Chapter 11 Hashing and Encryption Flashcards

1
Q

Recent log analysis has revealed that archived documents have been tampered with, even though the hash matching database shows that the values have not changes. What could have caused this?

A. A weak symmetric cipher
B. Hash Collision
C. An asymmetric algorithm with a small key size
D. A poor choice of block cipher

A

B. Hash Collision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Recent log analysis has revelated that archived documents have been tampered with. To mitigate this vulnerability, which of the following should not be used?

A. RACE-320
B. MD5
C. SHA 384
D. SHA 256

A

B. MD5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Developers are creating a File Integrity Monitoring (FIM) Solution to market to government agencies. What would be a good choice, considering FIPS compliance?

A. RACE-256
B. MD5
C. SHA-512
D. ECC

A

C. SHA-512
Goog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Google Engineers are configuring security for a new regional data center. They are looking to implement SSL/TLS for customer facing application servers. What would be a good choice, considering the need for speed and security?

A. ChaCha256 and Poly 1305
B. 3DES and CBC
C. AES256 and CBC
D. Salsa256 and CBC

A

A. ChaCha256 and Poly 1305

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is used to authenticate packets that are sent over a secure SSL/TLS connection?

A. SHA
B. HMAC
C. MD
D. Key Exchange

A

B. HMAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hackers can gain access to encrypted data transmissions. Log analysis shows that some application servers have different blockchain cipher configurations. Which log entries would cause the most concern?

A.GCM
B. ECB
C. CBC
D. CTR

A

B. ECB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When you are choosing a symmetric algorithm for real time media streaming applications, what would be the best choice?

A. 3DES
B. AES
C. ChaCha
D. RC4

A

C. ChaCha

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A government department is configuring a VPN connection. They are looking for a highly secure key exchange protocol due to the threats that are being posed by nation state threat actors. What would be a good choice?

A. AES
B. ECDHE p521
C. ChaCha-256
D. SHA-512

A

B. ECDHE p521

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of key agreement would most likely be used on IPSec tunnels?

A. Diffie-Hellman
B. DSA
C. RSA
D. Salsa

A

A. Diffie-Hellman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a good choice regarding a signing algorithm that will work well on low powered mobile devices?

A. DSA
B. RSA
C. ECDSA
D. HMAC

A

C. ECDSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the first step in the handshake for a secure web session that’s using SSL/TLS?

A. Server hell
B. Session key created
C. Client hello
D. Pre master secret

A

C. Client hello

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A government agency needs to ensure that email messages are secure from mailbox to mailbox. It cannot be guaranteed that all SMTP connections are secure. What is the best choice?

A. SSL/TLS
B. S/MIME
C. IPSec
D. SSH

A

B. S/MIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Nah

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

While setting up a commercial customer facing web application server, what would be a good choice regarding a key exchange that will support forward secrecy?

A. DH
B. RSA
C. ChaCha
D. ECDHE

A

D. ECDHE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What term is used to describe the message integrity thats provided by protocols such as Poly1305 and GCM?

A. Non repudiation
B. Authenticated encryption with associated data
C. Perfect forward secrecy
D. Collision resistance

A

B. Authenticated encryption with associated data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What would be used to provide non repudiation when you’re sending a business associate an email message?

A. TLS/SSL
B. AES 256
C. S/MIME
D. IPSec

A

C. S/MIME

17
Q

A developer is protecting the password field when they are storing customer profiles in a database. What would be a good choice for protecting this data from offline attacks? Choose two

A. PBKDF2
B. AES
C. bcrypt
D. ChaCha

A

A. PBKDF2
C. bcrypt

18
Q

What do Alice and Bob need to exchange before they send signed email messages to each other?

A. Private key
B. Cipher suite
C. Public keys
D. Pre shared keys

A

C. Public keys

19
Q

What will be used when Alice needs to sign an important business document to her colleague, Bob?

A. Alice’s public key
B. Alice’s private key
C. Bob’s public key
D. Bob’s private key

A

B. Alice’s private key

20
Q

What encryption protocol will be used to encrypt emails while in transit, across untrusted networks, when the client has no encryption keys?

A. SSL/TLS
B. IPSecC
C. SSH
D. S/MIME

A

A. SSL/TLS

21
Q
A