CEH Notes 05 Flashcards
Which cloud computing service model offers the infrastructure required to host and run applications over the internet?
A. IaaS
B. PaaS
C. SaaS
D. FaaS
Answer: A. IaaS
Which cloud deployment model involves a combination of public and private cloud services?
A. Public
B. Private
C. Hybrid
D. Community
Answer: C. Hybrid
What is the main principle of Zero Trust networks?
A. Trust all connections based on location
B. Trust all connections based on IP address
C. Never trust a connection based on location or IP address
D. Trust only connections from known users
Answer: C. Never trust a connection based on location or IP address
What is the primary concern with vendor lock-in?
A. The inability to access data
B. The cost of breaking the contract or switching to another provider is prohibitive
C. Vendors are not reliable
D. Vendor lock-in prevents customization
Answer: B. The cost of breaking the contract or switching to another provider is prohibitive
What is Docker primarily used for?
A. Managing cloud resources
B. Running virtual machines
C. Delivering software in packages called containers
D. Orchestration of container deployments
Answer: C. Delivering software in packages called containers
What is Kubernetes primarily used for?
A. Running virtual machines
B. Delivering software in packages called containers
C. Orchestration and management of containers and microservices
D. Monitoring cloud resources
Answer: C. Orchestration and management of containers and microservices
What type of attack is the Cloud Hopper attack?
A. Targets bare-metal cloud servers
B. Targets cloud service firms and MSPs through spear-phishing emails
C. Attacks cloud resources through DDoS attacks
D. Exploits vulnerabilities in cloud infrastructure
Answer: B. Targets cloud service firms and MSPs through spear-phishing emails
What is the main goal of a Cloudborne attack?
A. Steal user credentials
B. Implant a malicious backdoor in a bare-metal cloud server’s firmware
C. Gain unauthorized access to cloud resources
D. Compromise containers running on cloud platforms
Answer: B. Implant a malicious backdoor in a bare-metal cloud server’s firmware
Which encryption approach generates a MAC for the plaintext using the hash function, and then combines the MAC with the plaintext before encryption?
A. Authenticated encryption with associated data (AEAD)
B. MAC-then-Encrypt (MtE)
C. Encrypt-and-MAC (E&M)
D. Encrypt-then-MAC (EtM)
Answer: B. MAC-then-Encrypt (MtE)
Which encryption approach generates a MAC for the plaintext first, followed by encryption of the plaintext, and then combines the ciphertext and MAC for transmission?
A. Authenticated encryption with associated data (AEAD)
B. MAC-then-Encrypt (MtE)
C. Encrypt-and-MAC (E&M)
D. Encrypt-then-MAC (EtM)
Answer: C. Encrypt-and-MAC (E&M)
Which encryption approach keeps the message header unencrypted to allow the receiver to verify the source of the message and encrypts the payload to ensure confidentiality?
A. Authenticated encryption with associated data (AEAD)
B. MAC-then-Encrypt (MtE)
C. Encrypt-and-MAC (E&M)
D. Encrypt-then-MAC (EtM)
Answer: A. Authenticated encryption with associated data (AEAD)
Which encryption approach encrypts the plaintext first using a secret key and then generates a hash value called message authentication code (MAC) for the obtained ciphertext?
A. Authenticated encryption with associated data (AEAD)
B. MAC-then-Encrypt (MtE)
C. Encrypt-and-MAC (E&M)
D. Encrypt-then-MAC (EtM)
Answer: D. Encrypt-then-MAC (EtM)
Is the DES algorithm symmetric or asymmetric?
A. DES
B. RSA
C. YAK
D. Diffie-Hellman
Answer: A. DES (Symmetric)
Is the Blowfish algorithm symmetric or asymmetric?
A. Blowfish
B. RSA
C. TEA
D. SHA
Answer: A. Blowfish (Symmetric)
Is the RC4 algorithm symmetric or asymmetric?
A. RC4
B. MD5
C. Threefish
D. GOST Block Cipher
Answer: A. RC4 (Symmetric)
Is the RC5 algorithm symmetric or asymmetric?
A. RC5
B. Serpent
C. SHA
D. MD6
Answer: A. RC5 (Symmetric)
Is the CAST-128 algorithm symmetric or asymmetric?
A. CAST-128
B. RC6
C. Twofish
D. RIPEMD-160
Answer: A. CAST-128 (Symmetric)
Which algorithm uses the Feistel structure and has a key size of 56 bits and a block size of 64 bits, and is vulnerable to brute-force attacks?
A. DES
B. 3DES
C. RC6
D. Blowfish
Answer: A. DES (Feistel, 56/64, Brute-force attack)
Which algorithm uses a substitution-permutation structure and has a key size of up to 256 bits and a block size of 128 bits, and is vulnerable to side-channel attacks?
A. AES
B. RC4
C. Serpent
D. SHA
Answer: A. AES (Substitution-permutation, Up to 256/128, Side-channel attack)
Which algorithm uses a tweakable block cipher/non-Feistel structure and has a key size of up to 1024 bits and a block size of 1024 bits, and is vulnerable to boomerang attacks?
A. Threefish
B. TEA
C. CAST-128
D. YAK
Answer: A. Threefish (Tweakable block cipher/Non-Feistel, Up to 1024/1024, Boomerang attack)
Which algorithm uses the Merkle-Damgard construction and has a key size of up to 320 bits and a block size of 512 bits, and is vulnerable to collision attacks?
A. MD5
B. SHA
C. RIPEMD-160
D. MD6
Answer: RIPEMD-160
Which algorithm uses factorization and has a variable key size, and is vulnerable to brute force and timing attacks?
A. RSA
B. Diffie-Hellman
C. GOST Block Cipher
D. Twofish
Answer: A. RSA (Factorization, Variable, Brute force and timing attack)
Which algorithm uses the Feistel structure and has a key size of up to 2040 bits and a block size of 128 bits, and is vulnerable to timing attacks?
A. RC5
B. Serpent
C. Threefish
D. YAK
Answer: A. RC5 (Feistel, Up to 2040/128, Timing attack)
Which algorithm uses the Feistel structure and has a key size of 32-448 bits, and is vulnerable to birthday attacks and known-plaintext attacks?
A. Blowfish
B. RC6
C. CAST-128
D. AES
Answer: A. Blowfish (Feistel, 32-448 bits, Birthday attack and known-plaintext attack)
Which algorithm uses the random-permutation structure and has a key size of up to 2048/2064 bits, and is vulnerable to NOMORE attacks?
A. RC4
B. RC6
C. SHA
D. GOST Block Cipher
Answer: A. RC4 (Random-permutation, Up to 2048/2064, NOMORE attack)
Which algorithm uses the HMAC structure and has a key size of 256 bits and a block size of 64 bits, and is vulnerable to chosen-key attacks?
A. GOST Block Cipher
B. RC6
C. Threefish
D. MD5
Answer: A. GOST Block Cipher (HMAC, 256/64, Chosen-key attack)
Which algorithm uses the nondeterministic finite automation (NFA) structure and has a variable key size, and is vulnerable to man-in-the-middle attacks?
A. YAK
B. RC6
C. AES
D. SHA
Answer: A. YAK (Nondeterministic Finite automation (NFA), Variable, Man-in-the-Middle attack)
Which algorithm uses the Merkle-Damgard construction and has a key size of 160 bits and a block size of 512 bits, and is vulnerable to brute-force and birthday attacks?
A. MD6
B. SHA
C. RIPEMD-160
D. AES
Answer: A. MD6 (Merkle-Damgard Construction, 160/512, Brute-force attack/Birthday attack)
Which algorithm uses the elliptic curves/algebraic structure and has a variable key size, and is vulnerable to collision attacks?
A. Diffie-Hellman
B. RSA
C. TEA
D. Twofish
Answer: A. Diffie-Hellman (Elliptic Curves/Algebraic, Variable, Collision attack)
Which algorithm uses the substitution-permutation structure and has a key size of up to 256 bits and a block size of 128 bits, and is vulnerable to XSL and Meet-in-the-Middle attacks?
A. Serpent
B. RC4
C. GOST Block Cipher
D. MD5
Answer: A. Serpent (Substitution-permutation, Up to 256/128, XSL and Meet-in-the-Middle attack)
Which algorithm uses the Feistel structure and has a key size of up to 128 bits and a block size of 64 bits, and is vulnerable to known-plaintext attacks?
A. CAST-128
B. RC6
C. Threefish
D. SHA
Answer: A. CAST-128 (Feistel, Up to 128/64, Known-plaintext attack)
Which algorithm uses the Feistel structure and has a key size of up to 128 bits and a block size of 64 bits, and is vulnerable to known-plaintext attacks?
A. CAST-128
B. RC6
C. Threefish
D. SHA
Answer: A. CAST-128 (Feistel, Up to 128/64, Known-plaintext attack)
Which algorithm uses the Merkle-Damgard construction and has a variable key size, and is vulnerable to key share and key replication attacks?
A. MD5
B. SHA
C. RIPEMD-160
D. TEA
Answer: A. MD5 (Merkle-Damgard Construction, Variable, Key share and key replication attack)
Which algorithm uses the Feistel structure and has a key size of 112 or 168 bits, and is vulnerable to block collision attacks?
A. 3DES
B. RC4
C. Twofish
D. MD6
Answer: A. 3DES (Feistel, 112 or 168 bits, Block collision attack)
Which algorithm uses the Feistel structure and has a key size of up to 256 bits and a block size of 128 bits, and is vulnerable to power analysis attacks?
A. Twofish
B. RC6
C. SHA
D. AES
Answer: A. Twofish (Feistel, Up to 256/128, Power analysis attack)
Which algorithm uses the Feistel structure and has a key size of up to 256 bits and a block size of 128 bits, and is vulnerable to brute-force attacks?
A. RC6
B. Serpent
C. AES
D. SHA
Answer: A. RC6 (Feistel, Up to 256/128, Brute-force attack)
Which algorithm uses the Merkle-Damgard construction and has a variable key size, and is vulnerable to collision attacks?
A. SHA
B. RIPEMD-160
C. MD6
D. GOST Block Cipher
Answer: A. SHA (Merkle-Damgard Construction, Up to 320/512, Collision attack)
Which algorithm uses the HMAC structure and has a variable key size, and is vulnerable to related-key attacks?
A. TEA
B. GOST Block Cipher
C. Threefish
D. MD5
Answer: A. TEA (Feistel, Up to 128/64, Related-key attack)
Which algorithm uses the random-permutation structure and has a key size of up to 2048/2064 bits, and is vulnerable to NOMORE attacks?
A. RC4
B. RC6
C. SHA
D. GOST Block Cipher
Answer: A. RC4 (Random-permutation, Up to 2048/2064, NOMORE attack)