MCQOPTIONS
Saved Bookmarks
This section includes 3 Mcqs, each offering curated multiple-choice questions to sharpen your Cryptography knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
The blowfish algorithm s key expansion converts a key of at most 448 bits into several subkey arrays totaling ___ bytes. |
| A. | 4096 |
| B. | 4608 |
| C. | 4168 |
| D. | 4864 |
| Answer» D. 4864 | |
| 2. |
A total of seven messages are required in the Public-Key distribution scenario. However, the initial five messages need to be used only infrequently because both A and B can save the other s public key for future a technique known as ____________ |
| A. | time stamping |
| B. | polling |
| C. | caching |
| D. | squeezing |
| Answer» D. squeezing | |
| 3. |
Suppose that A has obtained a certificate from certification authority X1 and B has obtained certificate authority from CA X2. A can use a chain of certificates to obtain B s public key. In notation of X.509, the correct order of this chain is represented as |
| A. | X2 X1 X1 B |
| B. | X1 X1 X2 A |
| C. | X1 X2 X2 B |
| D. | X1 X2 X2 A |
| Answer» D. X1 X2 X2 A | |