Chapter 11 Hashing and Encryption Flashcards
Recent log analysis has revealed that archived documents have been tampered with, even though the hash matching database shows that the values have not changes. What could have caused this?
A. A weak symmetric cipher
B. Hash Collision
C. An asymmetric algorithm with a small key size
D. A poor choice of block cipher
B. Hash Collision
Recent log analysis has revelated that archived documents have been tampered with. To mitigate this vulnerability, which of the following should not be used?
A. RACE-320
B. MD5
C. SHA 384
D. SHA 256
B. MD5
Developers are creating a File Integrity Monitoring (FIM) Solution to market to government agencies. What would be a good choice, considering FIPS compliance?
A. RACE-256
B. MD5
C. SHA-512
D. ECC
C. SHA-512
Goog
Google Engineers are configuring security for a new regional data center. They are looking to implement SSL/TLS for customer facing application servers. What would be a good choice, considering the need for speed and security?
A. ChaCha256 and Poly 1305
B. 3DES and CBC
C. AES256 and CBC
D. Salsa256 and CBC
A. ChaCha256 and Poly 1305
What is used to authenticate packets that are sent over a secure SSL/TLS connection?
A. SHA
B. HMAC
C. MD
D. Key Exchange
B. HMAC
Hackers can gain access to encrypted data transmissions. Log analysis shows that some application servers have different blockchain cipher configurations. Which log entries would cause the most concern?
A.GCM
B. ECB
C. CBC
D. CTR
B. ECB
When you are choosing a symmetric algorithm for real time media streaming applications, what would be the best choice?
A. 3DES
B. AES
C. ChaCha
D. RC4
C. ChaCha
A government department is configuring a VPN connection. They are looking for a highly secure key exchange protocol due to the threats that are being posed by nation state threat actors. What would be a good choice?
A. AES
B. ECDHE p521
C. ChaCha-256
D. SHA-512
B. ECDHE p521
What type of key agreement would most likely be used on IPSec tunnels?
A. Diffie-Hellman
B. DSA
C. RSA
D. Salsa
A. Diffie-Hellman
What is a good choice regarding a signing algorithm that will work well on low powered mobile devices?
A. DSA
B. RSA
C. ECDSA
D. HMAC
C. ECDSA
What is the first step in the handshake for a secure web session that’s using SSL/TLS?
A. Server hell
B. Session key created
C. Client hello
D. Pre master secret
C. Client hello
A government agency needs to ensure that email messages are secure from mailbox to mailbox. It cannot be guaranteed that all SMTP connections are secure. What is the best choice?
A. SSL/TLS
B. S/MIME
C. IPSec
D. SSH
B. S/MIME
Nah
While setting up a commercial customer facing web application server, what would be a good choice regarding a key exchange that will support forward secrecy?
A. DH
B. RSA
C. ChaCha
D. ECDHE
D. ECDHE
What term is used to describe the message integrity thats provided by protocols such as Poly1305 and GCM?
A. Non repudiation
B. Authenticated encryption with associated data
C. Perfect forward secrecy
D. Collision resistance
B. Authenticated encryption with associated data