401_4 Flashcards

1
Q

What are the three general types of cryptosystems?

A
  1. Symmetric
  2. Asymmetric
  3. Hash
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does cryptography mean?

A

Hidden writing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What two distinct operations does every cryptographic algorithm perform?

A
  1. Encryption

2. Decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In cryptography, what is the mathematical formula used to encrypt a message called?

A

Encryption Algorithm or Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Once a message has been transformed with a cipher, what is the resulting message called?

A

Ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cryptographically speaking, what is the collection of all possible inputs and all possible outputs, in addition to the algorithm and keys called?

A

Cryptosystem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The Rijndael algorithm cannot be “broken” for how many years?

A

14 Trillion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Who creates encryption algorithms?

A

cryptographers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What do cryptanalysts dedicate their lives to doing?

A

breaking ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the generic term given to the study of both cryptgrphay and crytanalysis?

A

Cryptology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The strength of a cryptosystem rests with the strength of its _______.

A

Keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

128-bit keys offer approximately how many times more protection than 40-bit keys?

A

A trillion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

although it is obvious that a 128-bit key is longer than a 40-bit key, the difference in the amount of protection ___________, not _________.

A

exponential, not linear

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the goals of a cryptosystem?

A
  1. Confidentiality
  2. Integrity
  3. Authentication
  4. Non-repudiation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the two basic methods of symmetrically encrypting or garbling text?

A
  1. Substitution

2. Permutation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What boolean function is one of the fundamental operations used in cryptography?

A

Exclusive OR (XOR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

When is the output of an XOR true?

A

If exactly one of the inputs is true.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

With respect to encryption techniques, ________, also called ________, shuffles the order in which characters (or bytes) appear rather than substituting one for another.

A

Permutation

Transposition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which type of cryptosystem uses a single key for both encryption and decryption?

A

Symmetric Key Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the primary application of symmetric encryption?

A

Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which type of cryptosystem uses two keys: one used for encryption and the other for decryption?

A

Asymmetric Key Cryptography or Public Key Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the length of a hash function’s key?

A

Not applicable as hash function have no key.

23
Q

What is the primary application of has function in cryptography?

A

Integrity

24
Q

Which of the following is not a well-know hash function in use today?

A. AES
B. MD4/MD5
C. Message Digest 2 (MD2)
D. Secure Hash Algorithm (SHA)

A

A. AES - Advanced Encryption Standard is used in symmetric key cryptography not hashing.

25
Q

What is a hashing algorithms output called?

A

A fingerprint

26
Q

The ability to establish the authenticity of a message even if the sender denies having signed the data is called what?

A

Non-repudiation

27
Q

When are mathematical problems considered intractable (or hard)?

A

When they cannot be solved in polynomial time.

28
Q

Which of the following is not a well known example of an intractable mathematical problem?

A. Factoring large number into their two prime factors
B. Solving the discrete logarithm problem over finite fields
C. Computing elliptic curves over finite fields
D. Generating quadratic products

A

D. Generating quadratic products - quadratic problems are considered tractable problems.

29
Q

What is the key size of DES?

A

56-bit

30
Q

What type of encryption is DES?

A. Asymmetric
B. Symmetric
C. Hashing
D. PKI

A

B. Symmetric

31
Q

The effectiveness of encryption attacks based on brute force searches depends upon what factor?

A

The keyspace size

32
Q

In cryptography, what is one way to effectively increase the key length?

A

Perform the encryption more than once.

33
Q

Performing encryption more than once to effectively increase the key length only works if the cipher algorithm is not a ________.

A

Group

34
Q

What does mean for a cipher algorithm to be a group?

A

That encrypting multiple times is no stronger then encrypting once.

35
Q

What is the key strength for triple DES using both 2 and 3 unique keys?

A
112 bit (2 Keys)
168 bit (3 Keys)
36
Q

The working mechanism of most public-key (asymmetric) cryptographic algorithms are generally openly published and widely known because the security come from the secrecy and size of the ___________ and not from the secrecy of the ___________ itself.

A

Private Key

Algorithm

37
Q

What is the major drawback to symmetric cryptography?

A

The key has to be exchanged via a secure mechanism.

38
Q

APOP improves on POP by protecting the authentication messages, not the e-mail messages them selves.

A. True
B. False

A

True

39
Q

What is the primary goal of the TLS protocol?

A

to provide privacy and data integrity between two communicating applications.

40
Q

The type of network encryption that accepts in clear-text information and encrypts it prior to sending it out then at the receiving end decrypts and forwards it on to its final destination is called?

A

Virtual Private Network (VPN)

41
Q

What are the two primary categories of VPNs to consider?

A
  1. Client-to-site

2. Site-to-site

42
Q

What is one frequent error made with VPNs?

A

To overly trust the other side of a VPN connection

43
Q

Why is it important to take care where encrypted tunnels are set up?

A

To avoid bypassing security devices.

44
Q

What is IP Security (IPSec)?

A

An IETF standard for establishing virtual private networks that is slowly replacing proprietary VPN protocols.

45
Q

What is a replay attack?

A

Copying a message as it goes across the network, then re-transmitting the copy to the destination.

46
Q

Which of the following fields is not included in the data section of an x.509 certificate?
A. Serial Number
B. Owner’s private key, and the algorithm used to generate it.
C. Period that the key is valid
D. Identify information of the issuing CA

A

B. Because it’s the owner’s public key not private key, and the algorithm used to generate it.

47
Q

Many vendors will recommend to customers that they configure their Bluetooth devices in what mode after initially pairing with other Bluetooth devices?

A

Non-discoverable mode

48
Q

Which of the following tools wold not be used by attackers to recover shared WEP keys on a network?

A. WEPCrack
B. AirSnort
C. Kismet
D. Dwepcrack

A

C. Kismet - this tool is used to find rogue wireless APs

49
Q

Organizational purchasing policy should be set to require _______ interoperability for new wireless purchases.

A

WPA2

50
Q

Should organizations be concerned with the use of wireless LANs by users who connect to corporate networks from home over VPN?

A

Yes, a home user is likely to have minimal security measure (if any) on their wireless network which gives an attacker the opportunity to compromise a vulnerable host and utilize the existing VPN connection to gain access to the corporate network.

51
Q

Which of the following is not considered a security risk for WLANs?

A. Eavesdropping
B. Masquerading
C. Denial-of-Service (DoS)
D. Rogue APs
E. Non of the above
A

E. Non of the above.

52
Q

Which of the following are laws of defensive OPSEC?

A. Know Yourself
B. Know the Enemy
C. Know what to Protect
D. If you fail the first two laws, your chance of compromise increases

A

B, C, D

A is completely made up.

53
Q

The focus of what is to establish a process for identifying the weak links often exploited by adversaries?

A

Operations Security (OPSEC)