In a hierarchical PKI the highest CA is regularly called Root CA, it is also referred to by which one of the following term?
Which type of algorithm is considered to have the highest strength per bit of key length of any of the asymmetric algorithms?
Which of the following ASYMMETRIC encryption algorithms is based on the difficulty of FACTORING LARGE NUMBERS?
What is a characteristic of using the Electronic Code Book mode of DES encryption?
Which of the following is a cryptographic protocol and infrastructure developed to send encrypted credit card numbers over the Internet?
What is the primary role of cross certification?
What key size is used by the Clipper Chip?
What are the three most important functions that Digital Signatures perform?
Which of the following can best be defined as a cryptanalysis technique in which the analyst tries to determine the key from knowledge of some plaintext-ciphertext pairs?
What can be defined as secret communications where the very existence of the message is hidden?
Where parties do not have a shared secret and large quantities of sensitive information must be passed, the most efficient means of transferring information is to use Hybrid Encryption Methods. What does this mean?
A X.509 public key certificate with the key usage attribute "non repudiation" can be used for which of the following?
Which of the following statements pertaining to stream ciphers is correct?