Page 569 - StudyBook.pdf
P. 569

Basis of Cryptography • Chapter 9  553

                 4. The primary limitation of symmetric cryptography is:

                    A. Key size
                    B. Processing power
                    C. Key distribution

                    D. Brute-force attacks

                 5. Which two of the following items most directly affect the security of an algo-
                    rithm?
                    A. The skill of the attacker
                    B. The key size

                    C. The security of the private or secret key
                    D. The resources of the attacker

                 6. Which of the following encryption methods is the most secure for encrypting a
                    single message?

                    A. Hash ciphers
                    B. OTPs
                    C. Asymmetric cryptography

                    D. Symmetric cryptography

                 7. You have downloaded a CD ISO image and want to verify its integrity.What
                    should you do?

                    A. Compare the file sizes.
                    B. Burn the image and see if it works.

                    C. Create an MD5 sum and compare it to the MD5 sum listed where the
                        image was downloaded.

                    D. Create an MD4 sum and compare it to the MD4 sum listed where the
                        image was downloaded.













                                                                              www.syngress.com
   564   565   566   567   568   569   570   571   572   573   574