Chapter 7 Flashcards
When a cryptographic system is used to protect data confidentiality, what actually takes place?
Data is protected from corruption or change.
Encrypted data transmission is prohibited.
Unauthorized users are prevented from viewing or accessing the resource.
Data is available for access whenever authorized users need it.
Unauthorized users are prevented from viewing or accessing the resource.
Which term means a cryptography mechanism that hides secret communications within various forms of data?
Ciphertext
Cryptanalysis
Steganography
Algorithm
Steganography
Which of the following algorithms are used in asymmetric encryption? (Select two.)
Diffie-Hellman
Blowfish
RSA
AES
Twofish
Diffie-Hellman
RSA
A receiver wants to verify the integrity of a message received from a sender. A hashing value is contained within the digital signature of the sender.
Which of the following must the receiver use to access the hashing value and verify the integrity of the transmission?
Sender’s private key
Sender’s public key
Receiver’s public key
Receiver’s private key
Sender’s public key
Mary wants to send a message to Sam in such a way that only Sam can read it. Which key should be used to encrypt the message?
Sam’s private key
Mary’s private key
Sam’s public key
Mary’s public key
Sam’s public key
Above all else, what must be protected to maintain the security and benefit of an asymmetric cryptographic solution, especially if it is widely used for digital certificates?
Hash values
Private keys
Public keys
Cryptographic algorithm
Private keys
Which of the following algorithms are used in symmetric encryption? (Select two.)
Blowfish
Diffie-Hellman
3DES
ECC
RSA
Blowfish
3DES
Which of the following encryption mechanisms offers the least security because of weak keys?
TwoFish
AES
DES
IDEA
DES
Which of the following can be classified as a stream cipher?
Twofish
RC4
Blowfish
AES
RC4
Which type of password attack employs a list of pre-defined passwords that it tries against a login prompt?
Downgrade attack
Collision attack
Birthday attack
Dictionary attack
Dictionary attack
Cryptographic systems provide which of the following security services? (Select two.)
Cryptanalysis
Decryption
Non-repudiation
Encryption
Confidentiality
Non-repudiation
Confidentiality
You have downloaded a file from the internet. You generate a hash and check it against the original file’s hash to ensure the file has not been changed. Which information security goal is this an example of?
Integrity
Authenticity
Confidentiality
Non-repudiation
Integrity
Which of the following are true of Triple DES (3DES)?
Can easily be broken
Uses the Rijndael block cipher
Key length is 168 bits
Uses 64-bit blocks with 128-bit keys
Key length is 168 bits
When a sender encrypts a message using their own private key, which security service is being provided to the recipient?
Integrity
Availability
Confidentiality
Non-repudiation
Non-repudiation
Which of the following is a direct integrity protection?
Asymmetric encryption
Symmetric encryption
Digital signature
Digital envelope
Digital signature
What is the most obvious means of providing non-repudiation in a cryptography system?
Public keys
Shared secret keys
Digital signatures
Hashing values
Digital signatures
Which form of cryptography is best suited for bulk encryption because it is so fast?
Asymmetric cryptography
Symmetric key cryptography
Hashing cryptography
Public key cryptography
Symmetric key cryptography
Your computer system is a participant in an asymmetric cryptography system. You’ve crafted a message to be sent to another user. Before transmission, you hash the message and then encrypt the hash using your private key. You then attach this encrypted hash to your message as a digital signature before sending it to the other user.
Which protection does the private key-signing activity of this process provide?
Integrity
Availability
Non-repudiation
Confidentiality
Non-repudiation
What is the main function of a TPM hardware chip?
Provide authentication credentials on a hardware device
Control access to removable media
Generate and store cryptographic keys
Perform bulk encryption in a hardware processor
Generate and store cryptographic keys
Which of the following functions are performed by a TPM?
Provide authentication credentials
Perform bulk encryption
Create a hash of system components
Encrypt network data using IPsec
Create a hash of system components