WGU D334 -CHAPTER 5 KNOWLEDGE CHECK
QUESTIONS WITH ANSWERS
Public-key cryptography requires the use of a single secret key in both encrypt
and decrypt a message.
False
What term corresponding to key exchange defines the idea that a comprise of
the long-term keys will not compromise any previous session keys.
Forward Secrecy
From the list below, check a possible solution in order to rectify Diffie
Hellman's susceptible to man-in-the-middle attacks.
The use of Public key encryption
______-bit prime numbers is the minimum recommended for use with Diffie
Hellman to counter attacks involving key precomputation.
2048
With asymmetric-key encryption, the major problem that comes into being is
how symmetric-key should be transmitted to move secret keys among
communication endpoints.
F
Among the given below select three options of valid schemes of exchanging
Secret Key in case of symmetric cryptograph?
Using Diffie - Hellman
, Key Exchange
Encrypt the key with a public key and pass it to the other side where the
matching private key can be used to decrypt it
What form of Diffie Hellman makes use of a different key for each connection?
DHE
With key exchange we normally have a time-out for the key to be used. At the
end of this period what happens to the key?
The key is re-negotiated
Diffie Hellman group 1 uses a _____-bit prime number.
768
The major weakness with Diffie Hellman is its susceptibility to having certain
parameter values easily _________.
precomputed
What methods can be used to overcome the weakness in Diffie Hellman
involving the ease at which values of Diffie Hellman parameters that use the
DHE_EXPORT cipher set are precomputed? Select all that apply.
Disable Export Cipher Suites
Use Co-prime factors
QUESTIONS WITH ANSWERS
Public-key cryptography requires the use of a single secret key in both encrypt
and decrypt a message.
False
What term corresponding to key exchange defines the idea that a comprise of
the long-term keys will not compromise any previous session keys.
Forward Secrecy
From the list below, check a possible solution in order to rectify Diffie
Hellman's susceptible to man-in-the-middle attacks.
The use of Public key encryption
______-bit prime numbers is the minimum recommended for use with Diffie
Hellman to counter attacks involving key precomputation.
2048
With asymmetric-key encryption, the major problem that comes into being is
how symmetric-key should be transmitted to move secret keys among
communication endpoints.
F
Among the given below select three options of valid schemes of exchanging
Secret Key in case of symmetric cryptograph?
Using Diffie - Hellman
, Key Exchange
Encrypt the key with a public key and pass it to the other side where the
matching private key can be used to decrypt it
What form of Diffie Hellman makes use of a different key for each connection?
DHE
With key exchange we normally have a time-out for the key to be used. At the
end of this period what happens to the key?
The key is re-negotiated
Diffie Hellman group 1 uses a _____-bit prime number.
768
The major weakness with Diffie Hellman is its susceptibility to having certain
parameter values easily _________.
precomputed
What methods can be used to overcome the weakness in Diffie Hellman
involving the ease at which values of Diffie Hellman parameters that use the
DHE_EXPORT cipher set are precomputed? Select all that apply.
Disable Export Cipher Suites
Use Co-prime factors