Chapter 04 Quiz – Advanced Cyprography and PKI Flashcards

Questions 22

1
Q

Question # 01

What term best represents the resiliency of
a cryptographic key to attacks?

a. key bits
b. key resiliency
c. key strength
d. key space

A

c. key strength

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Question # 02

Select the term that is used to describe a trusted third-party agency that is responsible for issuing digital certificates:

a. Registration Authority
b. Delegation Authority
c. Certification Authority
d. Participation Authority

A

c. Certification Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Question # 03

What kind of digital certificate is typically used to ensure the authenticity of a web server to a client?

a. private
b. web server
c. public web
d. web client

A

b. web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Question # 04

What type of trust model has a single CA that acts as a facilitator to interconnect all other CAs?

a. bridge trust
b. distributed trust
c. third-party trust
d. transitive trust

A

a. bridge trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Question # 05

A document that describes in detail how a CA uses and manages certificates, as well as how end users register for a digital certificate, is known as?

a. Certificate practice statement (CPS)
b. Certificate policy (CP)
c. Lifecycle policy (LP)
d. Access policy (AP)

A

a. Certificate practice statement (CPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Question # 06

At what stage can a certificate no longer be used for any type of authentication?

a. creation
b. suspension
c. revocation
d. expiration

A

d. expiration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Question # 07

What cryptographic transport algorithm is considered to be significantly more secure than SSL?

a. AES
b. HTTPS
c. ESSL
d. TLS

A

d. TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Question # 08

What protocol below supports two encryption modes: transport and tunnel?

a. HTTPS
b. IPSec
c. SSL
d. TLS

A

b. IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Question # 09

The Authentication Header (AH) protocol is a part of what encryption protocol suite below?

a. TLS 3.0
b. IPSec
c. GPG
d. SSL

A

b. IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Question # 10

Why is IPSec considered to be a transparent security protocol?

a. IPSec packets can be viewed by anyone
b. IPSec is designed to not require modifications of programs, or additional training, or additional client setup.
c. IPSec’s design and packet header contents are open sourced technologies
d. IPSec uses the Transparent Encryption (TE) algorithm

A

b. IPSec is designed to not require modifications of programs, or additional training, or additional client setup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Question # 11

What length SSL and TLS keys are generally considered to be strong?

a. 128
b. 1024
c. 2048
d. 4096

A

d. 4096

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Question # 12

What block cipher mode of operation uses the most basic approach where the plaintext is divided into blocks, and each block is then encrypted separately?

a. Electronic Code Book
b. Galois/Counter
c. Cipher Block Chaining
d. Counter

A

a. Electronic Code Book

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Question # 13

What is a value that can be used to ensure that plaintext, when hashed, will not consistently result in the same digest?

a. salt
b. initialization vector
c. counter
d. nonce

A

a. salt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Question # 14

Which of the following is an input value that must be unique within some specified scope, such as for a given period or an entire session?

a. salt
b. initialization vector
c. counter
d. nonce

A

d. nonce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Question # 15

What common method is used to ensure the security and integrity of a root CA?

a. Keep it in an offline state from the network.
b. Only use the root CA infrequently.
c. Password protect the root CA
d. Keep it in an online state and encrypt it.

A

a. Keep it in an offline state from the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Question # 16

Which of the following is a valid way to check the status of a certificate?

(Choose all that apply.)

a. Online Certificate Status Protocol
b. Certificate Revocation Authority
c. Certificate Revocation List
d. Revocation List Protocol

A

a. Online Certificate Status Protocol

c. Certificate Revocation List

17
Q

Question # 17

A digital certificate is a technology used to associate a user’s identity to a private key.

a. True
b. False

A

b. False

18
Q

Question # 18

A certificate repository (CR) is a publicly accessible centralized directory of digital certificates.

a. True
b. False

A

a. True

19
Q

Question # 19

Digital certificates should last forever.

a. True
b. False

A

b. False

20
Q

Question # 20

A Subject Alternative Name (SAN) digital certificate, is also known as a Unified Communications Certificate (UCC).

a. True
b. False

A

a. True

21
Q

Question # 21

What is used to create session keys?

a. master secret
b. crypto modules
c. validation
d. domain validation

A

a. master secret

22
Q

Question # 22

What are the three areas of protection provided by IPSEC?

A

Authentication, confidentiality, and key management.