102. Cryptographic methods work effectively as a security measure for information and communication systems. To achieve that goal, cryptographic methods must meet all the following
a.
Interoperableb.
Scalablec.
Mobiled.
PortableInteroperability is incorrect because it is needed in cryptography where two or more systems can interact with one another and exchange data according to a prescribed method to achieve predictable results. Mobility is incorrect because it is needed in cryptography to authenticate between local and remote systems. Portability is incorrect because it is needed in cryptography between operating systems and application systems. The other three choices are cryptography issues to deal with.
103. Which of the following provides less security?
a.
SHA-1b.
SHA-224c.
SHA-256d.
SHA-384Researchers discovered a way to “break” a number of hash algorithms, including MD4, MD5, HAVAL-128, RIPEMD, and SHA-0. New attacks on SHA-1 have indicated that SHA-1 provides less security than originally thought. Therefore, the use of SHA-1 is not recommended for generating digital signatures in new systems. New systems should use one of the larger and better hash functions, such as SHA-224, SHA-256, SHA-384, and SHA-512.
104. In symmetric cryptography, if there are four entities using encryption, how many keys are required for each relationship?
a.
4b.
6c.
8d.
12105. Which of the following key combinations is highly recommended to use in the triple data encryption algorithm (TDEA)?
a.
Independent key 1, Independent key 2, Independent key 3b.
Independent key 1, Independent key 2, Independent key 1c.
Independent key 1, Independent key 2, Independent key 2d.
Independent key 2, Independent key 3, Independent key 3106. For a cryptographic module, which of the following presents the correct relationships for sensitive security parameters?
a.
Port security parameters plus private security parametersb.
Critical security parameters plus public security parametersc.
Data security parameters plus critical security parametersd.
Public security parameters plus program security parameters