Chapter 1 - 10 Flashcards
Derek, a security professional, wants to embed hidden data within a carrier file like an image or video which can later be extracted. What will he use?
Steganography
Which of the following statements are true of Online Certificate Status Protocol and certificate revocation list?
OSCP Checks certificate status in realt ime
CRL allows the authenticity of a certificate to be immediately verified
The main limitation of CRL is the fact that updates must be frequently downloaded to keep the list current
What are the cryptographic goals?
Confidentiality
Integrity
Availability
A junior administrator at a sister company called to report a possible exposed key that is used for PKI transactions. The administrator would like to know easiest way to check whether the lost key has been flagged by the system. What are you going to recommend to the administrator?
OCSP
Online Certificate Status Protocol
You’ve discovered that an expired certificate is being used to repeatedly to gain login privileges. To what list should the certificate have been added?
CRL
Certificate Revocation List
Which of the following is a digitized, decentralized, publicly used ledger of all cryptocurrency transtions?
Blockchain
What is used for legal purposes and identifies ownership or copyright of material?
Watermarking
A junior administrator comes to you in a panic after seeing the cost of certificates. Should would like to know if there is a way to get one certificate to cover all domains and subdomains for the organization. What solution can you offer?
Wildcard Certificate
Juan, a security engineer, increased the security of an organization’s VPN ensuring that one compromised SA session key cannot be used to compromise any other sessions . What can be configured to meet this requirement?
PRNG
Pseudorandom number generator
Your team member has asked you to name a common form of digital certificate. What will you advise?
X.509
Which of the following is a determinisitic algorithm to generate a sequence of number with little or no discernible pattern in the numbers, apart from broad statistical properties?
PRNG
Pseudorandom number generator
What is the correct term for when two different files are hashed and result in the same output?
Collision
Marie is concerned about outside parties attempting to access her company’s network viz the wireless connection. Where should she place the WAP?
Centrally in the building
Juan has requested some specific files stored on the organization storage network containing data which is not protected by the patent law, but is classified as trade secret encrypted with a block cipher. What algorithm satisfies the request?
Blowfish
What ensures that a session key derived from a set of long-term public and private keys will not be compromised if one of the (long-term) private key is compromised in the future?
PFS
Perfect Forward Secrecy
You have just completed a port scan of devices in the DMZ and have discovered that port 5800/5801 is open on one of the devices. Which service typically uses these ports?
VNC
Which of the following would properly describe a system that uses a symmetric key distributed by an asymmetric process?
Hybrid Encryption
A co-worker is concerned about the veracity of a claim because the sender of an email denies sending it. The co-worker wants a way to prove the authenticity of an email. What would you recommend?
Digital Signature
Which of the following is based on the concept that the exposure of a single key will permit attacker access to only data protected by a single key?
PFS
Perfect Forward Secrecy
Which algorithm was developed by Ron Rivest and offers a 128-bit output?
MD5