Additional Practice Flashcards
Which block cipher modes can be used to turn a block cipher into a stream cipher? Select two.
Electronic Code Book (ECB) mode
Propagating Cipher Block Chaining (PCBC) mode
Counter (CTR) mode
Output Feedback (OFB) mode
Counter (CTR) mode Output Feedback (OFB) mode
What are reasons certificates should have an expiration date? Select all that apply
Decreases attacker work factor
Decreases risk of compromise
To facilitate recovery from compromise
Creates forced opportunity for users to update certificate information
Decreases risk of compromise
To facilitate recovery from compromise
Creates forced opportunity for users to update certificate information
What phase of the certificate lifecycle does certificate expiration and certificate renewal reside in? Setup and Initialization Phase Administrative Phase Cancelation and History Phase Update and Patch Vulnerabilities Phase
Cancelation and History Phase
The basic premise of the birthday paradox involves knowing the number of people you would need in a room to have \_\_\_\_\_ of two people being born on the same month and day. a guarantee weak probability strong likelihood least chances
strong likelihood
The birthday paradox concept is employed in the birthday attack on hashes in effort to identify \_\_\_\_\_ of a given hash. the number of bits the number of bytes a collision a coefficient
a collision
In applying the birthday paradox, with a room containing 23 people, what is the likelihood two of those 23 people were born on the same month and day?
Guaranteed (100% likelihood)
Not likely (0% likelihood)
Fifty-fifty (50% likelihood)
Equal to the number of people (23% likelihood)
Fifty-fifty (50% likelihood)
What is the basic path for certificate requests from a user?
User Registration Authority Certificate Authority
User Certificate Authority Registration Authority
User Certificate Authority
User Subordinate Registration Authority
User Registration Authority Certificate Authority
Which National Security Agency (NSA) type is Skipjack classified as? Type 1 Type 2 Type 3 Type 4
Type 2
Which German Federal Office for Information Security (BSI) criteria for random number generators states it should be impossible for any attacker to calculate, or otherwise guess, from any given subsequence, any previous or future values in the sequence? K4 K3 K2 K1
K3
A \_\_\_\_\_\_\_\_\_ adds a key to a hash to improve integrity. Compliment Hash Message Authentication Code (HMAC) Crypto sync Hash Managed Algorithm (HMA)
Hash Message Authentication Code (HMAC)
Of the choices below, which entails an attacker discovering a functionally equivalent algorithm for encryption and decryption, but without learning the key in cryptanalysis? Total break Total Deduction Global Deduction Global break
Global Deduction
Of the choices below, select the ones that are prime numbers. Select Two 71 72 73 74
71
73
Of the choices below, select the ones that are included in an X.509 certificate. Version Certificate holder key pair Serial number Digital Signature of issuer
Version
Serial number
Digital Signature of issuer
Which class of digital certificate is issued to individual subscribers with primary intended use for email? Class 1 Class 2 Class 3 Class 4
Class 1
Which class of digital certificate is issued for online business transactions between companies? Class 1 Class 2 Class 3 Class 4
Class 4
From the list below, select the protocol pairs most closely associated with L2TP. PAP & POP CHAP & POP L2F & PPTP L3F & PAP
L2F & PPTP
Apply the following multi-alphabet substitution cipher to the below letter string to decrypt an important message from your course instructor.
Cipher: (-2-1+5)
Encoded Text: UUVA GJEVNGE
Answer: STAY FOCUSED
Apply the ROT13 cipher to the below letter string to decrypt it
Cipher: ROT13
Encoded text: NAQ LBH JVYY
Answer: AND YOU WILL
Apply the Atbash cipher to the below letter string
Cipher: Atbash
Encoded text: HFXXVVW
Answer: SUCCEED
Which German Federal Office for Information Security (BSI) criteria for random number generators states it should be impossible for an attacker to calculate, or guess from an inner state of the generator, any previous numbers in the sequence or any previous inner generator states? K4 K3 K2 K1
K4
What component within public key infrastructure acts as a proxy between a user and the certificate authority (CA) by performing authentication of a certificate received from the user before forwarding it to the actual CA? Verification Authority Revocation Authority Registration Authority Certification Authority
Registration Authority
Which National Security Agency cryptography suite is publicly available? Suite A Suite B Suite P Suite PA
Suite B
Of the following National Security Agency algorithm types, which is used for the highest security and classification applications? Type 1 Type 2 Type 3 Type 4
Type 1
The Skipjack algorithm is categorized as a Type \_\_\_\_\_\_\_ National Security Agency cryptographic algorithm. Type 1 Type 2 Type 3 Type 4
Type 2
DES and 3DES are both categorized as Type \_\_\_\_\_\_\_ National Security Agency cryptographic algorithms. Type 1 Type 2 Type 3 Type 4
Type 3
What term from the list below best describes a data concealment method for covert communication that makes use of LSB replacement? Cryptanalysis Steganalysis Steganography Whitening
Steganography
Modulus Operator Math. Solve the following: 12 % 5 =
2
Symmetric encryption is expressed mathematically as: C = E(k,p) P = D(k,c) Me % n y2 = x3 + Ax + B
C = E(k,p)
Hash Name
- TIGER
- SHA256
- FORK256
- SHA1
- GOST
- MD5
- RIPEMD-160
Matched Answer \_\_\_\_ \_\_\_\_ \_\_\_\_ \_\_\_\_ \_\_\_\_ \_\_\_\_ \_\_\_\_
Choice A. 16 bit B. 32 bit C. 64 bit D. 128 bit E. 160 bit F. 192 bit G. 256 bit
Hash Name
- TIGER
- SHA256
- FORK256
- SHA1
- GOST
- MD5
- RIPEMD-160
Matched Answer \_\_F\_\_ \_\_G\_\_ \_\_G\_\_ \_\_E\_\_ _ G\_\_ \_\_D\_\_ \_\_E\_\_
Choice A. 16 bit B. 32 bit C. 64 bit D. 128 bit E. 160 bit F. 192 bit G. 256 bit
Cipher Name
- AES ____
- IDEA ____
- DES ____
- Blowfish ____
- Twofish ____
- Skipjack ____
- Serpent ____
Attribute A. 64 bit blocks; 56 bit key B. 64 bit blocks; 32-448 bit key C. 64 bit blocks; 80 bit key D. 64 bit blocks; 128 bit key E. 128 bit blocks; 128, 192 or 256 bit key F. 128 bit blocks; 1-256 bit key G. 26 bit blocks; 64 bit key
Cipher Name
- AES __E__
- IDEA __D__
- DES __A__
- Blowfish __B__
- Twofish __F__
- Skipjack __C__
- Serpent __E__
Attribute A. 64 bit blocks; 56 bit key B. 64 bit blocks; 32-448 bit key C. 64 bit blocks; 80 bit key D. 64 bit blocks; 128 bit key E. 128 bit blocks; 128, 192 or 256 bit key F. 128 bit blocks; 1-256 bit key G. 26 bit blocks; 64 bit key
Identify and select the asymmetric encryption algorithms from the list below. (Select 3).
RSA MD5 ECC RIPEMD-160 IDEA AES DSA OFB
RSA
ECC
DSA
Identify and select the symmetric stream ciphers from the list below. (Select 3).
DES Blowfish FISH RC4 ECC GOST PIKE AES
FISH
RC4
PIKE
Identify and select the hash algorithms from the list below. (Select 4). AES DH FORK256 RC4 MD5 GOST PIKE RIPEMD-160
FORK256
MD5
GOST
RIPEMD-160
Identify and select three viable options for key exchange from the list below.
RSA MD5 ECDH RIPEMD-160 DH AES SHA256 MQV
ECDH
DH
MQV
Identify and select the 32-round symmetric block ciphers from the list below. (Select two.
RSA DSA Skipjack Serpent DH AES Blowfish DES
Skipjack
Serpent
Which asymmetric encryption algorithm leverages characteristics of prime numbers and utilizes variable key lengths (1024-4096)? DSA ECC RSA Serpent
RSA
Which equation below represents the encryption process for RSA? C = E(k,p) P = D(k,c) Me % n y2 = x3 + Ax + B
Me % n
How many rounds are used in AES encryption? 8, 10, or 12 10, 12, or 14 32 16
10, 12, or 14
Of the two processes used in symmetric key cryptography, which involves XORing the plaintext message with the key? Transposition Initialization Clustering Substitution
Substitution
Of the two processes used in symmetric key cryptography, which involves swapping blocks of the text? Transposition Initialization Clustering Substitution
Transposition
An instance where two different pieces of data are hashed separately, but both result in a single identical hash value is described by what term? Collision Clustering Evolution Polybius
Collision
The \_\_\_\_\_ function of RSA allows RSA to be used for both encryption and digital signatures. Initialization vector Trapdoor Block chaining MD5
Trapdoor