Page 569 - StudyBook.pdf
P. 569
Basis of Cryptography • Chapter 9 553
4. The primary limitation of symmetric cryptography is:
A. Key size
B. Processing power
C. Key distribution
D. Brute-force attacks
5. Which two of the following items most directly affect the security of an algo-
rithm?
A. The skill of the attacker
B. The key size
C. The security of the private or secret key
D. The resources of the attacker
6. Which of the following encryption methods is the most secure for encrypting a
single message?
A. Hash ciphers
B. OTPs
C. Asymmetric cryptography
D. Symmetric cryptography
7. You have downloaded a CD ISO image and want to verify its integrity.What
should you do?
A. Compare the file sizes.
B. Burn the image and see if it works.
C. Create an MD5 sum and compare it to the MD5 sum listed where the
image was downloaded.
D. Create an MD4 sum and compare it to the MD4 sum listed where the
image was downloaded.
www.syngress.com