CISSP-P2 Flashcards
Asymmetry
Public key request
Public key received
Encrypt using public key
Receiver uses private key to decrypt
True or false
True
Asymmetry
Public key request
Public key received
Encrypt using private key
Receiver uses private key to decrypt
True or false
False
Asymmetry
Private key request
Private key received
Encrypt using private key
Receiver uses public key to decrypt
True or false
False
To Memory - Hash functions has 5 requirements
The must allow input of any length
Provide fixed- length output
Make it relatively easy to compute the hash function for any input
Provide one-way functionality
Must be collision free
To Memory -Collision in hashes is when we put two different inputs through a hash function and it will generate the same output.
Cryptographic Salts - Is used as an additional input to a one way function that hashes data, a password or a phrase
Adding this _______ to the passwords before hashing them reduces the effectiveness of rainbow table attacks.
Salts
DES
3DES
Salts
The digital signature standard uses the SHA-1, SHA-2 and SHA-3 , there are also
Salt function
Message Digest function
Message Digest function used in DSS
In PKI certificate recipients who validates the certificate?
User public key
CA Public key
CA Public key
Where would you use S/MIME and Pretty good privacy (PGP)?
Email
Web
Network
Where would you use TLS?
Email
Web
Network
Web
Where would you IPSEC?
Email
Web
Network
Network
IPSEC has 2 modes
Transport Tunnel-Tunnel Mode
Transport Timeout-Tunnel Pair
Transport Tunnel-Tunnel Mode
IPSEC uses 2 protocols
Authentication Header- Encapsulating payload
Authorization Header- Encapsulating payload
Authentication Header- Encapsulating payload
To Memory-
If you want to encrypt a confidential message, use the recipient’s public key.
If you want to decrypt a confidential message sent to you, use your private key.
If you want to digitally sign a message you are sending to someone else, use your private key.
If you want to verify the signature on a message sent by someone else, use the sender’s public key.
Brian computes the digest of a single sentence of text using a SHA-2 hash function. He then changes a single character of the sentence and computes the hash value again. Which one of the following statements is true about the new hash value?
A. The new hash value will be one character different from the old hash value.
B. The new hash value will share at least 50 percent of the characters of the old hash value.
C. The new hash value will be unchanged.
D. The new hash value will be completely different from the old hash value.
D. Any change, no matter how minor, to a message will result in a completely different hash
value. There is no relationship between the significance of the change in the message and the
significance of the change in the hash value.
Alan believes that an attacker is collecting information about the electricity consumption of a sensitive cryptographic device and using that information to compromise encrypted data.
What type of attack does he suspect is taking place?
A. Brute force
B. Side channel
C. Known plaintext
D. Frequency analysis
B. Side-channel attacks use information gathered about a system’s use of resources, timing, or other characteristics to contribute to breaking the security of encryption. Brute-force attacks seek to exhaust all possible encryption keys. Known plaintext attacks require access to both plaintext and its corresponding ciphertext. Frequency analysis attacks require access to ciphertext.
If Richard wants to send a confidential encrypted message to Sue using a public key cryptosystem, which key does he use to encrypt the message?
A. Richard’s public key
B. Richard’s private key
C. Sue’s public key
D. Sue’s private key
C. Richard must encrypt the message using Sue’s public key so that Sue can decrypt it using her private key. If he encrypted the message with his own public key, the recipient would need to know Richard’s private key to decrypt the message. If he encrypted it with his own private key, any user could decrypt the message using Richard’s freely available public key. Richard could not encrypt the message using Sue’s private key because he does not have access to it. If he did, any user could decrypt it using Sue’s freely available public key.
If a 2,048-bit plaintext message were encrypted with the ElGamal public key cryptosystem, how long would the resulting ciphertext message be?
A. 1,024 bits
B. 2,048 bits
C. 4,096 bits
D. 8,192 bit
C. The major disadvantage of the ElGamal cryptosystem is that it doubles the length of any message it encrypts. Therefore, a 2,048-bit plaintext message would yield a 4,096-bit ciphertext message when ElGamal is used for the encryption process.
Acme Widgets currently uses a 3,072-bit RSA encryption standard companywide. The company plans to convert from RSA to an elliptic curve cryptosystem. If the company wants
to maintain the same cryptographic strength, what ECC key length should it use?
A. 256 bits
B. 512 bits
C. 1,024 bits
D. 2,048 bit
A. The elliptic curve cryptosystem requires significantly shorter keys to achieve encryption that would be the same strength as encryption achieved with the RSA encryption algorithm. A 3,072-bit RSA key is cryptographically equivalent to a 256-bit elliptic curve cryptosystem key.
John wants to produce a message digest of a 2,048-byte message he plans to send to Mary. If he uses the SHA-2 hashing algorithm, what is a possible size for the message digest generated?
A. 160 bits
B. 512 bits
C. 1,024 bits
D. 2,048 bits
B. The SHA-2 hashing algorithm comes in four variants. SHA-224 produces 224-bit digests. SHA-256 produces 256-bit digests. SHA-384 produces 384-bit digests, and SHA512 produces 512-bit digests. Of the options presented here, only 512 bits is a valid SHA-2 hash length.
After conducting a survey of encryption technologies used in her organization, Melissa suspects that some may be out of date and pose security risks. Which one of the following technologies is considered flawed and should no longer be used?
A. SHA-3
B. TLS 1.2
C. IPsec
D. SSL 3.0
D. The Secure Sockets Layer (SSL) protocol is deprecated and no longer considered secure. It should never be used. The Secure Hash Algorithm 3 (SHA-3), Transport Layer Security (TLS) 1.2, and IPsec are all modern, secure protocols and standards.
You are developing an application that compares passwords to those stored in a Unix password file. The hash values you compute are not correctly matching those in the file. What
might have been added to the stored password hashes?
A. Salt
B. Double hash
C. Added encryption
D. One-time pad
A. Cryptographic salt values are added to the passwords in password files before hashing to defeat rainbow table and dictionary attacks. Double hashing does not provide any added security. Adding encryption to the passwords is challenging, because then the operating system must possess the decryption key. A one-time pad is only appropriate for use in human-to-human communications and would not be practical here.
Richard received an encrypted message sent to him from Sue. Sue encrypted the message using the RSA encryption algorithm. Which key should Richard use to decrypt the message?
A. Richard’s public key
B. Richard’s private key
C. Sue’s public key
D. Sue’s private key
B. Sue would have encrypted the message using Richard’s public key. Therefore, Richard needs to use the complementary key in the key pair, his private key, to decrypt the message.
Richard wants to digitally sign a message he’s sending to Sue so that Sue can be sure the message came from him without modification while in transit. Which key should he use to encrypt the message digest?
A. Richard’s public key
B. Richard’s private key
C. Sue’s public key
D. Sue’s private key
B. Richard should encrypt the message digest with his own private key. When Sue receives the message, she will decrypt the digest with Richard’s public key and then compute the
digest herself. If the two digests match, she can be assured that the message truly originated from Richard.