56 Chapter 3 ■ Security Architecture and Engineering (Domain 3)
- When Bob receives the encrypted message from Alice, what key does he use to decrypt the
message?
A. Alice’s public key
B. Alice’s private key
C. Bob’s public key
D. Bob’s private key - Which one of the following keys would Bob not possess in this scenario?
A. Alice’s public key
B. Alice’s private key
C. Bob’s public key
D. Bob’s private key - Alice would also like to digitally sign the message that she sends to Bob. What key should
she use to create the digital signature?
A. Alice’s public key
B. Alice’s private key
C. Bob’s public key
D. Bob’s private key - What name is given to the random value added to a password in an attempt to defeat
rainbow table attacks?
A. Hash
B. Salt
C. Extender
D. Rebar - Which one of the following is not an attribute of a hashing algorithm?
A. They require a cryptographic key.
B. They are irreversible.
C. It is very difficult to find two messages with the same hash value.
D. They take variable-length input. - What type of fire suppression system fills with water when the initial stages of a fire are
detected and then requires a sprinkler head heat activation before dispensing water?
A. Wet pipe
B. Dry pipe