100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

All Quizzes NORTH CAROLINA LOCKSMITH SECTION 8 EXAM Questions and Their Correct Solutions 2024!

Rating
-
Sold
-
Pages
18
Grade
A+
Uploaded on
11-11-2024
Written in
2024/2025

All Quizzes NORTH CAROLINA LOCKSMITH SECTION 8 EXAM Questions and Their Correct Solutions 2024! Which of the following is an advantage of ECDSA over RSA digital signatures? a. ECDSA is more efficient for generating digital signatures b. ECDSA is more efficient for verifying digital signatures c. ECDSA is simpler than RSA d. ECDSA can not be broken if non-random values are used - ANSWER a Where does TLS operate with respect to the network protocol stack? a. TLS operates between the physical hardware layer and data link protocols like Ethernet b. TLS operates between the data link protocols like Ethernet and IP c. TLS operates between IP and transport layer protocols like TCP d. TLS operates between transport layer protocols like TCP and application protocols like HTTP - ANSWER d The Heartbleed attack was an example of which of the following? a. a compromised certificate authority b. a compromised server c. a compromised client d. bugs in implementation - ANSWER d

Show more Read less
Institution
NORTH CAROLINA LOCKSMITH
Course
NORTH CAROLINA LOCKSMITH










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
NORTH CAROLINA LOCKSMITH
Course
NORTH CAROLINA LOCKSMITH

Document information

Uploaded on
November 11, 2024
Number of pages
18
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

All Quizzes NORTH CAROLINA
LOCKSMITH SECTION 8 EXAM




A
Questions and Their Correct




VI
Solutions 2024!


TU
Which of the following is an advantage of ECDSA over RSA digital signatures?
IS
a. ECDSA is more efficient for generating digital signatures
b. ECDSA is more efficient for verifying digital signatures
c. ECDSA is simpler than RSA
M
d. ECDSA can not be broken if non-random values are used - ANSWER a
O

Where does TLS operate with respect to the network protocol stack?

a. TLS operates between the physical hardware layer and data link protocols like
A



Ethernet
b. TLS operates between the data link protocols like Ethernet and IP
N



c. TLS operates between IP and transport layer protocols like TCP
d. TLS operates between transport layer protocols like TCP and application protocols
like HTTP - ANSWER d
JP




The Heartbleed attack was an example of which of the following?

a. a compromised certificate authority
b. a compromised server
c. a compromised client
d. bugs in implementation - ANSWER d

Which of the following best describes the ECDLP problem?

,a. solve for y in g^y = x mod p for given integers x, g, and p
b. solve for k in Q = kP for given points Q and P
c. compute P + Q for given points Q and P
d. compute kP for given interger k and point P - ANSWER b

Which of the following is not true about elliptic curves?

a. an equation of the form y^2 = x^3 + ax + b defines an elliptic curve




A
b. for every real value of x there is a corresponding y, such that (x, y) is a point on a
given elliptic curve




VI
c. there can be multiple values of y for a given x such that (x, y) is a point on a given
elliptic curve
d. an elliptic curve of the form y^2 = x^3 + ax + b is symmetric with respect to the x-axis




TU
- ANSWER b

Which of the following TLS 1.2 features was dropped by TLS 1.3?
IS
a. AES-GCM
b. AES-CCM
c. AES-CBC
d. ChaCha20-Poly1305 - ANSWER c
M

Assume that Alice chooses private value dA and computes public value PA and Bob
O

chooses private value dB and computes public value PB. How does Alice compute the
shared secret using ECDH?
A



a. S = PBdA
b. S = PAdB
N




c. dAPB
d. dBPA - ANSWER c
JP




Which of the following is not included in a ServerHello message in the TLS handshake
protocol?

a. the server's short-term public key
b. the session keys
c. a digital signature
d. a message authentication code - ANSWER b

, If points P and Q on an elliptic curve of the form y^2 = x^3 + ax + b have the same
x-coordinate, how do you compute P + Q?

a. compute the slope m = (yQ - yP) / (xQ - xP)
b. compute the slope m = (3xP^2 + a) / (2yP)
c. P + Q = (xP + xQ, yP + yQ)
d. P + Q = O - ANSWER d

What is a certificate?




A
a. a public key along with additional information authenticated using a digital signature




VI
b. a private key along with additional information authenticated using a digital signature
c. a public key along with additional information authenticated using a message
authentication code




TU
d. a private key along with additional information authenticated using a message
authentication code - ANSWER a

Which of the following best describes how RSA is used to generate digital signatures?
IS
a. the sender signs the message using her public key. the receiver uses the sender's
private key to verify it
b. the sender signs the message using her private key. the receiver uses the sender's
M
public key to verify it
c. the sender signs the message using the receiver's public key. the receiver uses his
O

own private key to verify it
d. the sender signs the message using the receiver's private key. the receiver uses his
own public key to verify it - ANSWER b
A



What is the different between the computational Diffie-Hellman (CDH) problem and the
N




decisional Diffie-Hellman (DDH) problem?

a. CDH is easier than the discrete logarithm problem (DLP). DDH is harder than DLP
JP




b. CDH involves computing the shared secret from the public values. DDH involves
distinguishing the shared secret from another generated value.
c. CDH provides a stronger hardness assumption than DDH
d. CDH involves computing one of the private values from one of the public values.
DDH involves computing one of the public values from one of the private values -
ANSWER b

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
JPNAOMISTUVIA Arizona Western College
View profile
Follow You need to be logged in order to follow users or courses
Sold
124
Member since
3 year
Number of followers
55
Documents
1258
Last sold
2 weeks ago
Unlock Your Potential with Our Comprehensive Study Guides Based on RESEARCH AND VERIFIED WORK!

Are you ready to elevate your learning experience FOR GRADE A+ RESULTS ? Our expertly crafted study guides are designed to empower students of all levels. Whether you're preparing for exams or mastering a new subject, Choose from digital downloads, bundled packages to suit your study style. Good Luck As You Study!

4.4

36 reviews

5
24
4
6
3
4
2
0
1
2

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions