Chapter 12 - Encryption and Hashing Concepts Flashcards

1
Q

Which of the following is the proper order of functions for asymmetric keys?
A. Decrypt, validate, and code and verify
B. Sign, encrypt, decrypt, and verify
C. Encrypt, sign, decrypt, and verify
D. Decrypt, decipher, and code and encrypt

A

C. The proper order of functions for asymmetric keys is as follows: encrypt, sign, decrypt, and verify. This is the case when a digital signature is used to authenticate an asymmetrically encrypted document.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which type of encryption technology is used with the BitLocker application?
A. Symmetric
B. Asymmetric
C. Hashing
D. WPA2
A

A. BitLocker uses symmetric encryption technology based on AES. Hashing is the process of summarizing a file for integrity purposes. WPA2 is a wireless encryption protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Which of the following will provide an integrity check?
A. Public key
B. Private key
C. WEP
D. Hash
A

D. A hash provides integrity checks, for example, MD5 hash algorithms. Public and private keys are the element of a cipher that allows for output of encrypted information. WEP (Wired Equivalent Privacy) is a deprecated wireless encryption protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Why would a hacker use steganography?
A. To hide information
B. For data integrity
C. To encrypt information
D. For wireless access
A

A. Steganography is the act of writing hidden messages so that only the intended recipients know of the existence of the message. This is a form of security through obscurity. Steganographers are not as concerned with data integrity or encryption because the average person shouldn’t even know that a message exists. Although steganography can be accomplished by using compromised wireless networks, it is not used to gain wireless access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
You need to encrypt and send a large amount of data, which of the following
would be the best option?
A. Symmetric encryption
B. Hashing algorithm
C. Asymmetric encryption
D. PKI
A

A. Symmetric encryption is the best option for sending large amounts of data. It is superior to asymmetric encryption. PKI is considered an asymmetric encryption
type, and hashing algorithms don’t play into sending large amounts of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Imagine that you are a hacker. Which would be most desirable when attempting to compromise encrypted data?
A. A weak key
B. The algorithm used by the encryption protocol
C. Captured traffic
D. A block cipher

A

A. The easiest way for a hacker to get at encrypted data is if that encrypted data has a weak encryption key. The algorithm isn’t of much use to a hacker unless it has been broken, which is a far more difficult process than trying to crack an individual key. Captured traffic, if encrypted, still needs to be decrypted, and a weak key will aid in this process. The block cipher is a type of algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
An SHA algorithm will have how many bits?
A. 64
B. 128
C. 512
D. 1,024
A

C. SHA-2 algorithm blocks have 512 bits. SHA-1 is 160-bit. MD5 is 128-bit; 1,024-bit keys are common in asymmetric encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
What is another term for secret key encryption?
A. PKI
B. Asymmetrical
C. Symmetrical
D. Public key
A

C. Symmetric key encryption uses a secret key. The term symmetric key is also referred to as the following: private key, single key, and shared key (and sometimes as session key). PKI and public keys at their core are asymmetrical.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Your boss wants you to set up an authentication scheme in which employees will use smart cards to log in to the company network. What kind of key should be used to accomplish this?
A. Private key
B. Public key
C. Cipher key
D. Shared key
A

A. A private key should be used by users when logging in to the network with their smart card. The key should certainly not be public. A key actually determines the function of a cipher. Shared key is another term for symmetric-key
encryption but does not imply privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
The IT director wants you to use a cryptographic algorithm that cannot be decoded by being reversed. Which of the following would be the best option?
A. Asymmetric
B. Symmetric
C. PKI
D. One way function
A

D. In cryptography, the one-way function is one option of an algorithm that cannot be reversed, or is difficult to reverse, in an attempt to decode data. An example of this would be a hash such as SHA-2, which creates only a small hashing number from a portion of the file or message. There are ways to crack asymmetric and symmetric encryptions, which enable complete decryption (decoding) of the file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Which of the following concepts does the Diffie-Hellman algorithm rely on?
A. Usernames and passwords
B. VPN tunneling
C. Biometrics
D. Key exchange
A

D. The Diffie-Hellman algorithm relies on key exchange before data can be sent. Usernames and passwords are considered a type of authentication. VPN tunneling is done to connect a remote client to a network. Biometrics is the science of identifying people by one of their physical attributes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does steganography replace in graphic files?
A. The least significant bit of each byte
B. The most significant bit of each byte
C. The least significant byte of each bit
D. The most significant byte of each bit

A

A. Steganography replaces the least significant bit of each byte. It would be impossible to replace a byte of each bit, because a byte is larger than a bit; a byte is eight bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
What does it mean if a hashing algorithm creates the same hash for two different downloads?
A. A hash is not encrypted.
B. A hashing chain has occurred.
C. A one-way hash has occurred.
D. A collision has occurred.
A

D. If a hashing algorithm generates the same hash for two different messages within two different downloads, a collision has occurred and the implementation of the hashing algorithm should be investigated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following methods will best verify that a download from the Internet has not been modified since the manufacturer released it?
A. Compare the final LANMAN hash with the original.
B. Download the patch file over an AES encrypted VPN connection.
C. Download the patch file through an SSL connection.
D. Compare the final MD5 hash with the original.

A

D. The purpose of the MD5 hash is to verify the integrity of a download. SHA is another example of a hash that will verify the integrity of downloads. LANMAN hashes are older deprecated hashes used by Microsoft LAN Manager for passwords. Encrypted AES and SSL connections are great for encrypting the
data transfer but do not verify integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Which of the following encryption methods deals with two distinct, large prime numbers and the inability to factor those prime numbers?
A. SHA-1
B. RSA
C. WPA
D. Symmetric
A

B. The RSA encryption algorithm uses two prime numbers. If used properly they will be large prime numbers that are difficult or impossible to factor. SHA-1 is an example of a Secure Hash Algorithm. WPA is the Wi-Fi Protected Access protocol, and RSA is an example of an asymmetric method of encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
Which of the following is not a symmetric key algorithm?
A. RC4
B. ECC
C. 3DES
D. Rijndael
A

B. ECC or elliptic curve cryptography is an example of public key cryptography that uses an asymmetric key algorithm. All the other answers are symmetric key algorithms.

17
Q
You are attempting to move data to a USB flash drive. Which of the following enables a rapid and secure connection?
A. SHA-1
B. 3DES
C. AES256
D. MD5
A

C. AES256 enables a quick and secure encrypted connection for use with a USB flash drive. It might even be used with a whole disk encryption technology,
such as BitLocker. SHA-1 and MD5 are examples of hashes. 3DES is an example of an encryption algorithm but would not be effective for sending encrypted
information in a highly secure manner and quickly to USB flash drive.

18
Q
Which of the following is used by PGP to encrypt data.
A. Asymmetric key distribution system
B. Asymmetric scheme
C. Symmetric key distribution system
D. Symmetric scheme
A

D. Pretty Good Privacy (PGP) encryption uses a symmetric-key cryptography scheme and a combination of hashing and data compression. Key distribution systems are part of an entire encryption scheme, such as technologies such as Kerberos (key distribution center) or quantum cryptography.

19
Q
Which of the following encryption algorithms is used to encrypt and decrypt data?
A. SHA-1
B. RC5
C. MD5
D. NTLM
A

B. RC5 (Rivest Cipher version 5) can encrypt and decrypt data. SHA-1 and MD5 are used as hashing algorithms, and NTLM (NT LAN Manager) is used by Microsoft as an authentication protocol and a password hash.

20
Q

Of the following, which statement correctly describes the difference between a secure cipher and a secure hash?
A. A hash produces a variable output for any input size; a cipher does not.
B. A cipher produces the same size output for any input size; a hash does not.
C. A hash can be reversed; a cipher cannot.
D. A cipher can be reversed; a hash cannot.

A

D. Ciphers can be reverse engineered but hashes cannot when attempting to re-create a data file. Hashing is not the same as encryption; hashing is the digital fingerprint, so to speak, of a group of data. Hashes are not reversible.

21
Q
When encrypting credit card data, which would be the most secure algorithm with the least CPU utilization?
A. AES
B. 3DES
C. SHA-1
D. MD5
A

A. AES (the Advanced Encryption Standard) is fast and secure, more so than 3DES. SHA-1 and MD5 are hashing algorithms. Not listed is RSA, which is commonly implemented to secure credit card transactions.

22
Q
A hash algorithm has the capability to avoid the same output from two guessed inputs. What is this known as?
A. Collision resistance
B. Collision strength
C. Collision cipher
D. Collision metric
A

A. A hash is collision-resistant if it is difficult to guess two inputs that hash to the same output.

23
Q
Which of the following is the weakest encryption type?
A. DES
B. RSA
C. AES
D. SHA
A

A. DES or the Data Encryption Standard was developed in the 1970s; its 56-bit key has been superseded by 3DES (max 168-bit key) and AES (max 256-bit key). DES is now considered to be insecure for many applications. RSA is definitely stronger than DES even when you compare its asymmetric strength to a relative symmetric strength. SHA is a hashing algorithm.

24
Q
Give two examples of hardware devices that can store keys. (Select the two best answers.)
A. Smart card
B. Network adapter
C. PCI Express card
D. PCMCIA card
A

A and D. Smart cards and PCMCIA cards can be used as devices that carry a token and store keys; this means that they can be used for authentication to systems, often in a multifactor authentication scenario. Network adapters and PCI Express cards are internal to a PC and would not make for good key storage
devices.

25
Q
What type of attack sends two different messages using the same hash function, which end up causing a collision?
A. Birthday attack
B. Bluesnarfing
C. Man-in-the-middle attack
D. Logic bomb
A

A. A birthday attack exploits the mathematics behind the birthday problem in probability theory. It deals with two different messages using the same hash function, generating the same message digest. Bluesnarfing deals with Bluetooth devices. The man-in-the-middle attack is when a person or computer
intercepts information between a sender and the receiver. A logic bomb is a malicious attack set to go off at a particular time; often it is stored on a zombie computer.

26
Q
Why would a hacker use steganography?
A. To hide information
B. For data integrity
C. To encrypt information
D. For wireless access
A

A. Steganography is the act of writing hidden messages so that only the intended recipients will know of the existence of the message. This is a form of security through obscurity. Data integrity is accomplished through the use of hashing. Steganography is not the same as cryptography in that it doesn’t care whether a person sees the original message.

27
Q

Which of the following might a public key be used to accomplish?
A. To decrypt the hash of a digital signature
B. To encrypt web browser traffic
C. To digitally sign a message
D. To decrypt wireless messages

A

A. Public keys can be used to decrypt the hash of a digital signature. Session keys are used to encrypt web browser traffic. Private keys are used to digitally sign a message and decrypt wireless messages.

28
Q
You scan a computer for weak passwords and discover that you can figure out the password by cracking the first seven characters and then cracking the second part of the password separately.  What type of hash is being used on the computer?
A. MD5
B. SHA-1
C. LANMAN
D. NTLMv2
A

C. The LANMAN hash is a deprecated cryptographic hash function that breaks the password into two parts, the first of which is only seven characters. Due to its weakness, NTLMv2 is recommended. MD5 and SHA-1 are more powerful cryptographic hash functions that do not have this problem.

29
Q
WEP improperly uses an encryption protocol and because of this is considered to be insecure. What encryption protocol does it use?
A. AES
B. RSA
C. RC6
D. RC4
A

D. RC4 has several vulnerabilities when used incorrectly by protocols such as WEP. WEP does not use AES, RSA, or RC6, all of which are secure protocols if used correctly.

30
Q

The fundamental difference between symmetric key systems and asymmetric key systems is that the symmetric key system will:
A. Use the same key on each end
B. Use different keys on each end
C. Use multiple keys for nonrepudiation purposes
D. Use public key cryptography

A

A. Symmetric key systems use the same key on each end during transport of data. Asymmetric key systems (such as public key cryptography systems) use different keys.

31
Q

Last week, one of the users in your organization encrypted a file with a private key. This week the user left the organization, and unfortunately the systems administrator deleted the user’s account. What are the most probable outcomes of this situation? (Select the two best answers.)
A. The data is not recoverable.
B. The former user’s account can be re-created to access the file.
C. The file can be decrypted with a PKI.
D. The data can be decrypted using the recovery agent.
E. The data can be decrypted using the root user account.

A

A and D. Many systems have a recovery agent that is designed just for this purpose. If the account that encrypted the file is deleted, it cannot be recreated (without different IDs and therefore no access to the file), and the recovery agent will have to be used. If there is no recovery agent (which in some cases needs to be configured manually), then the file will be unrecoverable. This file was encrypted with a private key and needs to be decrypted with a private key—PKI is a system that uses asymmetric key pairs (private and public). The root user account does not have the ability to recover files that were encrypted by other users.

32
Q
You are tasked with ensuring that messages being sent and received between two systems are both encrypted and authenticated.  Which of the following protocols accomplishes this?
A. Diffie-Hellman
B. WDE
C. RSA
D. SHA-1
A

C. RSA can both encrypt and authenticate messages. Diffie-Hellman encrypts only. WDE is whole disk encryption, which deals with encrypting entire hard drives but is not used to send and receive messages. SHA-1 is a cryptographic hash function used to preserve the integrity of files.