All Quizzes NORTH CAROLINA LOCKSMITH SECTION 8 EXAM Questions and Their Correct Solutions 2024!
1 view 0 purchase
Course
NORTH CAROLINA LOCKSMITH
Institution
NORTH CAROLINA LOCKSMITH
All Quizzes NORTH CAROLINA LOCKSMITH SECTION 8 EXAM Questions and Their Correct Solutions 2024!
Which of the following is an advantage of ECDSA over RSA digital signatures?
a. ECDSA is more efficient for generating digital signatures
b. ECDSA is more efficient for verifying digital signatur...
All Quizzes NORTH CAROLINA
LOCKSMITH SECTION 8 EXAM
A
Questions and Their Correct
VI
Solutions 2024!
TU
Which of the following is an advantage of ECDSA over RSA digital signatures?
IS
a. ECDSA is more efficient for generating digital signatures
b. ECDSA is more efficient for verifying digital signatures
c. ECDSA is simpler than RSA
M
d. ECDSA can not be broken if non-random values are used - ANSWER a
O
Where does TLS operate with respect to the network protocol stack?
a. TLS operates between the physical hardware layer and data link protocols like
A
Ethernet
b. TLS operates between the data link protocols like Ethernet and IP
N
c. TLS operates between IP and transport layer protocols like TCP
d. TLS operates between transport layer protocols like TCP and application protocols
like HTTP - ANSWER d
JP
The Heartbleed attack was an example of which of the following?
a. a compromised certificate authority
b. a compromised server
c. a compromised client
d. bugs in implementation - ANSWER d
Which of the following best describes the ECDLP problem?
,a. solve for y in g^y = x mod p for given integers x, g, and p
b. solve for k in Q = kP for given points Q and P
c. compute P + Q for given points Q and P
d. compute kP for given interger k and point P - ANSWER b
Which of the following is not true about elliptic curves?
a. an equation of the form y^2 = x^3 + ax + b defines an elliptic curve
A
b. for every real value of x there is a corresponding y, such that (x, y) is a point on a
given elliptic curve
VI
c. there can be multiple values of y for a given x such that (x, y) is a point on a given
elliptic curve
d. an elliptic curve of the form y^2 = x^3 + ax + b is symmetric with respect to the x-axis
TU
- ANSWER b
Which of the following TLS 1.2 features was dropped by TLS 1.3?
IS
a. AES-GCM
b. AES-CCM
c. AES-CBC
d. ChaCha20-Poly1305 - ANSWER c
M
Assume that Alice chooses private value dA and computes public value PA and Bob
O
chooses private value dB and computes public value PB. How does Alice compute the
shared secret using ECDH?
A
a. S = PBdA
b. S = PAdB
N
c. dAPB
d. dBPA - ANSWER c
JP
Which of the following is not included in a ServerHello message in the TLS handshake
protocol?
a. the server's short-term public key
b. the session keys
c. a digital signature
d. a message authentication code - ANSWER b
, If points P and Q on an elliptic curve of the form y^2 = x^3 + ax + b have the same
x-coordinate, how do you compute P + Q?
a. compute the slope m = (yQ - yP) / (xQ - xP)
b. compute the slope m = (3xP^2 + a) / (2yP)
c. P + Q = (xP + xQ, yP + yQ)
d. P + Q = O - ANSWER d
What is a certificate?
A
a. a public key along with additional information authenticated using a digital signature
VI
b. a private key along with additional information authenticated using a digital signature
c. a public key along with additional information authenticated using a message
authentication code
TU
d. a private key along with additional information authenticated using a message
authentication code - ANSWER a
Which of the following best describes how RSA is used to generate digital signatures?
IS
a. the sender signs the message using her public key. the receiver uses the sender's
private key to verify it
b. the sender signs the message using her private key. the receiver uses the sender's
M
public key to verify it
c. the sender signs the message using the receiver's public key. the receiver uses his
O
own private key to verify it
d. the sender signs the message using the receiver's private key. the receiver uses his
own public key to verify it - ANSWER b
A
What is the different between the computational Diffie-Hellman (CDH) problem and the
N
decisional Diffie-Hellman (DDH) problem?
a. CDH is easier than the discrete logarithm problem (DLP). DDH is harder than DLP
JP
b. CDH involves computing the shared secret from the public values. DDH involves
distinguishing the shared secret from another generated value.
c. CDH provides a stronger hardness assumption than DDH
d. CDH involves computing one of the private values from one of the public values.
DDH involves computing one of the public values from one of the private values -
ANSWER b
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller JPNAOMISTUVIA. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $8.99. You're not tied to anything after your purchase.