Additional Practice Flashcards

1
Q

Which block cipher modes can be used to turn a block cipher into a stream cipher? Select two.

Electronic Code Book (ECB) mode
Propagating Cipher Block Chaining (PCBC) mode
Counter (CTR) mode
Output Feedback (OFB) mode

A
Counter (CTR) mode 
Output Feedback (OFB) mode
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are reasons certificates should have an expiration date? Select all that apply
Decreases attacker work factor
Decreases risk of compromise
To facilitate recovery from compromise
Creates forced opportunity for users to update certificate information

A

Decreases risk of compromise
To facilitate recovery from compromise
Creates forced opportunity for users to update certificate information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
What phase of the certificate lifecycle does certificate expiration and certificate renewal reside in?
 Setup and Initialization Phase
 Administrative Phase
 Cancelation and History Phase
 Update and Patch Vulnerabilities Phase
A

Cancelation and History Phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
The basic premise of the birthday paradox involves knowing the number of people you would need in a room to have  \_\_\_\_\_ of two people being born on the same month and day.
 a guarantee 
 weak probability
 strong likelihood 
 least chances
A

strong likelihood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
The birthday paradox concept is employed in the birthday attack on hashes in effort to identify \_\_\_\_\_ of a given hash.
 the number of bits 
 the number of bytes
 a collision
 a coefficient
A

a collision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In applying the birthday paradox, with a room containing 23 people, what is the likelihood two of those 23 people were born on the same month and day?
Guaranteed (100% likelihood)
Not likely (0% likelihood)
Fifty-fifty (50% likelihood)
Equal to the number of people (23% likelihood)

A

Fifty-fifty (50% likelihood)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the basic path for certificate requests from a user?
User Registration Authority Certificate Authority
User Certificate Authority Registration Authority
User Certificate Authority
User Subordinate Registration Authority

A

User Registration Authority Certificate Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Which National Security Agency (NSA) type is Skipjack classified as? 
Type 1 
Type 2 
Type 3 
Type 4
A

Type 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Which German Federal Office for Information Security (BSI) criteria for random number generators states it should be impossible for any attacker to calculate, or otherwise guess, from any given subsequence, any previous or future values in the sequence? 
K4 
K3 
K2 
K1
A

K3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
A \_\_\_\_\_\_\_\_\_ adds a key to a hash to improve integrity. 
Compliment 
Hash Message Authentication Code (HMAC) 
Crypto sync 
Hash Managed Algorithm (HMA)
A

Hash Message Authentication Code (HMAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Of the choices below, which entails an attacker discovering a functionally equivalent algorithm for encryption and decryption, but without learning the key in cryptanalysis? 
Total break 
Total Deduction 
Global Deduction 
Global break
A

Global Deduction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Of the choices below, select the ones that are prime numbers. Select Two 
71 
72 
73 
74
A

71

73

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
Of the choices below, select the ones that are included in an X.509 certificate. 
Version 
Certificate holder key pair 
Serial number 
Digital Signature of issuer
A

Version
Serial number
Digital Signature of issuer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Which class of digital certificate is issued to individual subscribers with primary intended use for email? 
Class 1 
Class 2 
Class 3 
Class 4
A

Class 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Which class of digital certificate is issued for online business transactions between companies? 
Class 1 
Class 2 
Class 3 
Class 4
A

Class 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
From the list below, select the protocol pairs most closely associated with L2TP. 
PAP & POP 
CHAP & POP 
L2F & PPTP 
L3F & PAP
A

L2F & PPTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Apply the following multi-alphabet substitution cipher to the below letter string to decrypt an important message from your course instructor.

Cipher: (-2-1+5)
Encoded Text: UUVA GJEVNGE

A

Answer: STAY FOCUSED

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Apply the ROT13 cipher to the below letter string to decrypt it

Cipher: ROT13
Encoded text: NAQ LBH JVYY

A

Answer: AND YOU WILL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Apply the Atbash cipher to the below letter string

Cipher: Atbash
Encoded text: HFXXVVW

A

Answer: SUCCEED

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
Which German Federal Office for Information Security (BSI) criteria for random number generators states it should be impossible for an attacker to calculate, or guess from an inner state of the generator, any previous numbers in the sequence or any previous inner generator states? 
K4 
K3 
K2 
K1
A

K4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
What component within public key infrastructure acts as a proxy between a user and the certificate authority (CA) by performing authentication of a certificate received from the user before forwarding it to the actual CA? 
Verification Authority 
Revocation Authority 
Registration Authority 
Certification Authority
A

Registration Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
Which National Security Agency cryptography suite is publicly available? 
Suite A 
Suite B 
Suite P 
Suite PA
A

Suite B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
Of the following National Security Agency algorithm types, which is used for the highest security and classification applications? 
Type 1 
Type 2 
Type 3 
Type 4
A

Type 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
The Skipjack algorithm is categorized as a Type \_\_\_\_\_\_\_ National Security Agency cryptographic algorithm. 
Type 1 
Type 2 
Type 3 
Type 4
A

Type 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
DES and 3DES are both categorized as Type \_\_\_\_\_\_\_ National Security Agency cryptographic algorithms. 
Type 1 
Type 2 
Type 3 
Type 4
A

Type 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
What term from the list below best describes a data concealment method for covert communication that makes use of LSB replacement? 
Cryptanalysis 
Steganalysis 
Steganography 
Whitening
A

Steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Modulus Operator Math. Solve the following: 12 % 5 =

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q
Symmetric encryption is expressed mathematically as: 
C = E(k,p) 
P = D(k,c) 
Me % n 
y2 = x3 + Ax + B
A

C = E(k,p)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Hash Name

  1. TIGER
  2. SHA256
  3. FORK256
  4. SHA1
  5. GOST
  6. MD5
  7. RIPEMD-160
Matched Answer 
\_\_\_\_ 
\_\_\_\_ 
\_\_\_\_ 
\_\_\_\_ 
\_\_\_\_ 
\_\_\_\_ 
\_\_\_\_ 
Choice 
A. 16 bit 
B. 32 bit 
C. 64 bit 
D. 128 bit 
E. 160 bit 
F. 192 bit 
G. 256 bit
A

Hash Name

  1. TIGER
  2. SHA256
  3. FORK256
  4. SHA1
  5. GOST
  6. MD5
  7. RIPEMD-160
Matched Answer 
\_\_F\_\_ 
\_\_G\_\_ 
\_\_G\_\_ 
\_\_E\_\_ 
_ G\_\_ 
\_\_D\_\_ 
\_\_E\_\_ 
Choice 
A. 16 bit 
B. 32 bit 
C. 64 bit 
D. 128 bit 
E. 160 bit 
F. 192 bit 
G. 256 bit
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Cipher Name

  1. AES ____
  2. IDEA ____
  3. DES ____
  4. Blowfish ____
  5. Twofish ____
  6. Skipjack ____
  7. Serpent ____
Attribute 
A. 64 bit blocks; 56 bit key 
B. 64 bit blocks; 32-448 bit key 
C. 64 bit blocks; 80 bit key 
D. 64 bit blocks; 128 bit key 
E. 128 bit blocks; 128, 192 or 256 bit key 
F. 128 bit blocks; 1-256 bit key 
G. 26 bit blocks; 64 bit key
A

Cipher Name

  1. AES __E__
  2. IDEA __D__
  3. DES __A__
  4. Blowfish __B__
  5. Twofish __F__
  6. Skipjack __C__
  7. Serpent __E__
Attribute 
A. 64 bit blocks; 56 bit key 
B. 64 bit blocks; 32-448 bit key 
C. 64 bit blocks; 80 bit key 
D. 64 bit blocks; 128 bit key 
E. 128 bit blocks; 128, 192 or 256 bit key 
F. 128 bit blocks; 1-256 bit key 
G. 26 bit blocks; 64 bit key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Identify and select the asymmetric encryption algorithms from the list below. (Select 3).

RSA 
MD5 
ECC 
RIPEMD-160 
IDEA 
AES 
DSA 
OFB
A

RSA
ECC
DSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Identify and select the symmetric stream ciphers from the list below. (Select 3).

DES 
Blowfish 
FISH 
RC4 
ECC 
GOST 
PIKE 
AES
A

FISH
RC4
PIKE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q
Identify and select the hash algorithms from the list below. (Select 4). 
AES 
DH 
FORK256 
RC4 
MD5 
GOST 
PIKE 
RIPEMD-160
A

FORK256
MD5
GOST
RIPEMD-160

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Identify and select three viable options for key exchange from the list below.

RSA 
MD5 
ECDH 
RIPEMD-160 
DH 
AES 
SHA256 
MQV
A

ECDH
DH
MQV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Identify and select the 32-round symmetric block ciphers from the list below. (Select two.

RSA 
DSA 
Skipjack 
Serpent 
DH 
AES 
Blowfish 
DES
A

Skipjack

Serpent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q
Which asymmetric encryption algorithm leverages characteristics of prime numbers and utilizes variable key lengths (1024-4096)? 
DSA 
ECC 
RSA 
Serpent
A

RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q
Which equation below represents the encryption process for RSA? 
C = E(k,p) 
P = D(k,c) 
Me % n 
y2 = x3 + Ax + B
A

Me % n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q
How many rounds are used in AES encryption? 
8, 10, or 12 
10, 12, or 14 
32 
16
A

10, 12, or 14

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q
Of the two processes used in symmetric key cryptography, which involves XORing the plaintext message with the key? 
Transposition 
Initialization 
Clustering 
Substitution
A

Substitution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q
Of the two processes used in symmetric key cryptography, which involves swapping blocks of the text? 
Transposition 
Initialization 
Clustering 
Substitution
A

Transposition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q
An instance where two different pieces of data are hashed separately, but both result in a single identical hash value is described by what term? 
Collision 
Clustering 
Evolution 
Polybius
A

Collision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q
The \_\_\_\_\_ function of RSA allows RSA to be used for both encryption and digital signatures. 
Initialization vector 
Trapdoor 
Block chaining 
MD5
A

Trapdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q
Symmetric decryption is expressed mathematically as: 
C = E(k,p) 
P = D(k,c) 
Me % n 
y2 = x3 + Ax + B
A

P = D(k,c)

44
Q

Instances where a change in in one bit in the plaintext would affect all the bits of the ciphertext is best described by what term?
Avalanche
Diffusion

A

Avalanche

45
Q

Instances where a change in in one bit in the plaintext would affect multiple characters in the ciphertext is best described by what term?
Confusion
Diffusion

A

Diffusion

46
Q
What is the standard for digital certificates? 
RFC 3526 
DSA 
FIPS 197 
X.509
A

X.509

47
Q

If timeliness is a priority factor for checking revocation status, which option from the list below would you prefer and why?
CRL, because it facilitates verifying certificates in real time
OCSP, because it facilitates verifying certificates in real time

A

OCSP, because it facilitates verifying certificates in real time

48
Q

When looking for an encryption scheme where speed is of utmost importance, which would you prefer from the list below?
Symmetric
Asymmetric

A

Symmetric

49
Q

When looking for an encryption solution for the data on your computer where full disk encryption is of utmost importance, which would you select from the list below?
Bitlocker
EFS

A

Bitlocker

50
Q
What Federal Information Processing Standard pertains to DSA and described in U.S. Patent 5,231,668? 
FIPS 197 
FIPS 186 
FIPS 180-4 
FIPS 179
A

FIPS 186

51
Q
What Federal Information Processing Standard pertains to AES? 
FIPS 197 
FIPS 196 
FIPS 180-4 
FIPS 179
A

FIPS 197

52
Q
From the list below, which two symmetric block encryption modes turn block ciphers into stream ciphers? 
OFB 
CTR 
ECB 
RC4
A

OFB

CTR

53
Q

With which encryption type would you mostly likely need an accompanying key exchange solution for?
Asymmetric
Symmetric

A

Symmetric

54
Q
What term from the list below best represents “one-way” encryption i.e. not reversible? 
Salt 
Symmetric 
DES 
Hash
A

Hash

55
Q
Which equation below is associated with Elliptic Curve? 
C = E(k,p) 
P = D(k,c) 
Me % n 
y2 = x3 + Ax + B
A

y2 = x3 + Ax + B

56
Q

From the terms below, which are associated with encryption using two keys? (Select 3)

Asymmetric 
Symmetric 
DES 
RSA 
SHA-2 
AES 
DSA 
Twofish
A

Asymmetric
RSA
DSA

57
Q

If you are sending an encrypted message to a colleague using symmetric encryption, of the choices below, (1) which key would you use to encrypt the message, and (2) which key would your colleague use to decrypt the message?

(1) your colleague’s public key, (2) your colleague’s private key
(1) your public key, (2) your private key
(1) your private key, (2) your private key
(1) your colleague’s private key, (2) your public key

A

(1) your private key, (2) your private key

58
Q

If you are sending an encrypted message to a colleague using asymmetric encryption, of the choices below, (1) which key would you use to encrypt the message, and (2) which key would your colleague use to decrypt the message?

(1) your colleague’s public key, (2) your colleague’s private key
(1) your public key, (2) your private key
(1) your private key, (2) your private key
(1) your colleague’s private key, (2) your public key

A

(1) your colleague’s public key, (2) your colleague’s private key

59
Q
From the list below, what term best describes an arbitrary, random or pseudo-random number used only once in cryptographic communication and is then discarded? 
Key 
Algorithm 
Round 
Nonce
A

Nonce

60
Q
What term below best describes an attack in which the attacker only has access to the ciphertext of a message? 
Chosen ciphertext 
Ciphertext only 
Known plaintext 
Plaintext only
A

Ciphertext only

61
Q
According to Kerchoff’s Principle, a cryptosystem will remain secure so long as which component of it is not publicly known? 
Key 
Decryption Algorithm 
Ciphertext 
Encryption Algorithm
A

Key

62
Q
What technique should be used in conjunction with substitution to break up letter/word frequency and aid in combatting frequency analysis attacks? 
Decoding 
Hashing 
Signing 
Transposition
A

Transposition

63
Q
What trusted entity associated with certificate management is responsible for issuing, revoking, and managing digital certificates? 
Certification Authority 
Registration Authority 
Certificate Authority 
Key Distribution Center
A

Certificate Authority

64
Q
What symmetric cipher was developed for use in the clipper chip? 
Skipjack 
Twofish 
Blowfish 
DSA
A

Skipjack

65
Q
Which term from the list below best describes a number that only shares the number 1 as a common factor with another? 
Prime 
Co-Prime 
Rational 
Reciprocal
A

Co-Prime

66
Q
What is the binary XOR result the following number sets 10011011 & 11111110? 
10011010 
01100101 
11111111 
00000000
A

01100101

67
Q
The Feistel Network used in symmetric block encryption entails the splitting of a block of plaintext prior to the application of respective encryption round and XOR functions. Which cipher from the list below is an “unbalanced” Feistel cipher (i.e. blocks of plaintext are split into unequal parts)? 
RC4 
Skipjack 
PIKE 
TIGER
A

Skipjack

68
Q
From the list below, which term is best described as a fixed-size, random stream, that is added to a block cipher to increase randomness? 
Feistel 
Initialization Vector 
Session Key 
Induction Vector
A

Initialization Vector

69
Q
From the list below, which term is best described as random bits added to a password hash to help with safeguarding passwords in storage? 
Nonce 
Salt 
IV 
Rounds
A

Salt

70
Q
The Advanced Encryption Standard is a subset of which algorithm? 
Lucifer 
Kasiski 
Fibonacci 
Rijndael
A

Rijndael

71
Q
Which software-based stream cipher uses a lagged Fibonacci generator? 
GOST 
FISH 
Blowfish 
Twofish
A

FISH

72
Q

Which of the following is true of hash encryption?
Requires a fixed length input and produces a different fixed length output
Requires a fixed length input and produces a variable length output
Accepts a variable length input and produces a fixed length output
Accepts a variable length input and produces a different variable length output

A

Accepts a variable length input and produces a fixed length output

73
Q
What are the two types of symmetric encryption? 
Block 
Strong 
Fixed 
Stream
A

Block

Stream

74
Q
Which WiFI encryption standard is based on 802.11i and uses AES with CCMP to provide for enhanced confidentiality, integrity and authentication? 
WPA 
WEP 
WPA-2 
Bluetooth
A

WPA-2

75
Q
What is the binary OR result the following number sets 10011011 & 11111110? 
10011010 
01100101 
11111111 
00000000
A

11111111

76
Q
What type of cryptanalysis involves the examination of differences in an input and how that affects the resultant difference in output? 
Hypothesis cryptanalysis 
Linear cryptanalysis 
Pseudo-random cryptanalysis 
Differential cryptanalysis
A

Differential cryptanalysis

77
Q

Identify and select the mono-alphabetic ciphers from the list below. (Select 4)

Vigenere 
Atbash 
Ceasar 
Scytale 
ENIGMA 
Disk cipher 
ROT-13 
ADFGVX
A

Atbash
Ceasar
Scytale
ROT-13

78
Q
Which cipher entails using a rod of a certain length to create/encrypt a message, and the requiring the message recipient to use an identical sized rod to read/decrypt the message? 
Scytale 
Atbash 
Playfair 
PIKE
A

Scytale

79
Q
Which cipher makes use of a 5x5 table containing a keyword or key phrase and encrypts pairs of letters or digraphs? 
Scytale 
Playfair 
Caesar 
Atbash
A

Playfair

80
Q
Which term from the list below represents the entire cryptographic operation i.e. the algorithm, key, and key management functions? 
Cryptography 
Cryptanalysis 
Cryptology 
Cryptosystem
A

Cryptosystem

81
Q
Which term from the list below represents the total number of possible values of keys in a cryptographic algorithm or other security measure? 
Key negotiation 
Key space 
Cryptovariable 
Initialization vector
A

Key space

82
Q
What term from the list below best describes a number whose factors are 1 and itself? 
Prime 
Co-Prime 
Rational 
Pseudo-random
A

Prime

83
Q
From the list below, what term describes a mechanism used to create number streams with random properties? Examples include Lagged Fibonacci and Mersenne Twister. 
Modulus Operator 
Hash Algorithm 
Crypto randomizer 
Pseudo-random number generator
A

Pseudo-random number generator

84
Q

Term

  1. Ticket ____
  2. TGS ____
  3. KDC ____
  4. TGT ____
  5. AS ____

Choices
A. Server that provides the initial ticket
B. Used to authenticate. Contains the identity of the client, the session key, timestamp, and checksum
C. Server that authorizes the principal and connects them to the ticket granting server
D. Issues tickets
E. The ticket that is granted during the authentication process

A
  1. Ticket __B__
  2. TGS __D__
  3. KDC __A__
  4. TGT __E__
  5. AS __C__

Choices
A. Server that provides the initial ticket
B. Used to authenticate. Contains the identity of the client, the session key, timestamp, and checksum
C. Server that authorizes the principal and connects them to the ticket granting server
D. Issues tickets
E. The ticket that is granted during the authentication process

85
Q
Wifi attribute matching 
Term 
1. WEP \_\_\_\_\_
2. WPA \_\_\_\_\_
3. WPA-2 \_\_\_\_\_
4. WPA-2 Enterprise \_\_\_\_\_

Choices
A. 802.11i, uses AES with CCMP
B. Replaces RC4 with TKIP
C. Uses RC4, employs a 40-bit key with a 24-bit IV
D. WPA-802.1x, requires RADUIS, employs EAP for authentication

A
Wifi attribute matching 
Term 
1. WEP \_\_C\_\_\_
2. WPA \_\_B\_\_\_
3. WPA-2 \_\_A\_\_\_
4. WPA-2 Enterprise \_\_D\_\_\_

Choices
A. 802.11i, uses AES with CCMP
B. Replaces RC4 with TKIP
C. Uses RC4, employs a 40-bit key with a 24-bit IV
D. WPA-802.1x, requires RADUIS, employs EAP for authentication

86
Q
What term below best describes an attack in which the attacker obtains ciphertext corresponding to a set of plaintexts to use in an attempt to derive the key used? 
Chosen plaintext 
Ciphertext only 
Known plaintext 
Plaintext only
A

Chosen plaintext

87
Q
What are the four general steps involved with AES? 
Rounds 
Initial round 
Final round 
Hash session 
Negotiation 
Key expansion 
Reversal 
Whitening
A

Rounds
Initial round
Final round
Key expansion

88
Q
To be suitable for cryptography, what German Federal Office for Information Security (BSI) criteria level (s) should a PRNG meet? 
K1 
K2 
K3 
K4
A

K3

K4

89
Q
Modulus Operator Math. Solve the following: 7 mod 4 = \_\_\_\_ 
28 
1 
3 
0.5
A

3

90
Q
Which block cipher below uses a block size of 128 bits and key sizes up to 256 bits? 
DES 
Blowfish 
Twofish 
Tiger
A

Twofish

91
Q
\_\_\_\_\_\_ is an algorithm that generates PRNG outputs and employs a reseed mechanism to reseed the key periodically with new entries from one of the two entropy pool employed.
Lehmer 
Yarrow 
Blum Blum Shub 
Naor-Reingold
A

Yarrow

92
Q
Shawn plans employ asymmetric encryption to send a digitally signed message to Sue. Shawn will encrypt the message with Sue’s public key. Which key will Shawn use to sign the message? 
Sue’s private key 
Shawn’s private key 
Sue’s public key 
Shawn’s public key
A

Shawn’s private key

93
Q
Shawn has employed asymmetric encryption to send a digitally signed message to Sue. Shawn used Sue’s public key to encrypt the message. Which key will Sue use to verify the signature? 
Sue’s private key 
Shawn’s private key 
Sue’s public key 
Shawn’s public key
A

Shawn’s public key

94
Q
Shawn has employed PKI to send a digitally signed message to Sue. Shawn used Sue’s public key to encrypt the message. Which key will Sue use to decrypt the message? 
Sue’s private key 
Shawn’s private key 
Sue’s public key 
Shawn’s public key
A

Sue’s private key

95
Q
Decrypt is to encrypt as verify is to \_\_\_\_\_\_\_\_. 
Salt 
Initialize 
Sign 
PKI
A

Sign

96
Q
An instance where different encryption keys generate the same ciphertext from the same plaintext message is described by what term? 
Columnar rotation 
Columnar substitution 
Collision 
Clustering
A

Clustering

97
Q
Knowledge of the factorization of the trapdoor information in RSA computations, allows you to be able to \_\_\_\_\_ the function. 
Invert 
Finalize 
Lock 
Sign
A

Invert

98
Q
With regard to cryptanalysis efforts, what is uncovering the actual key considered? 
Information Deduction 
Global Deduction 
Total Break 
Inference Crack
A

Total Break

99
Q

Sequence the below basic steps of the Kerberos process in order from first (1) to last (6).
__The authentication server authenticates the user and issues a ticket-granting ticket
__ The user presents the resource ticket to the resource
__ The user sends credentials to the authentication server
__ The user is authorized to access the resource
__ The resource verifies the resource ticket with the ticket granting server
__ The user’s computer presents the ticket granting ticket to the ticket granting server when the user wants to access a network resource. The TGS will use the AS to authenticate that ticket. If it is authentic, then a specific resource ticket and a session key are issued and sent to the user’s computer

A

Sequence the below basic steps of the Kerberos process in order from first (1) to last (6).
_2_The authentication server authenticates the user and issues a ticket-granting ticket
4 The user presents the resource ticket to the resource
1 The user sends credentials to the authentication server
6 The user is authorized to access the resource
5 The resource verifies the resource ticket with the ticket granting server
3 The user’s computer presents the ticket granting ticket to the ticket granting server when the user wants to access a network resource. The TGS will use the AS to authenticate that ticket. If it is authentic, then a specific resource ticket and a session key are issued and sent to the user’s computer

100
Q
Variations of an algorithm’s key that are applied in each individual round of encryption are referred to as what? Select Two 
Round keys 
Manipulatives 
Subkeys 
PRNGs
A

Round keys

Subkeys

101
Q
A \_\_\_\_\_\_\_\_\_ is an algorithm, that given the key, calculates the subkeys for individual rounds of encryption. 
Key schedule 
PRNG 
SubByte 
Byte Schedule
A

Key schedule

102
Q
Which FIPS publication specifies personal identity verification? 
FIPS 200 
FIPS 199 
FIPS 140 
FIPS 201
A

FIPS 201

103
Q
Which Kerberos component contains the identity of the client, session key, timestamp, and checksum and is used to authenticate to the server? 
Ticket 
Ticket Granting Server 
Key Distribution Center 
Authenticator
A

Ticket

104
Q
What system is considered to be the only unbreakable encryption? 
Enigma 
Caesar 
One-time Pad 
MD5
A

One-time Pad

105
Q
A major weakness in the\_\_\_\_\_\_\_\_\_ block cipher mode is that a given string of plaintext always equals the same cipher text. 
Electronic Code Book (ECB) 
Counter (CTR) 
Output Feedback (OFB) 
Public Key Infrastructure (PKI)
A

Electronic Code Book (ECB)