Chapter 1 - 10 Flashcards

1
Q

Derek, a security professional, wants to embed hidden data within a carrier file like an image or video which can later be extracted. What will he use?

A

Steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following statements are true of Online Certificate Status Protocol and certificate revocation list?

A

OSCP Checks certificate status in realt ime
CRL allows the authenticity of a certificate to be immediately verified
The main limitation of CRL is the fact that updates must be frequently downloaded to keep the list current

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the cryptographic goals?

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A junior administrator at a sister company called to report a possible exposed key that is used for PKI transactions. The administrator would like to know easiest way to check whether the lost key has been flagged by the system. What are you going to recommend to the administrator?

A

OCSP

Online Certificate Status Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You’ve discovered that an expired certificate is being used to repeatedly to gain login privileges. To what list should the certificate have been added?

A

CRL

Certificate Revocation List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is a digitized, decentralized, publicly used ledger of all cryptocurrency transtions?

A

Blockchain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is used for legal purposes and identifies ownership or copyright of material?

A

Watermarking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A junior administrator comes to you in a panic after seeing the cost of certificates. Should would like to know if there is a way to get one certificate to cover all domains and subdomains for the organization. What solution can you offer?

A

Wildcard Certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Juan, a security engineer, increased the security of an organization’s VPN ensuring that one compromised SA session key cannot be used to compromise any other sessions . What can be configured to meet this requirement?

A

PRNG

Pseudorandom number generator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Your team member has asked you to name a common form of digital certificate. What will you advise?

A

X.509

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is a determinisitic algorithm to generate a sequence of number with little or no discernible pattern in the numbers, apart from broad statistical properties?

A

PRNG

Pseudorandom number generator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the correct term for when two different files are hashed and result in the same output?

A

Collision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Marie is concerned about outside parties attempting to access her company’s network viz the wireless connection. Where should she place the WAP?

A

Centrally in the building

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Juan has requested some specific files stored on the organization storage network containing data which is not protected by the patent law, but is classified as trade secret encrypted with a block cipher. What algorithm satisfies the request?

A

Blowfish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What ensures that a session key derived from a set of long-term public and private keys will not be compromised if one of the (long-term) private key is compromised in the future?

A

PFS

Perfect Forward Secrecy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You have just completed a port scan of devices in the DMZ and have discovered that port 5800/5801 is open on one of the devices. Which service typically uses these ports?

A

VNC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following would properly describe a system that uses a symmetric key distributed by an asymmetric process?

A

Hybrid Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A co-worker is concerned about the veracity of a claim because the sender of an email denies sending it. The co-worker wants a way to prove the authenticity of an email. What would you recommend?

A

Digital Signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following is based on the concept that the exposure of a single key will permit attacker access to only data protected by a single key?

A

PFS

Perfect Forward Secrecy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which algorithm was developed by Ron Rivest and offers a 128-bit output?

A

MD5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Your organization has asked you to use two keys separately for encryption and decryption. What algorithm will you use?

A

RSA

22
Q

Allen is using a security feature which ensures that if hackers want to compromise a private key, they’ll only be able to access data in transit protected by that key and not nay future data because future data will not be associated with that compromised key. What security feature is he using?

A

PFS

23
Q

SSL and TLS can be best categorized as which system?

A

Hybrid Encryption

24
Q

Most authentication make use of a one-way encryption process which of the following best offers an example of one-way encryption?

A

Hashing

25
Q

Which of the following manages security credentials in a network and issues certificates to confirm the identity and other attributes of a certificate in relation to other entities?

A

CA

Certificate Authority

26
Q

Which of the following describes authentication tokens used to validate a claimed identity?

A

Credential

27
Q

A mobile user informs you that he has been asked to travel to China on business. He wants suggestions for securing his hard drive. What do you want to recommend him to use?

A

Bitlocker

28
Q

In the study of cryptography, what is used to prove the identity of an individual?

A

Authenticity

29
Q

Which of the following can be used to describe a physical security component that is used for cryptoprocessing and can be used to store digital keys securely?

A

HSM

30
Q

DES ECB is an example of which of the following encryption?

A

Block

31
Q

Which of the following is a method of providing an acknowledgment to the sender of the data and assurance of the sender’s identity to the receiver, so that neither the sender nor the receiver can later deny the data having processed by them?

A

Non-repudiation

32
Q

Using SSL, Allen wishes to secure public facing server farms in three domains. What is the number of wildcard SSL certificates that should be purchased?

A

Three

33
Q

What is not an advantage of symmetric encryption?

A

Key exchange is easy

34
Q

Which of the following Data Encryption Standard (DES) modes of operation are implemented as a stream cipher?

A

Output feedback

Cipher feedback

35
Q

You have been ask to suggest a simple trust system for distribution of encryption keys. Your client is a three-person company and wants a low-cost or free solution. What would you suggest?

A

Web-of-trust

36
Q

What is not a hashing algorithm?

A

IDEA

37
Q

Susan is trying to find a solution tat will verify emails coming from the source claimed. What solution will she use to accomplish this?

A

Digital signature

38
Q

Joseph, an ethical hacker, notices that an organizational network is vulnerable to the MitM attack since the key exchange process of the cryptographic algorithm does not authenticate participants. What cryptographic algorithm is being used by the organization?

A

Diffie-Hellman

39
Q

What is derived from a hash process known only by the originator, requires the receiver to use a key provided by the sender, and proves the message hasn’t been tampered with?

A

Digital Signature

40
Q

What is not a symmetric encryption?

A

RSA

41
Q

You have been asked by a member of the senior management to explain the important of encryption and define what symmetric encryption offers. What is the best explanation?

A

Privacy and authentication

42
Q

Ellie, a forensic analyst, suspects that a breach has occurred. Security logs show that the company’s IS patch system is compromised, and it is serving patches that contain a zero-day exploit and backdoor. she extracts an executable tile from a packet capture of communication between a client computer and the patch server. What should she use to confirm this suspicion?

A

Digital Signature

43
Q

You were given a disk full of application by a friend, but you are unsure about installing a couple of application on your company laptop. Is there an easy way to verify the programs are original or if they have been tampered with?

A

Verify with a hashing algorithm

44
Q

Which of the following is an early form of encryption, also known as ROT3?

A

Cesar Cipher

45
Q

How many keys are required if 15 people need to communicate using symmetric key encryption?

A

105

46
Q

Which type of encryption best offers easy key exchange and key management?

A

Asymmetric

47
Q

In cryptography, what is known as the process of converting clear text into something that is unreadable?

A

Encryption

48
Q

What is a process of digitally signing executable and scripts to confirm the software author and grantee that the program has not been altered or corrupted since it was authorized by the use of the cryptographic hash?

A

Code signing

49
Q

Which method of encryption makes use of a single key?

A

DES

50
Q

Mark works as a security manger at XYZ Inc. He has created a policy to allow employees to use their personally owned device. He is getting reports of company’s data appearing on unapproved forums and an increase in the theft of personal electronic devices. What security control would be implement to reduce the risk of exposure?

A

Disk encryption on the local drive