CISSP-P2 Flashcards
Asymmetry
Public key request
Public key received
Encrypt using public key
Receiver uses private key to decrypt
True or false
True
Asymmetry
Public key request
Public key received
Encrypt using private key
Receiver uses private key to decrypt
True or false
False
Asymmetry
Private key request
Private key received
Encrypt using private key
Receiver uses public key to decrypt
True or false
False
To Memory - Hash functions has 5 requirements
The must allow input of any length
Provide fixed- length output
Make it relatively easy to compute the hash function for any input
Provide one-way functionality
Must be collision free
To Memory -Collision in hashes is when we put two different inputs through a hash function and it will generate the same output.
Cryptographic Salts - Is used as an additional input to a one way function that hashes data, a password or a phrase
Adding this _______ to the passwords before hashing them reduces the effectiveness of rainbow table attacks.
Salts
DES
3DES
Salts
The digital signature standard uses the SHA-1, SHA-2 and SHA-3 , there are also
Salt function
Message Digest function
Message Digest function used in DSS
In PKI certificate recipients who validates the certificate?
User public key
CA Public key
CA Public key
Where would you use S/MIME and Pretty good privacy (PGP)?
Email
Web
Network
Where would you use TLS?
Email
Web
Network
Web
Where would you IPSEC?
Email
Web
Network
Network
IPSEC has 2 modes
Transport Tunnel-Tunnel Mode
Transport Timeout-Tunnel Pair
Transport Tunnel-Tunnel Mode
IPSEC uses 2 protocols
Authentication Header- Encapsulating payload
Authorization Header- Encapsulating payload
Authentication Header- Encapsulating payload
To Memory-
If you want to encrypt a confidential message, use the recipient’s public key.
If you want to decrypt a confidential message sent to you, use your private key.
If you want to digitally sign a message you are sending to someone else, use your private key.
If you want to verify the signature on a message sent by someone else, use the sender’s public key.
Brian computes the digest of a single sentence of text using a SHA-2 hash function. He then changes a single character of the sentence and computes the hash value again. Which one of the following statements is true about the new hash value?
A. The new hash value will be one character different from the old hash value.
B. The new hash value will share at least 50 percent of the characters of the old hash value.
C. The new hash value will be unchanged.
D. The new hash value will be completely different from the old hash value.
D. Any change, no matter how minor, to a message will result in a completely different hash
value. There is no relationship between the significance of the change in the message and the
significance of the change in the hash value.
Alan believes that an attacker is collecting information about the electricity consumption of a sensitive cryptographic device and using that information to compromise encrypted data.
What type of attack does he suspect is taking place?
A. Brute force
B. Side channel
C. Known plaintext
D. Frequency analysis
B. Side-channel attacks use information gathered about a system’s use of resources, timing, or other characteristics to contribute to breaking the security of encryption. Brute-force attacks seek to exhaust all possible encryption keys. Known plaintext attacks require access to both plaintext and its corresponding ciphertext. Frequency analysis attacks require access to ciphertext.
If Richard wants to send a confidential encrypted message to Sue using a public key cryptosystem, which key does he use to encrypt the message?
A. Richard’s public key
B. Richard’s private key
C. Sue’s public key
D. Sue’s private key
C. Richard must encrypt the message using Sue’s public key so that Sue can decrypt it using her private key. If he encrypted the message with his own public key, the recipient would need to know Richard’s private key to decrypt the message. If he encrypted it with his own private key, any user could decrypt the message using Richard’s freely available public key. Richard could not encrypt the message using Sue’s private key because he does not have access to it. If he did, any user could decrypt it using Sue’s freely available public key.
If a 2,048-bit plaintext message were encrypted with the ElGamal public key cryptosystem, how long would the resulting ciphertext message be?
A. 1,024 bits
B. 2,048 bits
C. 4,096 bits
D. 8,192 bit
C. The major disadvantage of the ElGamal cryptosystem is that it doubles the length of any message it encrypts. Therefore, a 2,048-bit plaintext message would yield a 4,096-bit ciphertext message when ElGamal is used for the encryption process.
Acme Widgets currently uses a 3,072-bit RSA encryption standard companywide. The company plans to convert from RSA to an elliptic curve cryptosystem. If the company wants
to maintain the same cryptographic strength, what ECC key length should it use?
A. 256 bits
B. 512 bits
C. 1,024 bits
D. 2,048 bit
A. The elliptic curve cryptosystem requires significantly shorter keys to achieve encryption that would be the same strength as encryption achieved with the RSA encryption algorithm. A 3,072-bit RSA key is cryptographically equivalent to a 256-bit elliptic curve cryptosystem key.
John wants to produce a message digest of a 2,048-byte message he plans to send to Mary. If he uses the SHA-2 hashing algorithm, what is a possible size for the message digest generated?
A. 160 bits
B. 512 bits
C. 1,024 bits
D. 2,048 bits
B. The SHA-2 hashing algorithm comes in four variants. SHA-224 produces 224-bit digests. SHA-256 produces 256-bit digests. SHA-384 produces 384-bit digests, and SHA512 produces 512-bit digests. Of the options presented here, only 512 bits is a valid SHA-2 hash length.
After conducting a survey of encryption technologies used in her organization, Melissa suspects that some may be out of date and pose security risks. Which one of the following technologies is considered flawed and should no longer be used?
A. SHA-3
B. TLS 1.2
C. IPsec
D. SSL 3.0
D. The Secure Sockets Layer (SSL) protocol is deprecated and no longer considered secure. It should never be used. The Secure Hash Algorithm 3 (SHA-3), Transport Layer Security (TLS) 1.2, and IPsec are all modern, secure protocols and standards.
You are developing an application that compares passwords to those stored in a Unix password file. The hash values you compute are not correctly matching those in the file. What
might have been added to the stored password hashes?
A. Salt
B. Double hash
C. Added encryption
D. One-time pad
A. Cryptographic salt values are added to the passwords in password files before hashing to defeat rainbow table and dictionary attacks. Double hashing does not provide any added security. Adding encryption to the passwords is challenging, because then the operating system must possess the decryption key. A one-time pad is only appropriate for use in human-to-human communications and would not be practical here.
Richard received an encrypted message sent to him from Sue. Sue encrypted the message using the RSA encryption algorithm. Which key should Richard use to decrypt the message?
A. Richard’s public key
B. Richard’s private key
C. Sue’s public key
D. Sue’s private key
B. Sue would have encrypted the message using Richard’s public key. Therefore, Richard needs to use the complementary key in the key pair, his private key, to decrypt the message.
Richard wants to digitally sign a message he’s sending to Sue so that Sue can be sure the message came from him without modification while in transit. Which key should he use to encrypt the message digest?
A. Richard’s public key
B. Richard’s private key
C. Sue’s public key
D. Sue’s private key
B. Richard should encrypt the message digest with his own private key. When Sue receives the message, she will decrypt the digest with Richard’s public key and then compute the
digest herself. If the two digests match, she can be assured that the message truly originated from Richard.
Which one of the following algorithms is not supported by the Digital Signature Standard under FIPS 186-4?
A. Digital Signature Algorithm
B. RSA
C. ElGamal DSA
D. Elliptic Curve DSA
C. The Digital Signature Standard allows federal government use of the Digital Signature Algorithm, RSA, or the Elliptic Curve DSA in conjunction with the SHA-1 hashing function
to produce secure digital signatures.
Which International Telecommunications Union (ITU) standard governs the creation and endorsement of digital certificates for secure electronic communication?
A. X.500
B. X.509
C. X.900
D. X.905
B. X.509 governs digital certificates and the public key infrastructure (PKI). It defines the appropriate content for a digital certificate and the processes used by certificate authorities to generate and revoke certificates.
Ron believes that an attacker accessed a highly secure system in his data center and applied high-voltage electricity to it in an effort to compromise the cryptographic keys that it uses. What type of attack does he suspect?
A. Implementation attack
B. Fault injection
C. Timing
D. Chosen ciphertext
B. Fault injection attacks compromise the integrity of a cryptographic device by causing some type of external fault, such as the application of high-voltage electricity. Implementation attacks rely on flaws in the cryptographic algorithm. Timing attacks measure the length of time consumed by encryption operations. Chosen ciphertext attacks require access to the algorithm and work by having the attacker perform encryption that results in an expected
ciphertext.
Brandon is analyzing network traffic and is searching for user attempts to access websites over secure TLS connections. What TCP port should Brandon add to his search filter because it would normally be used by this traffic?
A. 22
B. 80
C. 443
D. 1443
C. HTTPS uses TCP port 443 for encrypted client/server communications over TLS. Port 22 is used by the secure shell (SSH) protocol. Port 80 is used by the unencrypted HTTP protocol. Port 1433 is used for Microsoft SQL Server database connections.
Beth is assessing the vulnerability of a cryptographic system to attack. She believes that the cryptographic keys are properly secured and that the system is using a modern, secure algorithm. Which one of the following attacks would most likely still be possible against the system by an external attacker who did not participate in the system and did not have physical access to the facility?
A. Ciphertext only
B. Known plaintext
C. Chosen plaintext
D. Fault injection
A. An attacker without any special access to the system would only be able to perform ciphertext-only attacks. Known plaintext and chosen plaintext attacks require the ability to encrypt data. Fault injection attacks require physical access to the facility.
Which of the following tools can be used to improve the effectiveness of a brute-force password cracking attack?
A. Rainbow tables
B. Hierarchical screening
C. TKIP
D. Random enhancement
A. Rainbow tables contain precomputed hash values for commonly used passwords and may be used to increase the efficiency of password-cracking attacks.
Chris is searching a Windows system for binary key files and wishes to narrow his search using file extensions. Which one of the following certificate formats is closely associated with Windows binary certificate files?
A. CCM
B. PEM
C. PFX
D. P7B
C. The PFX format is most closely associated with Windows systems that store certificates in binary format, whereas the P7B format is used for Windows systems storing files in text
format. The PEM format is another text format, and the CCM format does not exist.
What is the major disadvantage of using certificate revocation lists?
A. Key management
B. Latency
C. Record keeping
D. Vulnerability to brute-force attacks
B. Certificate revocation lists (CRLs) introduce an inherent latency to the certificate expiration process due to the time lag between CRL distributions.
Which one of the following encryption algorithms is now considered insecure?
A. ElGamal
B. RSA
C. Elliptic Curve Cryptography
D. Merkle–Hellman Knapsack
D. The Merkle–Hellman Knapsack algorithm, which relies on the difficulty of factoring super-increasing sets, has been broken by cryptanalysts.
Brian is upgrading a system to support SSH2 rather than SSH1. Which one of the following advantages will he achieve?
A. Support for multifactor authentication
B. Support for simultaneous sessions
C. Support for 3DES encryption
D. Support for IDEA encryption
- B. SSH2 adds support for simultaneous shell sessions over a single SSH connection. Both SSH1 and SSH2 are capable of supporting multifactor authentication. SSH2 actually drops support for the IDEA algorithm, whereas both SSH1 and SSH2 support 3DES
- Ryan is responsible for managing the cryptographic keys used by his organization. Which of the following statements are correct about how he should select and manage those keys? (Choose all that apply.)
A. Keys should be sufficiently long to protect against future attacks if the data is expected to remain sensitive.
B. Keys should be chosen using an approach that generates them from a predictable pattern.
C. Keys should be maintained indefinitely.
D. Longer keys provide greater levels of security.
A, D. Keys must be long enough to withstand attack for as long as the data is expected to remain sensitive. They should not be generated in a predictable way but, rather, should be
randomly generated. Keys should be securely destroyed when they are no longer needed and not indefinitely retained. Longer keys do indeed provide greater security against brute force attacks.
- John recently received an email message from Bill. What cryptographic goal would need to be met to convince John that Bill was actually the sender of the message?
A. Nonrepudiation
B. Confidentiality
C. Availability
D. Integrity
A. Nonrepudiation prevents the sender of a message from later denying that they sent it. Confidentiality protects the contents of encrypted data from unauthorized disclosure. Integrity protects data from unauthorized modification. Availability is not a goal of cryptography.
You are implementing AES encryption for files that your organization plans to store in a cloud storage service and wish to have the strongest encryption possible. What key length should you choose?
A. 192 bits
B. 256 bits
C. 512 bits
D. 1,024 bits
B. The strongest keys supported by the Advanced Encryption Standard are 256 bits. The valid AES key lengths are 128, 192, and 256 bits.
- You are creating a security product that must facilitate the exchange of symmetric encryption keys between two parties that have no way to securely exchange keys in person. What algorithm might you use to facilitate the exchange?
A. Rijndael
B. Blowfish
C. Vernam
D. Diffie–Hellman
D. The Diffie–Hellman algorithm allows the exchange of symmetric encryption keys between two parties over an insecure channel.
What occurs when the relationship between the plaintext and the key is complicated enough that an attacker can’t merely continue altering the plaintext and analyzing the resulting ciphertext to determine the key? (Choose all that apply.)
A. Confusion
B. Transposition
C. Polymorphism
D. Diffusion
A, D. Confusion and diffusion are two principles underlying most cryptosystems. Confusion occurs when the relationship between the plaintext and the key is so complicated that an attacker can’t merely continue altering the plaintext and analyzing the resulting ciphertext to determine the key. Diffusion occurs when a change in the plaintext results in multiple changes spread throughout the ciphertext.
Randy is implementing an AES-based cryptosystem for use within his organization. He would like to better understand how he might use this cryptosystem to achieve his goals.
Which of the following goals are achievable with AES? (Choose all that apply.)
A. Nonrepudiation
B. Confidentiality
C. Authentication
D. Integrity
B, C, D. AES provides confidentiality, integrity, and authentication when implemented properly. Nonrepudiation requires the use of a public key cryptosystem to prevent users from falsely denying that they originated a message and cannot be achieved with a symmetric cryptosystem, such as AES.
Brian encountered encrypted data left on one of his systems by attackers who were communicating with one another. He has tried many cryptanalytic techniques and was unable to decrypt the data. He believes that the data may be protected with an unbreakable system. When correctly implemented, what is the only cryptosystem known to be unbreakable?
A. Transposition cipher
B. Substitution cipher
C. Advanced Encryption Standard
D. One-time pad
D. Assuming that it is used properly, the one-time pad is the only known cryptosystem that is not vulnerable to attacks. All other cryptosystems, including transposition ciphers, substitution ciphers, and even AES, are vulnerable to attack, even if no attack has yet been discovered.
Helen is planning to use a one-time pad to meet a unique cryptographic requirement in her organization. She is trying to identify the requirements for using this cryptosystem. Which of the following are requirements for the use of a one-time pad? (Choose all that apply.)
A. The encryption key must be at least one-half the length of the message to be encrypted.
B. The encryption key must be randomly generated.
C. Each one-time pad must be used only once.
D. The one-time pad must be physically protected against disclosure.
B, C, D. The encryption key must be at least as long as the message to be encrypted. This is because each key element is used to encode only one character of the message. The three other facts listed are all characteristics of one-time pad systems
Brian administers a symmetric cryptosystem used by 20 users, each of whom has the ability to communicate privately with any other user. One of those users lost control of their account and Brian believes that user’s keys were compromised. How many keys must he change?
A. 1
B. 2
C. 19
D. 190
C. In a symmetric cryptosystem, a unique key exists for each pair of users. In this case, every key involving the compromised user must be changed, meaning that the key that the user shared with each of the other 19 users must be changed.
Which one of the following cipher types operates on large pieces of a message rather than individual characters or bits of a message?
A. Stream cipher
B. Caesar cipher
C. Block cipher
D. ROT3 cipher
C. Block ciphers operate on message “chunks” rather than on individual characters or bits. The other ciphers mentioned are all types of stream ciphers that operate on individual bits or characters of a message.
James is the administrator for his organization’s symmetric key cryptographic system. He issues keys to users when the need arises. Mary and Beth recently approached him and
presented a need to be able to exchange encrypted files securely. How many keys must James generate?
A. One
B. Two
C. Three
D. Four
A. Symmetric key cryptography uses a shared secret key. All communicating parties utilize the same key for communication in any direction. Therefore, James only needs to create a single symmetric key to facilitate this communication.
Dave is developing a key escrow system that requires multiple people to retrieve a key but does not depend on every participant being present. What type of technique is he using?
A. Split knowledge
B. M of N Control
C. Work function
D. Zero-knowledge proof
B. M of N Control requires that a minimum number of agents (M) out of the total number of agents (N) work together to perform high-security tasks. M of N Control is an example of a split knowledge technique, but not all split knowledge techniques are used for key escrow.
What is used to increase the strength of cryptography by creating a unique ciphertext every time the same message is encrypted with the same key?
A. Initialization vector
B. Vigenère cipher
C. Steganography
D. Stream cipher
A. An initialization vector (IV) is a random bit string (a nonce) that is the same length as the block size that is XORed with the message. IVs are used to create a unique ciphertext every time the same message is encrypted with the same key. Vigenère ciphers are an example of a substitution cipher technique. Steganography is a technique used to embed hidden messages within a binary file. Stream ciphers are used to encrypt continuous streams of data.
Tammy is choosing a mode of operation for a symmetric cryptosystem that she will be using in her organization. She wants to choose a mode that is capable of providing both confidentiality and data authenticity. What mode would best meet her needs?
A. ECB
B. GCM
C. OFB
D. CTR
B. Galois/Counter Mode (GCM) and Counter with Cipher Block Chaining Message Authentication Code mode (CCM) are the only two modes that provide both confidentiality and
data authenticity. Other modes, including Electronic Code Book (ECB), Output Feedback (OFB), and Counter (CTR) modes, only provide confidentiality.
Julie is designing a highly secure system and is concerned about the storage of unencrypted data in RAM. What use case is she considering?
A. Data in motion
B. Data at rest
C. Data in destruction
D. Data in use
D. Data that is stored in memory is being actively used by a system and is considered data in use. Data at rest is data that is stored on nonvolatile media, such as a disk. Data in motion is being actively transferred over a network.
Renee conducted an inventory of encryption algorithms used in her organization and found that they are using all of the algorithms below. Which of these algorithms should be discontinued? (Choose all that apply.)
A. AES
B. DES
C. 3DES
D. RC5
B, C. The Advanced Encryption Standard (AES) and Rivest Cipher 6 (RC6) are modern, secure algorithms. The Data Encryption Standard (DES) and Triple DES (3DES) are outdated and no longer considered secure.
Which one of the following encryption algorithm modes suffers from the undesirable characteristic of errors propagating between blocks?
A. Electronic Code Book
B. Cipher Block Chaining
C. Output Feedback
D. Counter
B. One important consideration when using CBC mode is that errors propagate—if one block is corrupted during transmission, it becomes impossible to decrypt that block and the next block as well. The other modes listed here do not suffer from this flaw.
Which one of the following key distribution methods is most cumbersome when users are located in different geographic locations?
A. Diffie–Hellman
B. Public key encryption
C. Offline
D. Escrow
C. Offline key distribution requires a side channel of trusted communication, such as in person contact. This can be difficult to arrange when users are geographically separated.
Alternatively, the individuals could use the Diffie–Hellman algorithm or other asymmetric/public key encryption technique to exchange a secret key. Key escrow is a method for managing the recovery of lost keys and is not used for key distribution.
Victoria is choosing an encryption algorithm for use within her organization and would like to choose the most secure symmetric algorithm from a list of those supported by the software package she intends to use. If the package supports the following algorithms, which would be
the best option?
A. AES-256
B. 3DES
C. RC4
D. Skipjack
A. The AES-256 algorithm is a modern, secure cryptographic algorithm. 3DES, RC4, and Skipjack are all outdated algorithms that suffer from significant security issues.
The Jones Institute has six employees and uses a symmetric key encryption system to ensure
confidentiality of communications. If each employee needs to communicate privately with
every other employee, how many keys are necessary?
A. 1
B. 6
C. 15
D. 30
- C. A separate key is required for each pair of users who want to communicate privately. In a group of six users, this would require a total of 15 secret keys. You can calculate this value by using the formula (n * (n – 1) / 2). In this case, n = 6, resulting in (6 * 5) / 2 = 15 keys.
There are several components involved with steganography. Which of the following refers to a file that has hidden information in it?
A. Stego-medium
B. Concealment cipher
C. Carrier
D. Payload
C
Which of the following correctly describes the relationship
between SSL and TLS?
A. TLS is the open-community version of SSL.
B. SSL can be modified by developers to expand the protocol’s capabilities.
C. TLS is a proprietary protocol, while SSL is an open community protocol.
D. SSL is more extensible and backward compatible with TLS.
A
Which of the following incorrectly describes steganography?
A. It is a type of security through obscurity.
B. Modifying the most significant bit is the most common
method used.
C. Steganography does not draw attention to itself like
encryption does.
D. Media files are ideal for steganographic transmission becauseof their large size.
B
Which of the following correctly describes a drawback of
symmetric key systems?
A. Computationally less intensive than asymmetric systems
B. Work much more slowly than asymmetric systems
C. Carry out mathematically intensive tasks
D. Key must be delivered via secure courier
D
Which of the following occurs in a PKI environment?
A. The RA creates the certificate, and the CA signs it.
B. The CA signs the certificate.
C. The RA signs the certificate.
D. The user signs the certificate.
B
Encryption can happen at different layers of an operating
system and network stack. Where does PPTP encryption take place?
A. Data link layer
B. Within applications
C. Transport layer
D. Data link and physical layers
A
Which of the following correctly describes the difference
between public key cryptography and public key infrastructure?
A. Public key cryptography is the use of an asymmetric
algorithm, while public key infrastructure is the use of a
symmetric algorithm.
B. Public key cryptography is used to create public/private keypairs, and public key infrastructure is used to perform key exchange and agreement.
C. Public key cryptography provides authentication and
nonrepudiation, while public key infrastructure provides
confidentiality and integrity.
D. Public key cryptography is another name for asymmetric
cryptography, while public key infrastructure consists of
public key cryptographic mechanisms.
D
Which of the following best describes Key Derivation functions (KDFs)?
A. Keys are generated from a master key.
B. Session keys are generated from each other.
C. Asymmetric cryptography is used to encrypt symmetric keys.
D. A master key is generated from a session key.
A
An elliptic curve cryptosystem is an asymmetric algorithm.
What sets it apart from other asymmetric algorithms?
A. It provides digital signatures, secure key distribution, and
encryption.
B. It computes discrete logarithms in a finite field.
C. It uses a larger percentage of resources to carry out
encryption.
D. It is more efficient.
D
If implemented properly, a one-time pad is a perfect encryption scheme. Which of the following incorrectly describes a requirement for implementation?
A. The pad must be securely distributed and protected at its
destination.
B. The pad must be made up of truly random values.
C. The pad must always be the same length.
D. The pad must be used only one time.
C
Sally is responsible for key management within her
organization. Which of the following incorrectly describes a
principle of secure key management?
A. Keys should be backed up or escrowed in case of
emergencies.
B. The more a key is used, the shorter its lifetime should be.
C. Less secure data allows for a shorter key lifetime.
D. Keys should be stored and transmitted by secure means.
C
Mandy needs to calculate how many keys must be generated for the 260 employees using the company’s PKI asymmetric algorithm. How many keys are required?
A. 33,670
B. 520
C. 67,340
D. 260
B
Which of the following works similarly to stream ciphers?
A. One-time pad
B. AES
C. Block
D. RSA
A
There are two main types of symmetric ciphers: stream and
block. Which of the following is not an attribute of a good
stream cipher?
A. Statistically unbiased keystream
B. Statistically predictable
C. Long periods of no repeating patterns
D. Keystream not linearly related to key
B
Which of the following best describes how a digital signature is created?
A. The sender encrypts a message digest with his private key.
B. The sender encrypts a message digest with his public key.
C. The receiver encrypts a message digest with his private key.
D. The receiver encrypts a message digest with his public key.
A
In cryptography, different steps and algorithms provide
different types of security services. Which of the following
provides only authentication, non-repudiation, and integrity?
A. Encryption algorithm
B. Hash algorithm
C. Digital signature
D. Encryption paired with a digital signature
C
Advanced Encryption Standard is an algorithm used for which of the following?
A. Data integrity
B. Bulk data encryption
C. Key recovery
D. Distribution of symmetric keys
B
SSL is a de facto protocol used for securing transactions that occur over untrusted networks. Which of the following best describes what takes place during an SSL connection setup process?
A. The server creates a session key and encrypts it with a
public key.
B. The server creates a session key and encrypts it with a
private key.
C. The client creates a session key and encrypts it with a
private key.
D. The client creates a session key and encrypts it with a public key.
D
The CA is responsible for revoking certificates when necessary. Which of the following correctly describes a CRL and OSCP?
A. The CRL was developed as a more streamlined approach to OCSP.
B. OCSP is a protocol that submits revoked certificates to the CRL.
C. OCSP is a protocol developed specifically to check the CRL
during a certificate validation process.
D. CRL carries out real-time validation of a certificate and
reports to the OCSP.
C
End-to-end encryption is used by users, and link encryption is used by service providers. Which of the following correctly
describes these technologies?
A. Link encryption does not encrypt headers and trailers.
B. Link encryption encrypts everything but data link messaging.
C. End-to-end encryption requires headers to be decrypted at each hop.
D. End-to-end encryption encrypts all headers and trailers.
B
If Marge uses her private key to create a digital signature on a message she is sending to George, but she does not show or share her private key with George, what is it an example of?
A. Key clustering
B. Avoiding a birthday attack
C. Providing data confidentiality
D. Zero-knowledge proof
D
There are two main functions that Trusted Platform Modules(TPMs) carry out within systems today. Which of the following best describes these two functions?
A. Sealing a hard disk drive is when the decryption key that can be used to decrypt data on the drive is stored on the TPM. Binding is when data pertaining to the system’s state are hashed and stored on the TPM.
B. Binding a hard disk drive is when whole-disk encryption is
enabled through the use of the TPM. Sealing is when a
digital certificate is sealed within a TPM and the system
cannot boot up without this certificate being validated.
C. Sealing a hard disk drive is when whole-disk encryption is
enabled through the use of the TPM. Binding is when a
digital certificate is sealed within a TPM and the system
cannot boot up without this certificate being validated.
D. Binding a hard disk drive is when the decryption key that can be used to decrypt data on the drive is stored on the TPM. Sealing is when data pertaining to the system’s state are hashed and stored on the TPM
D
Which of the following is most likely the item that is the root of the problem when it comes to the necessary randomness
explained in the scenario?
A. Asymmetric algorithm
B. Out-of-band communication compromise
C. Number generator
D. Symmetric algorithm
C
Which of the following best describes the role of the values that is allowing for patterns as described in the scenario?
A. Initialization vector
B. One-time password
C. Master symmetric key
D. Subkey
A
Sometimes when studying for an industry certification exam as in the CISSP, people do not fully appreciate that the concepts and technologies that they need to learn to pass the test directly relate to real-world security issues. To enforce how exam-oriented theoretical concepts directly relate to the practical world of security, choose the correct answer that best describes the Heartbleed SSL\TLS vulnerability, which is considered to be one of the most critical attack vectors in the history of the Internet.
A. Digital certificates were stolen through a tunneled attack
within the SSL and TLS protocols.
B. Certificate authorities were compromised when their SSL and TLS connections were hijacked through the use of TCP
hijacking sessions.
C. Bounds checking was not implemented and allowed for
sensitive data to be obtained by attackers from memory
segments on web servers.
D. Cross-site scripting was allowed to take place on web servers that ran a vulnerable version of Java.
C
What is the goal of cryptanalysis?
A. To determine the strength of an algorithm
B. To increase the substitution functions in a cryptographic algorithm
C. To decrease the transposition functions in a cryptographic algorithm
D. To determine the permutations used
A. Cryptanalysis is the process of trying to reverse-engineer a cryptosystem,
with the possible goal of uncovering the key used. Once this key is uncovered,
all other messages encrypted with this key can be accessed. Cryptanalysis is
carried out by the white hats to test the strength of the algorithm.
The frequency of successful brute force attacks has increased because
A. The use of permutations and transpositions in algorithms has increased.
B. As algorithms get stronger, they get less complex, and thus more
susceptible to attacks.
C. Processor speed and power have increased.
D. Key length reduces over time.
C. A brute force attack is resource-intensive. It tries all values until the correct
one is obtained. As computers have more powerful processors added to them,
attackers can carry out more powerful brute force attacks.
Which of the following is not a property or characteristic of a one-way hash
function?
A. It converts a message of arbitrary length into a value of fixed length.
B. Given the digest value, it should be computationally infeasible to find the
corresponding message.
C. It should be impossible or rare to derive the same digest from two
different messages.
D. It converts a message of fixed length to an arbitrary length value
D. A hashing algorithm will take a string of variable length, the message can
be any size, and compute a fixed-length value. The fixed-length value is the
message digest. The MD family creates the fixed-length value of 128 bits, and
SHA creates one of 160 bits.
What would indicate that a message had been modified?
A. The public key has been altered.
B. The private key has been altered.
C. The message digest has been altered.
D. The message has been encrypted properly.
C. Hashing algorithms generate message digests to detect whether modification
has taken place. The sender and receiver independently generate their own
digests, and the receiver compares these values. If they differ, the receiver knows
the message has been altered.
Which of the following is a U.S. federal government algorithm developed for
creating secure message digests?
A. Data Encryption Algorithm
B. Digital Signature Standard
C. Secure Hash Algorithm
D. Data Signature Algorithm
C. SHA was created to generate secure message digests. Digital Signature
Standard (DSS) is the standard to create digital signatures, which dictates that
SHA must be used. DSS also outlines the digital signature algorithms that can
be used with SHA: RSA, DSA, and ECDSA.
Which of the following best describes the difference between HMAC and
CBC-MAC?
A. HMAC creates a message digest and is used for integrity; CBC-MAC is used
to encrypt blocks of data for confidentiality.
B. HMAC uses a symmetric key and a hashing algorithm; CBC-MAC uses the
first block for the checksum.
C. HMAC provides integrity and data origin authentication; CBC-MAC uses a
block cipher for the process of creating a MAC.
D. HMAC encrypts a message with a symmetric key and then puts the result
through a hashing algorithm; CBC-MAC encrypts the whole message.
C. In an HMAC operation, a message is concatenated with a symmetric key
and the result is put through a hashing algorithm. This provides integrity and
system or data authentication. CBC-MAC uses a block cipher to create a MAC,
which is the last block of ciphertext.
What is an advantage of RSA over DSA?
A. It can provide digital signature and encryption functionality.
B. It uses fewer resources and encrypts faster because it uses symmetric keys.
C. It is a block cipher rather than a stream cipher.
D. It employs a one-time encryption pad.
A. RSA can be used for data encryption, key exchange, and digital signatures.
DSA can be used only for digital signatures.
Many countries restrict the use or exportation of cryptographic systems. What
is the reason given when these types of restrictions are put into place?
A. Without standards, there would be many interoperability issues when
trying to employ different algorithms in different programs.
B. The systems can be used by some countries against their local people.
C. Criminals could use encryption to avoid detection and prosecution.
D. Laws are way behind, so adding different types of encryption would
confuse the laws more
C. The U.S. government has greatly reduced its restrictions on cryptography
exportation, but there are still some restrictions in place. Products that use
encryption cannot be sold to any country the United States has declared is
supporting terrorism. The fear is that the enemies of the country would use
encryption to hide their communication, and the government would be
unable to break this encryption and spy on their data transfers.
What is used to create a digital signature?
A. The receiver’s private key
B. The sender’s public key
C. The sender’s private key
D. The receiver’s public key
C. A digital signature is a message digest that has been encrypted with the
sender’s private key. A sender, or anyone else, should never have access to the
receiver’s private key.
Which of the following best describes a digital signature?
A. A method of transferring a handwritten signature to an electronic document
B. A method to encrypt confidential information
C. A method to provide an electronic signature and encryption
D. A method to let the receiver of the message prove the source and integrity
of a message
D. A digital signature provides authentication (knowing who really sent
the message), integrity (because a hashing algorithm is involved), and
nonrepudiation (the sender cannot deny sending the message).
How many bits make up the effective length of the DES key?
A. 56
B. 64
C. 32
D. 16
A. DES has a key size of 64 bits, but 8 bits are used for parity, so the true
key size is 56 bits. Remember that DEA is the algorithm used for the DES
standard, so DEA also has a true key size of 56 bits, because we are actually
talking about the same algorithm here. DES is really the standard, and DEA
is the algorithm. We just call it DES in the industry because it is easier.
Why would a certificate authority revoke a certificate?
A. If the user’s public key has become compromised
B. If the user changed over to using the PEM model that uses a web
of trust
C. If the user’s private key has become compromised
D. If the user moved to a new location
C. The reason a certificate is revoked is to warn others who use that person’s
public key that they should no longer trust the public key because, for some
reason, that public key is no longer bound to that particular individual’s
identity. This could be because an employee left the company, or changed his
name and needed a new certificate, but most likely it is because the person’s
private key was compromised.
What does DES stand for?
A. Data Encryption System
B. Data Encryption Standard
C. Data Encoding Standard
D. Data Encryption Signature
B. Data Encryption Standard was developed by NIST and the NSA to encrypt
sensitive but unclassified government data.
Which of the following best describes a certificate authority?
A. An organization that issues private keys and the corresponding
algorithms
B. An organization that validates encryption processes
C. An organization that verifies encryption keys
D. An organization that issues certificates
D. A registration authority (RA) accepts a person’s request for a certificate and
verifies that person’s identity. Then the RA sends this request to a certificate
authority (CA), which generates and maintains the certificate.
What does DEA stand for?
A. Data Encoding Algorithm
B. Data Encoding Application
C. Data Encryption Algorithm
D. Digital Encryption Algorithm
C. DEA is the algorithm that fulfilled the DES standard. So DEA has all of the
attributes of DES: a symmetric block cipher that uses 64-bit blocks, 16 rounds,
and a 56-bit key.
Who was involved in developing the first public key algorithm?
A. Adi Shamir
B. Ross Anderson
C. Bruce Schneier
D. Martin Hellman
D. The first released public key cryptography algorithm was developed by
Whitfield Diffie and Martin Hellman.
What process usually takes place after creating a DES session key?
A. Key signing
B. Key escrow
C. Key clustering
D. Key exchange
D. After a session key has been created, it must be exchanged securely. In most
cryptosystems, an asymmetric key (the receiver’s public key) is used to encrypt
this session key, and it is sent to the receiver.
DES performs how many rounds of permutation and substitution?
A. 16
B. 32
C. 64
D. 56
A. DES carries out 16 rounds of mathematical computation on each 64-bit
block of data it is responsible for encrypting. A round is a set of mathematical
formulas used for encryption and decryption processes.
Which of the following is a true statement pertaining to data encryption when
it is used to protect data?
A. It verifies the integrity and accuracy of the data.
B. It requires careful key management.
C. It does not require much system overhead in resources.
D. It requires keys to be escrowed.
B. Data encryption always requires careful key management. Most algorithms
are so strong today it is much easier to go after key management rather than
to launch a brute force attack. Hashing algorithms are used for data integrity,
encryption does require a good amount of resources, and keys do not have to
be escrowed for encryption
If different keys generate the same ciphertext for the same message, what is
this called?
A. Collision
B. Secure hashing
C. MAC
D. Key clustering
D. Message A was encrypted with key A and the result is ciphertext Y. If that
same message A were encrypted with key B, the result should not be ciphertext
Y. The ciphertext should be different since a different key was used. But if the
ciphertext is the same, this occurrence is referred to as key clustering.
What is the definition of an algorithm’s work factor?
A. The time it takes to encrypt and decrypt the same plaintext
B. The time it takes to break the encryption
C. The time it takes to implement 16 rounds of computation
D. The time it takes to apply substitution functions
B. The work factor of a cryptosystem is the amount of time and resources
necessary to break the cryptosystem or its encryption process. The goal is
to make the work factor so high that an attacker could not be successful in
breaking the algorithm or cryptosystem.
What is the primary purpose of using one-way hashing on user passwords?
A. It minimizes the amount of primary and secondary storage needed to
store passwords.
B. It prevents anyone from reading passwords in plaintext.
C. It avoids excessive processing required by an asymmetric algorithm.
D. It prevents replay attacks.
B. Passwords are usually run through a one-way hashing algorithm so the
actual password is not transmitted across the network or stored on a system
in plaintext. This greatly reduces the risk of an attacker being able to obtain
the actual password.
Which of the following is based on the fact that it is hard to factor large
numbers into two original prime numbers?
A. ECC
B. RSA
C. DES
D. Diffie-Hellman
B. The RSA algorithm’s security is based on the difficulty of factoring large
numbers into their original prime numbers. This is a one-way function. It is
easier to calculate the product than it is to identify the prime numbers used to
generate that product.
Which of the following describes the difference between the Data Encryption
Standard and the Rivest-Shamir-Adleman algorithm?
A. DES is symmetric, while RSA is asymmetric.
B. DES is asymmetric, while RSA is symmetric.
C. They are hashing algorithms, but RSA produces a 160-bit hashing value.
D. DES creates public and private keys, while RSA encrypts messages.
A. DES is a symmetric algorithm. RSA is an asymmetric algorithm. DES is used
to encrypt data, and RSA is used to create public/private key pairs.
Which of the following uses a symmetric key and a hashing algorithm?
A. HMAC
B. Triple-DES
C. ISAKMP-OAKLEY
D. RSA
A. When an HMAC function is used, a symmetric key is combined with the
message, and then that result is put though a hashing algorithm. The result is
an HMAC value. HMAC provides data origin authentication and data integrity.
The generation of keys that are made up of random values is referred to as Key
Derivation Functions (KDFs). What values are not commonly used in this key
generation process?
A. Hashing values
B. Asymmetric values
C. Salts
D. Password
B. Different values can be used independently or together to play the role of
random key material. The algorithm is created to use specific hash, passwords,
and\or salt values, which will go through a certain number of rounds of
mathematical functions dictated by the algorithm.
Tim is a new manager for the software development team at his company. There are different types of data that the company’s software needs to protect. Credit card PIN values are stored within their proprietary retail credit card processing software. The same software also stores documents,
which must be properly encrypted and protected. This software is used to transfer sensitive data over dedicated WAN connections between the company’s three branches. Tim also needs to ensure that every user that interacts with the software is properly authenticated before being allowed access, and once the authentication completes successfully, an SSL connection needs to be set up and maintained for each connection. Which of the following symmetric block encryption mode(s) should be enabled in this company’s software? (Choose two.)
A. Electronic Code Book (ECB)
B. Cipher Block Chaining (CBC)
C. Cipher Feedback (CFB)
D. Output Feedback (OFB)
A and B. The Electronic Code Book (ECB) mode should be used to encrypt
credit card PIN values, and the Cipher Block Chaining (CBC) mode should be
used to encrypt documents.
Tim is a new manager for the software development team at his company. There are different types of data that the company’s software needs to protect. Credit card PIN values are stored within their proprietary retail credit card processing software. The same software also stores documents, which must be properly encrypted and protected. This software is used to transfer sensitive data over dedicated WAN connections between the company’s three branches. Tim also needs to ensure that every user that interacts with the software is properly authenticated before being allowed access, and once the authentication completes successfully, an SSL connection needs to be set up and maintained for each connection.
Which of the following would be best to implement for this company’s
connections?
A. End-to-end encryption
B. Link encryption
C. Trusted Platform Modules
D. Advanced Encryption Standard
B. Since data is transmitting over dedicated WAN links, link encryptors can be
implemented to encrypt the sensitive data as it moves from branch to branch.
Tim is a new manager for the software development team at his company. There are different types of data that the company’s software needs to protect. Credit card PIN values are stored within their proprietary retail credit card processing software. The same software also stores documents, which must be properly encrypted and protected. This software is used to transfer sensitive data over dedicated WAN connections between the company’s three branches. Tim also needs to ensure that every user that interacts with the software is properly authenticated before being allowed access, and once the authentication completes successfully, an SSL connection needs to be set up and maintained for each connection. Which of the following is the best way for users to authenticate to this
company’s proprietary software?
A. Kerberos
B. RADIUS
C. Public Key Infrastructure
D. IPSec
C. The users can be authenticated by providing digital certificates to the
software within a PKI environment. This is the best authentication approach,
since SSL requires a PKI environment.
Sean is a security administrator for a financial company and has an array of security responsibilities. He needs to ensure that traffic flowing within the internal network can only travel from one authenticated system to another authenticated system. This traffic has to be visible to the company’s IDS sensors, so it cannot be encrypted. The data traffic that flows externally to and from the network must only travel to authenticated systems and must be encrypted. He needs to ensure that each employee laptop has full disk encryption capabilities and that each e-mail message that each employee sends is sent from an authenticated individual. Which of the following best describes the software settings that need to be implemented for internal and external traffic?
A. IPSec with ESP enabled for internal traffic and IPSec with AH enabled for
external traffic
B. IPSec with AH enabled for internal traffic and IPSec with ESP enabled for
external traffic
C. IPSec with AH enabled for internal traffic and IPSec with AN and ESP
enabled for external traffic
D. IPSec with AH and ESP enabled for internal traffic and IPSec with ESP
enabled for external traffic
B. IPSec can be configured using the AH protocol, which enables system
authentication but does not provide encryption capabilities. IPSec can
be configured with the ESP protocol, which provides authentication and
encryption capabilities.
Sean is a security administrator for a financial company and has an array of security responsibilities. He needs to ensure that traffic flowing within the internal network can only travel from one authenticated system to another authenticated system. This traffic has to be visible to the company’s IDS sensors, so it cannot be encrypted. The data traffic that flows externally to and from the network must only travel to authenticated systems and must be encrypted. He needs to ensure that each employee laptop has full disk encryption capabilities and that each e-mail message that each employee sends is sent from an authenticated individual. When Sean purchases laptops for his company, what does he need to ensure is provided by the laptop vendor?
A. Public key cryptography
B. Cryptography, hashing, and message authentication
C. BIOS password protection
D. Trusted Platform Module
D. Trusted Platform Module (TPM) is a microchip that is part of the
motherboard of newer systems. It provides cryptographic functionality that
allows for full disk encryption. The decryption key is wrapped and stored
within the TPM chip.
Sean is a security administrator for a financial company and has an array of security responsibilities. He needs to ensure that traffic flowing within the internal network can only travel from one authenticated system to another authenticated system. This traffic has to be visible to the company’s IDS sensors, so it cannot be encrypted. The data traffic that flows externally to and from the network must only travel to authenticated systems and must be encrypted. He needs to ensure that each employee laptop has full disk encryption capabilities and that each e-mail message that each employee sends is sent from an authenticated individual. What type of e-mail functionality is required for this type of scenario?
A. Digital signature
B. Hashing
C. Cryptography
D. Message authentication code
A. A digital signature is a hash value that has been encrypted with the sender’s
private key. A message can be digitally signed, which provides authentication,
nonrepudiation, and integrity. When e-mail clients have this type of
functionality, each sender is authenticated through digital certificates
For security protection mechanisms for cryptographic data in
storage, backup, and archives, the storage of keying material is a
part of which of the following cryptographic services?
a. Confidentiality
b. Availability
c. Integrity
d. Labels
b. The availability service for data in storage deals with backup and
archive storages. During a key’s crypto-period, keying material (i.e.,
keys and initialization vectors) should be stored in both normal
operational storage and in backup storage. After the end of a key’s
crypto-period, keying material should be placed in archive storage. The
other three choices do not deal with backup and archive storages.
Which of the following is referred to when two cryptographic
key component holders manage the process of handling the two
components of a cryptographic key?
a. Key list
b. Key escrow
c. Key loader
d. Key exchange
b. In general, escrow is something (for example, a document or an
encryption key) that is delivered to a third party to be given to the
grantee only upon the fulfillment of a predefined condition (i.e., a
grantor and grantee relationship with a third party in the middle). Key
escrow is the processes of managing (for example, generating, storing,
transferring, and auditing) the two components of a cryptographic key
by two component holders. A key component is the two values from
which a key can be derived. A key escrow system entrusts the two
components comprising a cryptographic key (for example, a device
unique key) to two key component holders (also called escrow agents).
The other three choices are incorrect. Key list is a printed series of key
settings for a specific cryptonet. Key lists may be produced in list, pad,
or printed tape format. Key loader is a self-contained unit that is
capable of storing at least one plaintext or encrypted cryptographic key
or key component that can be transferred, upon request, into a
cryptographic module. Key exchange is the process of exchanging
public keys and other information in order to establish secure
communications.
Transaction privacy controls do not include which of the following?
a. Secure sockets layer (SSL)
b. Mandatory access controls (MAC)
c. Transmission layer security (TLS)
d. Secure shell (SSH)
b. Transaction privacy controls include secure sockets layer (SSL),
transport layer security (TLS), and secure shell (SSH) to protect
against loss of privacy for transactions performed by an individual.
Mandatory access controls (MAC) define access control security
policy.
A cryptographic key has been compromised due to usage and age. The next step is to use which of the following?
a. DNSSEC-aware resolver
b. Key rollover
c. Zone signing key
d. Key signing key
b. Key rollover is the process of generating and using a new key
(symmetric or asymmetric key pair) to replace one already in use.
Rollover is done because a key has been compromised as a result of
usage and age. The DNSSEC-aware resolver is incorrect because it is an entity that
sends DNS queries, receives DNS responses, and understands the
DNSSEC specification, even if it is incapable of performing validation.
A zone-signing key is incorrect because it is an authentication key that
corresponds to a private key used to sign a zone. A key signing key is
incorrect because it is an authentication key that corresponds to a
private key used to sign one or more other authentication keys for a
given zone.
Which of the following protocols is used to encrypt individual
messages?
a. Secure sockets layer (SSL)
b. Transport layer security (TLS)
c. Secure hypertext transfer protocol (S-HTTP)
d. Hypertext transfer protocol (HTTP)
c. Secure hypertext transfer protocol (S-HTTP) is used for
encrypting data flowing over the Internet, but it is limited to individual
messages. Secure sockets layer (SSL) and transport layer security
(TLS) are designed to establish a secure connection between two
computers. Hypertext transfer protocol (HTTP) cannot do encryption
and is not as secure as S-HTTP.
For cryptography, which of the following refers to the worst case measure of uncertainty for a random variable with the greatest lower bound?
a. Max-entropy
b. Min-entropy
c. Guessing entropy
d. Min-Max entropy
B. Entropy is the uncertainty of a random variable, which is stated in
bits. Min-entropy is the worst-case measure of uncertainty for a
random variable with the greatest lower bound. Min-entropy is a
measure of the difficulty that an attacker has to guess the most
commonly chosen password used in a system. Guessing entropy is a
measure of the difficulty that an attacker has to guess the value of a
secret (e.g., a password). Guessing entropy refers to an attacker that
knows the actual password frequency distribution. Max-entropy and
min-max entropy are not usually used in the context of entropy.
Countermeasures against brute force attacks on cryptographic keys include which of the following?
- Change keys
- Increase key length
- Change protocol
- Change algorithm
a. 1 and 2
b. 2 and 3
c. 3 and 4
d. 1 and 3
A. Changing cryptographic keys frequently and increasing the key
length can fight against the brute force attacks on keys. Changing
protocols and algorithms cannot fight against the brute force attacks
because the changed protocols and algorithms could be subjected to
the same attacks or different attacks.
For cryptography, what is nonce?
a. Timestamp plus sequence number
b. Checksum plus check digit
c. Payload plus protocol
d. Public key plus private key
A. Nonce is a time-varying and nonrepeating cryptographic value
with the use of a timestamp, a sequence number, or combination,
which are freshly generated random values. Checksums and check
digits are used to ensure data accuracy during data entry and data
transmission. Payload is a part of the data stream representing the user
information in a communication. Protocol is a set of rules used by two
or more entities that describe the message order and data structures for
information exchange between the entities. A public key is a
cryptographic key, used with a public key cryptographic algorithm,
that is uniquely associated with an entity and that may be made public.
A private key is a cryptographic key, used with a public key
cryptographic algorithm that is uniquely associated with an entity and
that is not made public.
For cryptography, which of the following protects the integrity of the data but does not guarantee authenticity of the information?
a. X.509 public key certificate
b. Public key certificate
c. Private key certificate
d. Self-signed certificate
D. A self-signed certificate is a public key certificate whose digital
signature may be verified by the public key contained within the
certificate. The signature on a self-signed certificate protects the
integrity of the data but does not guarantee authenticity of the
information. The trust of a self-signed certificate is based on the secure
procedures used to distribute it.
The X.509 certificate comes in two types: X.509 public key certificate
(most common) and the X.509 attribute certificate (less common). A
public key certificate is a set of data that uniquely identifies an entity
and binds the public key to the entity. The private key is
mathematically linked with a corresponding public key.
Which of the following is an example of optional-to-implement cryptographic algorithms that provide greater security?
a. DES
b. RSA-512 bit key
c. AES-128 bit key
d. RC2
C. The AES-128 bit key is an example of optional-to-implement
encryption algorithm that provides a greater security. Other variants of
AES include AES-192 bit keys and AES-256 bit keys. The DES
algorithm, RC2, and the RSA-512 bit key do not provide adequate
security. The DES and RC2 are examples of mandatory-to-implement
encryption algorithms that do not provide adequate security.
Mandatory-to-implement algorithms will be in any product that meets
the public standards, enabling interoperability between products.
Optional-to-implement algorithms are next-generation algorithms with
improved security that could increase the longevity of a system.
Which of the following enables one to locate organizations, individuals, files, and devices in a network whether on the Internet or on a corporate intranet?
a. Online certificate status protocol (OCSP)
b. Certificate management protocol (CMP)
c. Lightweight directory access protocol (LDAP)
d. Over-the-air rekeying protocol (OTAR)
C. A lightweight directory access protocol (LDAP) is a centralized
directory that becomes a major focal point as a tool for access control.
It uses names, addresses, groups, roles, devices, files, and profiles to
enable a modular, expandable access control and single sign-on
solution to be deployed rapidly for all application systems.
The other three choices do not have such capabilities as the LDAP
does. An online certificate status protocol (OCSP) responder is a
trusted system and provides signed status information, on a per
certificate basis, in response to a request from a relying party. Both
certification authority (CA) and registration authority (RA) software
support the use of a certificate management protocol (CMP). An overthe-air rekeying (OTAR) protocol is used in digital radios to handle
cryptographic security. LDAP, CRLs, and OCSP are used to provide a
path validation in a public-key certificate.
Most commonly, what are certificate revocation lists (CRLs) distributed through?
1. Certificate management protocol
2. LDAP directories protocol
3. Web servers
4. HTTP URLs
a. 1 or 2
b. 2 or 3
c. 1 or 3
d. 3 or 4
B. Most commonly, the certificate revocation lists (CRLs) are
distributed via lightweight directory access protocol (LDAP)
directories or Web servers. The certificate management protocol
(CMP) and HTTP uniform resource locators (HTTP URLs) are not
used to distribute CRLs. Both the LDAP and HTTP URLs are used to
specify the location of CRLs. Both certification authority (CA) and
registration authority (RA) software support the use of a certificate
management protocol (CMP). An LDAP is a centralized directory that
becomes a major focal point as a tool for access control.
Which of the following is generally the most difficult method of attacking a computer system?
a. Password cracking
b. Packet sniffing
c. Encryption key breaking
d. Send mail
C. Encryption key breaking is not a common method because it is
difficult to do and may take years to do. It requires an extensive
knowledge of algorithms, hardware, and software that is not possessed
by too many people. Password cracking involves guessing a password,
which can then be used to gain access to a system. Packet sniffing
involves placing a rogue program in a host computer or in a network
switch. The program will then monitor all information packets as they
go through the network. A malicious code can be sent along with
Internet-based e-mail. When the message is received, the attacker’s
code will be executed.
Which of the following does not need to be destroyed after the corresponding certificate expires?
a. Old key pairs
b. Private key establishment key
c. Private signature keys
d. Public keys
B. The user should not destroy the private key establishment key
until all symmetric keys established using this key have been
recovered or protected by encryption under a different key. Premature
destruction of private key establishment keys may prevent recovery of
the subscriber’s plaintext data. The keys in the other three choices can
be destroyed safely.
Which of the following provides end-to-end security to protect information on the Internet?
a. DES and RC2
b. TLS and SSL
c. HTTP and HTTPS
d. TDEA and AES
B. The transport layer security (TLS) and secure socket layer (SSL)
protocols are the primary end-to-end security protocols used to protect
information on the Internet. TLS is an enhanced version of SSL; these
protocols are similar but not identical. TLS is a robust protocol that is
used to protect various links, such as authentication server to a wireless
access point, the electronic mail link between client and server, or
dedicated network infrastructure applications primarily involving
machines with no human user involvement.
- Which of the following are examples of mandatory-to implement cryptographic algorithms that do not provide adequate security over computer networks?
a. AES or 3-TDEA
b. RSA or ECDSA
c. DES or RC2
d. DH or ECDH
C. Mandatory-to-implement cryptographic algorithms will be in
any cryptographic product that meets the public standards (for
example, IETF’s RFCs and ANSI) enabling interoperability between
products. AES is an optional-to-implement algorithm now that could
become mandatory-to-implement in the future. DES and RC2 are
mandatory and do not provide adequate security. DH is the Diffie Hellman algorithm, which is used to provide key agreement. ECDH is the elliptic curve Diffie-Hellman algorithm, which is used to support key establishment; 3-TDEA is three key TDEA; RSA is a public-key algorithm, whereas ECDSA is a digital signature algorithm.
Which of the following should not be used during a transport layer security (TLS) session between a client and a server?
a. DH key agreement
b. RSA key transport
c. Ephemeral DH key
d. Static-to-static DH key agreement
D. A transport layer security (TLS) session requires server
authentication and requests certificates from the client and the server.
The RSA key transport method implicitly authenticates the server to
the client. In a Diffie-Hellman (DH) key agreement, the server
authenticates itself by supplying a signed static DH key in a certificate
or by signing an ephemeral key and sending a certificate with its public
signing key. Thus, the server will always send a certificate, with either
a signing key or a key-establishment key. In a static-to-static DH key
agreement, client certificates will not contain a signing key thus are not
recommended to use in a TLS session. This is because the server may
request a certificate from the client.
What is encrypting a symmetric key using another symmetric key called?
a. Key transport
b. Key update
c. Key wrapping
d. Key bundle
C. A key used for key wrapping is known as a key encrypting key,
which is used to encrypt a symmetric key using another symmetric
key. Key wrapping provides both confidentiality and integrity
protection using a symmetric key.
The other three choices are not used in key wrapping. Key transport is
a key establishment procedure whereby one party (sender) selects and
encrypts the keying material and then distributes the material to
another party (the receiver). Key update is a function performed on a
cryptographic key to compute a new but related key. Key bundle is a
set of keys used during one operation, typically a TDEA operation.
Which of the following represents the correct order of nodes (from highest to lowest) in a cryptographic key management infrastructure?
1. Client node
2. User entities
3. Key processing facility
4. Service agent
a. 4, 2, 3, and 1
b. 3, 4, 1, and 2
c. 3, 4, 2, and 1
d. 2, 4, 1, and 3
B. A key management infrastructure provides a unified and
seamless structure for the generation, distribution, and management of
cryptographic keys. It starts at the central oversight authority (the
highest node, which is not used in the question) and moves down to
key processing facility (the next highest node), service agent, client
node, and user entities (the lowest node).
In a cryptographic key management infrastructure, which of
the following supports single point-of-access for other nodes?
a. Key processing facility
b. User entities
c. Client nodes
d. Service agents
D. Service agents support an organization’s key management
infrastructure as single point-of-access for other nodes, including key
processing facility, client nodes, and user entities.
A digital signature is implemented using which of the following
cryptographic techniques?
a. Public key cryptography
b. Key escrow cryptography
c. Secret key cryptography
d. Hybrid cryptographic systems
A. Recent advances in cryptographic technology have lead to the
development of public key cryptographic algorithms. These algorithms
are referred to as “asymmetric” because they rely on two different keys
to perform cryptographic processing of data. These keys are generated
and used in pairs consisting of private and public key components.
Public key crypto-systems make possible authentication schemes in
which a secret can be verified without the need to share that secret. In
public key cryptography, each user independently generates two
mathematically related keys. One is typically made public, so it is
referred to as the public key. The other is kept private, so it is referred
to as the user’s private key. The public key becomes in effect part of
the user’s identity and should be made well known as necessary, like a
phone number. Conversely, the private key should be known only to
the user because it can be used to prove ownership of the public key
and thus the user’s identity. It is computationally infeasible to derive a
user’s private key from the corresponding public key, so free
distribution of the public key poses no threat to the secrecy of the
private key.
The private key component of the public key cryptography is used to
create the digital signatures. Similar to a written signature, a digital
signature is unique to the signer except that it can be verified
electronically. This is made possible by the fact that in public key
crypto-systems, digital signatures are generated with the private key
component of the public/private key pair. The corresponding public
key is used to verify the signature. Because a given user’s private key
does not need to be shared with other parties, there is a strong
association between the user’s identity and possession of the private
key.
Key escrow cryptographic techniques are used in electronic
surveillance of telecommunications by law enforcement officials. A
definition of a key escrow system is that an encryption key or a
document is delivered to a third person to be given to the grantee only
upon the fulfillment of a condition. A key escrow system is one that
entrusts the two components comprising a cryptographic key (for
example, a device unique key) to two key component holders (also
called “escrow agents”).
The key component holders provide the components of a key to a
“grantee” (for example, a law enforcement official) only upon
fulfillment of the condition that the grantee has properly demonstrated
legal authorization to conduct electronic surveillance of
telecommunications encrypted using the specific device whose device
unique key is being requested. The key components obtained through
this process are then used by the grantee to reconstruct the device
unique key and obtain the session key that is then used to decrypt the
telecommunications that are encrypted with that session key. The
digital signature does not use the key escrow cryptography.
The primary feature distinguishing secret key algorithms is the use of a
single secret key for cryptographic processing. The use of advanced
encryption standard (AES) is an example of secret key cryptography.
The AES algorithm can be implemented with reasonable efficiency in
the firmware of a smart token. Electronic signatures can use either
secret key or public key cryptography. The digital signature is not
using the secret key cryptography due to sharing of a secret key by two
parties. Hybrid approaches are possible, where public key
cryptography is used to distribute keys for use by secret key
algorithms. However, the digital signature is not using the hybrid
approaches.
Procedural security controls for recognizing trusted certificate
authority (CA) and registration authority (RA) roles should include:
1. Least privilege concept must be practiced.
2. Separation of duties concept must be practiced.
3. A single person should not generate a new CA key pair.
4. A person authorizing certificates to a subject should not be
verifying the subject’s identity.
a. 1 and 2
b. 1 and 4
c. 3 and 4
d. 1, 2, 3, and 4
D. All four items are examples of procedural security controls for
recognizing trusted CA and RA roles. The CA is a trusted third party
that generates, issues, signs, and revokes public key certificates. The
CA can delegate responsibility for the verification of the subject’s
identity to an RA. The RA is a trusted entity that establishes and
vouches for the identity of a subscriber to a credentials service
provider (CSP).
- Effective controls to detect attempts to replay an earlier
successful authentication exchange do not include:
a. A timestamp
b. A sequence number
c. An unpredictable value
d. A statistical random value
D. The emphasis should be to use nonrepeating values in message
authentication to ensure that an attempt to replay an earlier successful
authentication exchange will be detected. Timestamps, sequence
numbers, and unpredictable values can detect replay attempts.
Timestamps assume there is a common reference that logically links a
claimant and verifier. On receipt of an authentication message, the
verifier calculates the difference between the timestamp in the message
and the time of receipt. If this difference is within the expected time
window, the message is accepted.
A message with a particular sequence number is accepted only once as
agreed by the claimant and verifier in advance. Messages received by a
verifier are checked for acceptability within the range of agreed-upon
values. An unpredictable value, or challenge, is sent by the verifier,
and he will ensure that the same challenge is not reused within the time
frame of concern. The values used do not require true statistical
randomness. The only requirement is that the values should be
unpredictable with a high probability of nonrepeating.
The problem with the statistical random value is that it deals with
probabilities of occurrence and sampling methods, which will not meet
the requirements of the other three choices.
Which of the following need not be subject to maintenance of special accounting records for cryptographic keying materials?
a. Ephemeral keys
b. Encrypted keys
c. Decrypted keys
d. Key encrypting keys
A. Ephemeral keys are cryptographic keys that are generated for
each execution of a key establishment process and that meet other
requirements of the key (for example, unique to each message or
session and short-lived). It may not be practical or necessary to
maintain accounting records for relatively short-lived keys such as
ephemeral keys. This is because user devices (for example, user
entities at client nodes) generate ephemeral keys, and they are intended
for use within the client node.
The other three choices need accounting records. Encrypted keys are
encrypted with a key encrypting key to disguise the value of the
underlying plaintext key. The key encrypting key is used for the
encryption or decryption of other keys.
For the willful or negligent mishandling of cryptographic
keying materials, the consequences of policy violation should be
commensurate with which of the following?
a. Actual harm
b. Known harm
c. Potential harm
d. Guaranteed harm
C. The consequences of willful or negligent mishandling of
cryptographic keying materials (for example, keys and initialization
vectors) should be commensurate with the potential harm that the
policy violation can result in for the organization and other affected
parties. The actual harm cannot be known in advance, and there is no
guarantee that harm will occur for certain.
A cryptographic keying material is compromised during the course of regular or normal work. Which of the following actions may not be necessary during the compromise recovery process?
a. Key destruction
b. Notification of users of compromised keys
c. Emergency key revocation
d. Replacement of the compromised keys
A. Notification of users of compromised keys, emergency key
revocation, and secure replacement of the compromised keys are a part
of normal recovery procedures. Key destruction must take place only
when an external attacker is involved, not when user errors and system
problems are involved during the course of regular work. The other
three choices are normally used during the compromise recovery
process.
For the encapsulating security protocol (ESP) header of the Internet Protocol security (IPsec), which of the following cryptographic algorithms or modes provides both encryption and integrity services to the ESP-protected traffic?
a. AES-128 bit in cipher block chaining (CBC) mode
b. AES-128 bit in counter mode
c. HMAC SHA1-96 bit
d. AES-128 bit in counter mode with CBC-MAC
D. The AES-128 bit key in counter mode with CBC-MAC provides
both encryption and integrity protection. The AES-128 bit in CBC
mode and the AES-128 bit in counter mode provide only encryption
whereas the HMAC SHA1-96 bit provides only integrity protection.
The encrypted ESP should not be used without integrity protection
because the ESP needs both encryption and integrity protection.
Within the Internet Protocol security (IPsec) protocol suite, which of the following should not be used because it introduces unnecessary complexity in processing?
a. Authentication header (AH)
b. Encapsulating security protocol (ESP)
c. Security association (SA)
d. Internet key exchange (IKE)
A. The authentication header (AH) protects the Internet Protocol
(IP) header and the data following the IP header. However, the AH
processing introduces unnecessary complexity. Because the
encapsulating security protocol (ESP) can provide equivalent
functionality as the AH, the use of AH is not recommended due to its
complexity in processing. Moreover, the ESP protects the source and
destination addresses in the IP header in both transport and tunnel
modes. Hence, the ESP is better than the AH.
The security of which of the following cryptographic algorithm’s confidentiality mechanism is not compromised?
a. AES-GCM (Galois counter mode)
b. AES-GMAC (Galois message authentication code)
c. The Internet key exchange (IKE)
d. Data encryption standard-cipher block chaining (DES-CBC)
mode
C. The counter value in the AES-GCM or AES-GMAC is used for
more than one packet with the same key. Therefore, the security of
these algorithms’ confidentiality mechanism is compromised. The
DES-CBC mode is susceptible to compromise. Also, the AES-GCM
and AES-GMAC should not be used with manually distributed keys.
Automated keying using the Internet key exchange (IKE) establishes
secret keys for the two peers within each security association (SA)
with low probability of duplicate keys.
The transport layer security (TLS) protocol does not provide which of the following cryptographic services?
a. Authentication
b. Integrity
c. Nonrepudiation
d. Encryption
C. After completion of the handshake sequence, the transport layer
security (TLS) protocol provides a secure communication channel
between the server and client for the duration of a communication
session. All cipher suites provide authentication and integrity
protection for transferred data, and most TLS cipher suites also provide
encryption. If encryption is provided, data is encrypted when sent and
decrypted when received. TLS does not, however, provide a
cryptographic nonrepudiation service to allow a validation of the
session data or authentication after the communication session has
been ended by a third party.
In secure/multipurpose Internet mail extension (S/MIME), TDEA in CBC mode or AES-128 bit in CBC mode is used to provide which of the following?
a. Digital signatures
b. Hash values
c. Key transport
d. Encryption
D. The secure/multipurpose Internet mail extension (S/MIME)
provides a consistent way to send and receive secure Internet mail.
However, S/MIME is not restricted to e-mail; it can be used with any
transport mechanism that employs MIME protocols, such as HTTP.
The TDEA in CBC mode or AES-128-bit key in CBC mode is used to
provide encryption only.
Using the security features within a secure/multipurpose Internet mail extension (S/MIME) implementation, end users should not do which of the following?
a. Operate their systems according to instructions.
b. Use unique digital certificates for each security function.
c. Protect their private key from unauthorized disclosure.
d. Send the same message both encrypted and in plaintext.
D. An end user is the individual using a client to access the system.
Even within a centrally managed environment, end users may find that
they have a significant amount of control over some of the security
features within an S/MIME implementation. End users should not send
the same message both encrypted and in plaintext. The end users can
do the other three choices.
The RSA-1024-bit key or the DSA-1024 bit key is used to provide which of the following?
a. Digital signatures
b. Hash values
c. Key agreement
d. Encryption
A. Either the Rivest, Shamir, and Adelman (RSA) or digital
signature algorithm (DSA) with key sizes greater than or equal to 1024
bits is used to provide digital signatures. They are not used for hash
values and key agreement, although less than 1024-bit keys are used
for encryption.
The Diffie-Hellman (DH) algorithm is used to provide which of the following?
a. Digital signatures
b. Hash values
c. Key agreement
d. Encryption
C. The Diffie-Hellman (DH) algorithm is used to provide key
agreement. The DH algorithm cannot provide digital signatures, hash
values, and encryption.
The owner of a cryptographic key pair demonstrates proof-of possession by using:
a. Private key
b. Public key
c. Ephemeral key
d. Encrypted key
A. The proof-of-possession is a verification process whereby it is
proven that the owner of a key pair actually has the private key
associated with the public key. The owner demonstrates the possession
by using the private key in its intended manner. Without the assurance
of possession, it would be possible for the certificate authority to bind
the public key to the wrong entity. The other three choices do not
demonstrate proof-of-possession.
Which of the following can be specified in bits?
1. Security strength of a cryptographic algorithm
2. Entropy
3. Hash function
4. Internet Protocol (IP) address identifier
a. 1 and 4
b. 2 and 3
c. 1, 3, and 4
d. 1, 2, 3, and 4
D. The security strength of a cryptographic algorithm as well as
entropy, hash function, and the Internet Protocol (IP) address identifier
are specified in bits.
Which of the following is often distributed as a self-signed certificate?
a. Trust anchors
b. Root certificate store
c. Trust list
d. Trust keys
A. Certificate authorities (CAs) generally issue a self-signed
certificate (called root certificate), which is also called a trust anchor.
CAs that a relying party trusts directly are called trust anchors. When
multiple trust anchors are recognized, the set of trust anchors is
referred to as the trust list. CA certificates play a key role in many
protocols and applications and are generally kept in what is often
called a root certificate store. Trust keys are used in trust anchors. Root
certificate store is used in validating certificate path.
Which of the following does not require cryptographic keys?
a. Symmetric key algorithms
b. Asymmetric key algorithms
c. Cryptographic hash algorithms
d. Secret key algorithms
C. Cryptographic hash algorithms (hash functions) do not require
keys. The hash functions generate a relatively small digest (hash value)
from a large input that is difficult to reverse. However, in some
instances such as in the generation of hashed message authentication
codes (HMAC), keyed hash functions are used.
Symmetric key algorithms (known as secret/private) transform data
that is difficult to undo without knowledge of a secret key. Asymmetric
key algorithms (known as public) use two related keys to perform their
functions (i.e., a public key and a private key forming a key pair).
Which of the following is a noncryptographic technique that provides message integrity and creates insecurity?
a. Message authentication code
b. Error detection codes
c. Cryptographic checksum
d. Block cipher algorithms
B. Although message integrity is often provided using
noncryptographic techniques known as error detection codes, these
codes can be altered by an attacker for his benefit and hence create
insecurity. Use of message authentication code (MAC) can alleviate
this problem as it is based on block cipher algorithm. The
cryptographic checksum is an algorithm that uses the bits in the
transmission to create a checksum value and hence is secure. A
noncryptographic technique does not use a cryptographic key.
Key wrapping provides which of the following services to the wrapped material?
a. Confidentiality and integrity
b. Authentication and integrity
c. Accountability and availability
d. Assurance and reliability
A. Key wrapping is the encryption of a key by a key encrypting key
using a symmetric algorithm. Key wrapping provides both
confidentiality and integrity services to the wrapped material and does
not provide services listed in the other three choices
Countermeasures against man-in-the-middle attacks include which of the following?
1. Implement digital signatures
2. Use split knowledge procedures
3. Use faster hardware
4. Use packet filters
a. 1 and 2
b. 2 and 3
c. 3 and 4
d. 1 and 4
A. The man-in-the-middle (MitM) attack takes advantage of the
store-and-forward mechanism used by insecure networks such as the
Internet. Digital signatures and split knowledge procedures are
effective against such attacks. Faster hardware and packet filters are
effective against denial-of-service (DoS) attacks.
Digital signatures cannot provide which of the following security services?
a. Confidentiality
b. Authentication
c. Integrity
d. Nonrepudiation
A. Digital signatures cannot by themselves provide confidentiality
service; instead, they provide authentication, integrity, and non repudiation services. Specific algorithms used for digital signatures
include DSA, RSA, PKCS, and ECDSA.
The transport layer security (TLS) protocol does not provide which of the following?
a. Integrity
b. Error recovery
c. Authentication
d. Encrypted payload
B. The transport layer security (TLS) protocol is protected by
strong cryptographic integrity, an authentication mechanism, and
encrypted payload. The TLS can detect any attack or noise event but
cannot recover from errors. If an error is detected, the protocol run is
simply terminated. Hence, the TLS needs to work with the TCP
(transport control protocol) to recover from errors.
Which of the following statements is true about digital signatures using the digital signature algorithm?
a. The length of the digital signature is one-time the length of the
key size.
b. The length of the digital signature is two-times the length of the
key size.
c. The length of the digital signature is three-times the length of the
key size.
d. The length of the digital signature is four-times the length of the
key size.
B. The digital signature algorithm (DSA) produces digital
signatures of 320, 448, or 512 bits using the key size of 160, 224, or
256 respectively. Hence, the length of the digital signature is two-times
the length of the key size.
Cryptographic key establishment schemes use which of the following?
a. Key transport and key agreement
b. Key wrapping and key confirmation
c. Key usage and key distribution
d. Key splits and key bundles
A. Cryptographic key establishment schemes are used to set up
keys to be used between communicating entities. The scheme uses key
transport and key agreement. The key transport is the distribution of a
key from one entity to another entity. The key agreement is the
participation by both entities in the creation of shared keying material
(for example, keys and initialization vectors). The key establishment
scheme does not deal with the other three choices.
Network communication channels contain unintentional errors
due to transmission media and create network congestion, leading
to lost packets. Which of the following statements is incorrect
about forward error-correcting codes?
a. Forward error-correcting codes are a subset of non cryptographic checksums.
b. Forward error-correction mechanism should be applied before
encryption.
c. Forward error-correcting codes can correct a limited number of
errors without retransmission.
d. Forward error-correction mechanism should be applied after
encryption.
B. Forward error-correcting codes are a subset of noncryptographic
checksums (i.e., they use an algorithm without secret information in
terms of a cryptographic key) that can be used to correct a limited
number of errors without retransmission. If forward error-correction is
applied before encryption and errors are inserted in the ciphertext
during transmission, it is difficult to decrypt, thus making the errors
uncorrectable. Therefore, it is preferable to apply the forward errorcorrection mechanism after the encryption process. This will allow the
error correction by the receiving entity’s system before the ciphertext
is decrypted, resulting in correct plaintext.
Which of the following should not exist outside the cryptographic boundary of the crypto-module?
a. Shared secrets and intermediate results
b. Domain parameters and initialization vectors
c. Random number generator seeds and nonce
d. Nonce and salt
A. Shared secrets are generated during a key establishment process.
Intermediate results of cryptographic operations are generated using
secret information. Therefore, both shared secrets and intermediate
results should not exist outside the cryptographic boundary of the
crypto-module due to their sensitivity and criticality. The other three
choices either do not exist outside the cryptographic boundary or they
are less sensitive and critical.
What describes the crypto-period of a symmetric key?
a. Originator usage period plus retention period
b. Retention period minus recipient usage period
c. Originator usage period plus recipient usage period
d. Recipient usage period minus originator usage period
C. The crypto-period of a symmetric key is the period of time from
the beginning of the originator usage period to the end of the recipient
usage period.
Which of the following should be destroyed immediately after
use?
a. Random number generator seeds and intermediate results
b. Nonce and shared secrets
c. Domain parameters and initialization vectors
d. Shared secrets and intermediate results
A. Both random number generator (RNG) seeds and intermediate
results should be destroyed after use due to their sensitivity. Domain
parameters remain in effect until changed. Shared secrets and
initialization vectors should be destroyed as soon as they are no longer
needed. A nonce should not be retained longer than needed for
cryptographic processing.
Which of the following provides the weakest cryptographic
algorithms?
1. A 160-bit ECDSA key is used to establish a 128-bit AES key.
2. A 256-bit ECDSA key is used to establish a 128-bit AES key.
3. A 256-bit SHA key is used with a 1024-bit RSA key.
4. A 256-bit SHA key is used with a 2048-bit RSA key.
a. 1 only
b. 1 and 3
c. 2 and 3
d. 2 and 4
B. The strength of cryptographic protection is determined by the
weakest algorithm and the key size used. This is explained as follows:
A 160-bit ECDSA and 128-bit AES provide 80 bits of security.
A 256-bit ECDSA and 128-bit AES provide 128 bits of security.
A 256-bit SHA and 1024-bit RSA provide 80 bits of security.
A 256-bit SHA and 2048-bit RSA provide 112 bits of security.
Therefore, 80 bits of security is weaker than 112 bits and 128 bits of
security.
How is a cryptographic algorithm’s security life defined?
a. Security life of data plus retention data life
b. Originator usage period plus the security life of the data
c. Recipient usage period plus the retention period
d. Crypto-period plus security life of the data
B. A cryptographic algorithm’s originator usage period is the period
of time that a cryptographic algorithm and the key size are used to
apply cryptographic protection. When the security life of the data is
taken into account, cryptographic protection should not be applied to
data using a given algorithm and key size if the security life of the data
extends beyond the end of the algorithm security lifetime. Hence, the
algorithm security life is the algorithm originator usage period plus the
security life of the data.
Which of the following should not be distributed?
a. Shared secrets
b. Domain parameters
c. Initialization vectors
d. Random number generator seeds
A. A shared secret is a secret value that has been computed using a
key agreement scheme and is used as input to a key derivation
function. Hence, shared secrets should not be distributed while the
other three choices can be safely distributed most of the time. Because
the initialization vectors are often stored with the data that they protect,
a determined attacker (not a normal attacker) could take advantage of
them for hacking.
Which of the following need not be backed up?
a. Private key transport key
b. Public key transport key
c. Public authentication
d. Private signature key
D. The private signature key need not be backed up because
nonrepudiation would be in question. This is because proof-of-origin
and proof-of-delivery are needed for a successful nonrepudiation using
private signature key by the originator (i.e., the signatory). Therefore,
the private signature key should be protected in a safe and secure
location. The other three choices can be backed up without any
question.
What is the major advantage of a checksum program?
a. Adds more bytes to programs
b. Verifies integrity of files
c. Increases boot-up time
d. Misleads a program recompilation
B. A checksum is a program that forms a cryptographic checksum
of files in a computer system to allow their integrity to be checked at
will. However, the checksum program adds overhead to the system in
terms of adding more bytes to each program and increases boot-up
time by several minutes. Any attempt to recompile a program will be
flagged as a “virus type” activity (when it is not) and will be stopped.
It misleads a program recompilation process.
Which of the following need not be archived?
a. Private signature key
b. Symmetric authentication key
c. Public authentication key
d. Symmetric master key
A. An archive for keying material (i.e., keys and initialization
vectors) should provide both integrity and access control. When
archived, keying material should be archived prior to the end of the
crypto-period of the key. When no longer required, the keying material
should be destroyed. Private signature key need not be archived
because it is private but should be protected in a safe and secure
location.Both symmetric and public authentication keys should be archived
until no longer required to authenticate the data. A symmetric master
key should be archived until no longer needed to derive other keys.
What is a simpler alternative to a digital signature?
a. Hash function
b. Digital certificate
c. Handwritten signature
d. Certificate authority
A. A digital signature provides for nonrepudiation of origin. A
simpler alternative to a digital signature is a hash function, where the
message is indexed to a digest for integrity checking. It requires that
both parties trust one another. However, it is of limited use because it
does not provide for repudiation of origin.
A digital certificate contains identification information about its holder.
It includes a public key and a unique private key. Exchanging keys and
certificates allows two parties to verify each other’s identities before
communicating. A handwritten signature is similar to a digital
signature in that it places a unique mark on a document that verifies the
identity of the sender. A major problem with the handwritten signature
is that it can be forged. A certificate authority is a third party that
distributes public and private key pairs.
Which of the following need to be archived?
a. Domain parameters
b. Shared secrets
c. Random number generator seeds
d. Intermediate results
A. Domain parameters should be archived until all keying material,
signatures, and signed data using the domain parameters are removed
from the archive. The other three choices should not be archived due to
their secrecy and because they are temporary in nature. One exception
is that a shared secret is sometimes permanent as in a preshared key
(PSK) for a site-to-site IPsec VPN.
If cryptographic key materials are compromised, the compromise recovery process can be relatively simple and inexpensive for which of the following?
a. Symmetric keys used by a single user
b. A certification authority’s private key
c. A key used to protect a large number of stored keys
d. Keys used by many users of large distributed databases
A. Where symmetric keys or private asymmetric keys are used to
protect only a single user’s local information in communications
between a single pair of users, the compromise recovery process can
be relatively simple and inexpensive. The damage assessment and
mitigation measures are often local matters. On the other hand, damage
assessment can be complex and expensive where (i) a key is shared by
or affects a large number of users, (ii) certification authority’s (CA’s)
private key is replaced, (iii) transport keys are widely used, (iv) keys
are used by many users of large distributed databases, and (v) a key is
used to protect a large number of stored keys.
The strength of all cryptographically based mechanisms lies in large part in which of the following?
a. The strength of the cryptographic algorithm
b. The protection provided to secret key material
c. The strength of the key size
d. The security of communication protocol
B. For all cryptographically based mechanisms, the strength of the
mechanism lies partly in the strength of the cryptographic algorithm
(including key size), partly in the security of any communication
protocol, and in large part, in the protection provided to secret key
material (i.e., keys and initialization vectors). A secret key is a
symmetric key that is not made public and requires protection from
disclosure.
Which of the following is not the recommended combination of
authentication type key, digital signature key, and key
establishment key respectively?
a. RSA 1024, RSA 2048, and DH 2048
b. ECDSA P-256, ECDSA P-256, and RSA 2048
c. RSA 1024, RSA 2048, and RSA 2048
d. ECDSA P-384, ECDSA P-384, and ECDH P-384
B. In general, protocols and applications are designed to use
cryptographic algorithms from one mathematical family. For most
uses, digital signature keys and key establishment keys should provide
consistent cryptographic strength. For example, applications that
encounter certificates with elliptic curve digital signature algorithm
(ECDSA) digital signatures would expect to use elliptic curve DiffieHellman (ECDH) for the key establishment key. Rivest, Shamir, and
Adelman (RSA) is not compatible with ECDSA, whereas it is
compatible with DH. It is advisable that users obtain an authentication
type key, a digital signature key, and a key establishment key that are
complementary in nature to ensure that the keys can be used together
in protocols and applications. Complementary algorithms for public
keys enhance interoperability.
Which of the following is the major reason for the transport layer security (TLS) protocol to provide end-to-end reliable delivery of data and messages?
a. Cyclical redundancy checks
b. Message reassembly
c. Forward error correction technique
d. Message fragmentation
B. Reliable delivery of data implies that all messages presented to
the sending TCP/IP stack are delivered in proper sequence by the
receiving TCP/IP stack. These messages may be broken up into
packets and fragmented or segmented as they are sent and routed
through any arrangement of local-area, wide-area, or metropolitan-area
networks. During routing through networks, data are augmented with
cyclical redundancy checks or forward error correction techniques to
help ensure that the delivered messages are identical to the transmitted
messages. Reliable delivery means that the messages are properly
reassembled and presented in proper sequence to the peer protocol
TLS entity. Here, the TLS relies on the communications functionality
of the OSI/ISO lower layer protocols.
The transport layer security (TLS) protocol version 1.1 mandates the use of which of the following cipher suites?
a. TLS and DES with RC4-40, RC2-CBC-40, and DES-40
b. TLS and DHE-DSA with 3DES-EDE-CBC and SHA-1
c. TLS and DHE-DSS with 3DES-EDE-CBC and SHA-1
d. TLS and RSA with 3DES-EDE-CBC and SHA-1
D. The TLS version 1.1 mandates the use of the TLS and RSA with
3DES-EDE-CBC and SHA-1 cipher suite, and is more commonly
used. The DES with RC4-40, RC2-CBC-40, and DES-40 cannot be
combined with TLS because the algorithm is deprecated. The TLS and
DHE-DSA with 3DES-EDE-CBCand SHA-1 is not often used. The
TLS version 1.0 uses the TLS and DHE-DSS with 3DES-EDE-CBC
and SHA-1.
The transport layer security (TLS) protocol’s security specification for ensuring confidentiality goal is:
a. Rivest, Shamir, and Adelman (RSA)
b. Digital signature algorithm (DSA)
c. Triple-data encryption standard (3DES) using encryption decryption-encryption (EDE) and cipher block chaining (CBC)
d. Message digest 5 (MD5)
C. The transport layer security (TLS) protocol’s security
specification for ensuring the confidentiality goal is 3DES-EDE-CBC.
RSA is used for key establishment, a DSA is used for digital
signatures, and MD5 is used for hash function purposes.
What is a digital certificate?
a. A password-protected file
b. An encrypted file
c. A password-protected and encrypted file
d. A password-protected and modem-protected file
C. A digital certificate is a password-protected and encrypted file
that contains identification information about its holder. It is not a
modem-protected file.
Most commonly used X.509 certificates do not refer to which of
the following?
a. Tamper-evident envelope
b. Attribute certificate
c. Public key certificate
d. Basic certificate content
B. The ISO/ITU-T X.509 standard defines two types of certificates:
the X.509 public key certificate and the X.509 attribute certificate.
Most commonly, an X.509 certificate refers to the X.509 public key
certificate. The public key certificate contains three nested elements:
(i) the tamper-evident envelope (digitally signed by the source), (ii) the
basic certificate content (for example, identifying information and
public key), and (iii) extensions that contain optional certificate
information. The X.509 attribute certificate is less commonly used.
Which of the following features of Secure Hypertext Transfer
Protocol (S-HTTP) achieves higher levels of protection?
a. Freshness feature
b. Algorithm independence feature
c. Syntax compatibility feature
d. Recursive feature
D. In the recursive feature, the message is parsed one protection at a
time until it yields a standard HTTP content type. Here, protections are
applied in layers, one layer after another to achieve higher levels of
protection. S-HTTP uses a simple challenge-response to ensure that
data being returned to the server is “fresh.” Algorithm independence
means new cryptographic methods can be easily implemented. Syntax
compatibility means that the standard HTTP messages are syntactically
the same as secure HTTP messages.
The Secure Sockets Layer (SSL) transport protocol provides all the following services except:
a. Mutual authentication
b. Message privacy
c. Message integrity
d. Mutual handshake
D. The Secure Sockets Layer (SSL) is an open and nonproprietary
protocol that provides services such as mutual authentication, message
privacy, and message integrity. Mutual handshake is not done by SSL.
Which of the following can be used with traffic padding security mechanisms?
a. Passwords
b. Smart tokens
c. Encryption
d. Memory tokens
C. Traffic padding is a function that generates a continuous stream
of random data or ciphertext. True data is mixed with extraneous data
thus making it difficult to deduce the amount of traffic, that is, traffic
analysis. Encryption is good with traffic padding because it can
disguise the true data very well and requires a key to decipher the
encrypted data.
Passwords are incorrect because they are most often associated with
user authentication, not with traffic padding. Smart tokens and memory
tokens are incorrect because they are also used to authenticate users.
Memory tokens store, but do not process, information, whereas smart
tokens both store and process information.
Effective controls to ensure data integrity of messages does not
include:
a. Encryption algorithms
b. Hashing algorithms
c. File seals
d. File labels
D. File labels are used in computer job runs to process application
systems data to ensure that the right file is used. Encryption
algorithms, due to their encryption and decryption mechanisms and by
keeping the encryption keys secure, provide integrity to the message
transmitted or stored. Hashing algorithms are a form of authentication
that provides data integrity. File seal is adding a separate signature to
software and partly works with virus checking software. When the file
seal and virus checking software signatures do not match, it is an
indication that data integrity has been compromised.
During the design of data communication networks, a functional capability of providing link encryption and end-to-end encryption is addressed by which of the following?
a. Administrative control
b. Access control
c. Cost control
d. Technical control
B. Functional capabilities can be placed inside network components
to control access and protect information from misuse. Automated
access control systems can require users and systems to log on to a
network by identifying themselves and providing an automated
password or similar control. Link and end-to-end encryption devices
can protect information from misuse during transmission over a circuit
or through a network. Link encryption is the application of online
crypto-operation to a link of a communications system so that all
information passing over the link is encrypted in its entirety. End-toend encryption is the encryption of information at its origin and
decryption at its intended destination without any intermediate
decryption.
Administrative control is incorrect because it deals with handling the
paperwork associated with operating a network. The scope includes
receiving requests for service from prospective users, notifying
operations personnel of dates that devices should be connected and
disconnected, maintaining a directory of network users and services,
authorizing users to access the network and, issuing passwords.
Cost control is incorrect because it deals with cost recovery and
avoidance. It includes price setting for network services and billing the
users. The price of network services is often a function of the volume
of information exchanged, the duration of usage, the distance between
parties, and the time of day of usage.
Technical control is incorrect because it includes activities such as
failure detection, problem diagnosis, and service restoration of network
components. The scope includes alarms, status indicators, test equipment interfaces, remote controls, and automatic monitoring.
Which of the following is an example of passive wiretapping?
a. Traffic analysis
b. Message modification
c. Message delay
d. Message deletion
A. Passive wiretapping includes not only information release but
also traffic analysis (using addresses, other header data, message
length, and message frequency). Security measures such as traffic
padding can be used to prevent traffic analysis attacks. Active
wiretapping includes message stream modifications, including delay,
duplication, deletion, or counterfeiting.
What is a hash-based message authentication code (HMAC) based on?
a. Asymmetric key
b. Public key
c. Symmetric key
d. Private key
C. A hash-based message authentication code (HMAC) is based on
a symmetric key authentication method using hash functions. A
symmetric key is a cryptographic key that is used to perform both the
cryptographic operation and its inverse, for example to encrypt and
decrypt, or create a message authentication code (MAC), and to verify
the code.
Asymmetric key is incorrect because there are two related keys in
asymmetric keys; a public key and a private key that are used to
perform complementary operations, such as encryption and decryption,
or signature generation and signature verification. Public key is
incorrect because it is the public part of an asymmetric key pair that is
typically used to verify signatures or encrypt data. Private key is
incorrect because it is the secret part of an asymmetric key pair that is
typically used to digitally sign or decrypt data.
What is the main purpose of a message authentication code
(MAC)?
a. Recovery
b. Prevention
c. Detection
d. Correction
C. A message authentication code (MAC) is a cryptographic
checksum on data that uses a symmetric key to detect both accidental
and intentional modifications of data.
The major functions of a public key used in cryptography include which of the following?
1. Encrypt data
2. Decrypt data
3. Generate signatures
4. Verify signatures
a. 1 only
b. 2 only
c. 1 or 4
d. 2 or 3
C. The public key is the public part of an asymmetric key pair that
is typically used to encrypt data or verify signatures. The private key is
the secret part of an asymmetric key pair that is typically used to
decrypt data and to digitally sign (i.e., generate signatures).
Approved hash functions must satisfy which of the following properties?
1. One-way
2. Collision resistant
3. Resistant to offline attacks
4. Resistant to online attacks
a. 1 only
b. 3 only
c. 4 only
d. 1 and 2
D. A hash function maps a bit string of arbitrary length to a fixed
length bit string. Approved hash functions must satisfy the following
two properties: one-way and collision resistant. It is computationally
infeasible to find any input that map to any prespecified output or two
distinct inputs that map to the same output.
Offline attack is an attack where the attacker obtains some data
through eavesdropping that he can analyze in a system of his own
choosing. Online attack is an attack against an authentication protocol
where the attacker either assumes the role of a claimant with a genuine
verifier or actively alters the authentication channel. The goal of the
attack may be to gain authenticated access or learn authentication
secrets.
Which of the following is a measure of the amount of uncertainty that an attacker faces to determine the value of a secret?
a. Entropy
b. Random number
c. Nonce
d. Pseudonym
A. Entropy is a measure of the amount of uncertainty that an
attacker faces to determine the value of a secret. Entropy is usually
stated in bits as it relates to information theory. It is a statistical
parameter.
Random number is incorrect because it can be used to generate
passwords or keys. Nonce is incorrect because it is a value used in
security protocols that is never repeated with the same key. Pseudonym
is incorrect because it is a subscriber name that has been chosen by the
subscriber that is not verified as meaningful by identity proofing.
Which of the following is a non secret value that is used in a cryptographic process?
a. Salt
b. Shared secret
c. Min-entropy
d. Guessing entropy
A. Salt is a nonsecret value that is used in a cryptographic process,
usually to ensure that an attacker cannot reuse the results of
computations for one instance.
Shared secret is incorrect because it is a secret used in authentication
that is known to the claimant and the verifier. Min-entropy is incorrect
because it is a measure of the difficulty that an attacker has to guess the
most commonly chosen password used in a system. Guessing entropy
is incorrect because it is a measure of the difficulty that an attacker has
to guess the average password used in a system.
A technique to protect software from potential forgeries is to use:
a. Digital libraries
b. Digital signals
c. Digital watermarks
d. Digital signatures
C. Digital watermarks are used to prove proprietary rights. It is the
process of irreversibly embedding information into a digital signal. An
example is embedding copyright information about the copyright
owner.
Digital libraries are storage places for data and programs. Digital
signals are electronic switches in computers and are represented as
binary digits called bits. Digital signatures are a security authorization
method to prove that a message was not modified.
Which of the following specifically deals with hiding messages and obscuring senders and receivers?
a. Quantum cryptography
b. Steganography
c. Cryptology
d. Cryptography
B. Steganography is a part of cryptology that deals with hiding
messages and obscuring who is sending or receiving them. Message
traffic is padded to reduce the signals that otherwise would come from
the sudden beginning of messages. Quantum cryptography is based on
quantum-mechanics principles where eavesdroppers alter the quantum
state of the system.
Cryptology is the science and study of writing, sending, receiving, and
deciphering secret messages. It includes authentication, digital
signatures, steganography, and cryptanalysis. Cryptology includes both
cryptography and cryptanalysis. Cryptology is the science that deals
with hidden communications. Cryptography involves the principles,
means, and methods used to render information unintelligible and for
restoring encrypted information to intelligible form.
- What is an encryption algorithm that encrypts and decrypts arbitrarily sized messages called?
a. Link encryption
b. Bulk encryption
c. End-to-end encryption
d. Stream encryption
D. The cipher block chaining method is used to convert a block
encryption scheme with a variable length key into a stream encryption
of arbitrarily sized messages.
In link encryption, all information passing over the link is encrypted in
its entirety. Link encryption is also called an online encryption.
Simultaneous encryption of all channels of a multichannel
telecommunications trunk is called a bulk encryption.
In end-to-end encryption, the information is encrypted at its origin and
decrypted at its intended destination without any intermediate
decryption. End-to-end encryption is also called an offline encryption.
In link encryption, bulk encryption, and end-to-end encryption, the
algorithm takes a fixed-length block of message (for example, 64 bits
in the case of both DES and IDEA).
What is a message authentication code?
a. Data checksum
b. Cryptographic checksum
c. Digital signature
d. Cyclic redundancy check
B. A checksum is digits or bits summed according to arbitrary rules
and used to verify the integrity of data. All forms of checksums have
the same objective, that is, to ensure that the conveyed information has
not been changed in transit from sender to recipient. The difference
between these checksums is how strong the protective mechanism is
for changing the information, that is, how hard it will be to attack for a
knowledgeable attacker, not for a natural source. A message
authentication code is a cryptographic checksum with the highest form
of security against attacks. The public key is used to encrypt the
message prior to transmission, and knowledge of a private (secret) key
is needed to decode or decrypt the received message.
A data checksum is incorrect because it catches errors that are the
result of noise or other more natural or nonintentional sources. For
example, most of these errors are due to human errors.
A digital signature is incorrect because it is a form of authenticator. It
is decrypted using the secret decryption key and sent to the receiver.
The receiver may encrypt, using the public key, and may verify the
signature, but the signature cannot be forged because only the sender
knows the secret decryption key. Nonpublic key algorithms can also be
used for digital signatures. The basic difference between the message
authentication code and the digital signature is that although message
authentication codes require a secret (private) key to verify, digital
signatures are verifiable with a public key, that is, a published value.
Message authentication codes are used to exchange information
between two parties, where both have knowledge of the secret key. A
digital signature does not require any secret key to be verified.
A cyclic redundancy check (CRC) is incorrect because it uses an
algorithm for generating error detection bits, and the receiving station
performs the same calculation as the transmitting station. If the results
differ, then one or more bits are in error. Both message authentication
codes and digital signatures operate with keys (whether public or
private), are based on cryptography, and are hard to attack by intruders.
On the other hand, data checksums and cyclic redundancy checks
operate on algorithms, are not based on cryptography, and are easily
attacked by intruders.
For security protection mechanisms for cryptographic data in storage, the encryption mechanism should not be easier to recover the key encrypting key than it is to recover the key being encrypted is a part of which of the following cryptographic service?
a. Confidentiality
b. Availability
c. Integrity
d. Labels
A. For confidentiality service, encryption with an approved
algorithm is needed for the cryptographic module. Moreover, the
encryption mechanism should not be an easier way to recover the key
encrypting key than it is to recover the key being encrypted. In other
words, recovering the key being encrypted should be relatively easier
and recovering the key encrypting key should be difficult.
Which of the following is least effective in verifying against malicious tampering?
a. Message authentication code
b. Digital signatures
c. Message digests
d. Cyclic redundancy code
D. Checksums are of two types: a cryptographic checksum and a
noncryptographic checksum. A cyclic redundancy code is a
noncryptographic checksum, which is designed to detect random bit
changes, not purposeful alterations or malicious tampering. These
checksums are good at finding a few bits changed at random.
The other three incorrect choices are based on cryptographic checksum
techniques. Message authentication code is a message digest with a
password attached to it. The intent is that someone cannot re-create the
code with the same input unless that person also knows the secret key
(password). A digital signature is a message digest encrypted with
someone’s private key to certify the contents. Digital signatures
perform three important functions: integrity, authentication, and
nonrepudiation. A message digest is a hash code produced by a
mathematical function. It takes variable length input and reduces it to a
small value, and a small change in the input results in a significant
change in the output.
Secure hash algorithms create a short message digest. The message
digest is then used, with the sender’s private key and the algorithm
specified in digital signature standard, to produce a message-specific
signature. Verifying the digital signature standard involves a
mathematical operation on the signature and message digest, using the
sender’s public key and the hash standard.
What is password hashing?
a. Storing a hash of the password
b. Storing the password in a clear text and encrypting it as needed
c. Guessing a password
d. Cracking a password
A. Password hashing requires storing a password in its hash form,
which is better than storing an unencrypted password. When a
password is supplied, it computes the password’s hash and compares it
with the stored value. If they match, the password is correct. An
attacker cannot derive the password from the hashes. It is good to hide
the hashed password list.
The other three incorrect choices are weak forms of handling a
password. Encrypting passwords leads to judgmental errors. A
password can be easily guessed if the user selects the password from a
word dictionary. An exhaustive search may then “crack” the password.
Which of the following statements is true about message padding?
a. It is the same as traffic padding.
b. It is similar to a data checksum.
c. It is adding additional bits to a message.
d. It is the same as one-time pad.
C. Message padding adds bits to a message to make it a desired
length—for instance, an integral number of bytes. Traffic padding
involves adding bogus traffic into the channel to prevent traffic
analysis, which is a passive attack. Data checksums are digits or bits
summed according to arbitrary rules and used to verify the integrity of
data. The one-time pad contains a random number for each character in
the original message. The pad is destroyed after its initial use.
What is a public key cryptographic algorithm that does both
encryption and digital signature?
a. Rivest, Shamir, and Adelman (RSA)
b. Data encryption standard (DES)
c. International data encryption algorithm (IDEA)
d. Digital signature standard (DSS)
A. RSA’s technique can be used for document encryption as well as
creating digital signatures. DSS is a public key cryptographic system
for computing digital signatures only, but not for encryption. Both
RSA and DSS appear to be similar. DES is a secret key cryptographic
scheme. IDEA is also a secret key cryptographic scheme gaining
popularity. Both DES and IDEA use secret (private) key algorithms,
whereas DSS and RSA use public key algorithms.
What is a digital signature?
a. A form of authenticator
b. An actual signature written on the computer
c. The same as the checksum
d. Different from analog signature
A. A digital signature authorizes and legitimizes the transaction by
using a secret decryption key to send it to the receiver. An actual
signature written on the computer is incorrect because it is not an
actual signature. Instead, a digital signature is decrypted using the
secret decryption key and sent to the receiver. Checksum is incorrect
because it is a technique to ensure the accuracy of transmission, and it
ensures the integrity of files. There is no such thing as an analog
signature because a digital signature is needed.
What is a major drawback of digital certificates?
a. Certificate authority
b. Internet addresses
c. Message digest
d. Digital signature
B. A major drawback of digital certificates is that they do not
identify individuals, only Internet addresses. A different person could
use the same computer with bad intent and be seen as the legitimate
owner of the digital certificate. The certificate authority, the message
digest, and the digital signatures are the strengths of digital certificates.
Which of the following methods can prevent eavesdropping?
a. Authentication
b. Access controls
c. Encryption
d. Intrusion detection
C. Encryption can be used to prevent eavesdroppers from obtaining
data traveling over unsecured networks. The items mentioned in the
other three choices do not have the same features as encryption.
Authentication is the act of verifying the identity of a user and the
user’s eligibility to access computerized information. Access controls
determine what users can do in a computer system. Intrusion detection
systems are software or hardware systems that detect unauthorized use
of, or attack upon, a computer or network.
Which of the following is more secure?
a. Private key system
b. Public key system
c. Authentication key system
d. Encryption key system
B. The public key system is more secure because transmission
involves the public key only; the private key is never transmitted and is
kept secret by its holder. On the other hand, in a private key system,
both the sender and the recipient know the secret key and thus it can be
less secure. Authentication and encryption key systems are incorrect
because they can be either public (more secure) or private (less secure)
key systems.
For security protection mechanisms for cryptographic data in transit, side channel attacks are possible in which of the following cryptographic services?
a. Confidentiality
b. Availability
c. Integrity
d. Labels
C. Improper error handling during a transmission between a sender
and a receiver can result in side channel attacks, which can result in
integrity failures. A security policy should define the response to such
a failure. Remedies for integrity failures can include retransmission
limited to a predetermined number of times and storing the error data
in an audit log for later identification of the source of the error.
The other three choices do not allow side channel attacks because they
do not deal with transmission errors. Confidentiality deals with privacy
and nondisclosure of information, and more. Availability deals with
making data and systems within the reach of users. Labels are used to
identify attributes, parameters, or the intended use of a key.
Public key authentication systems:
a. Are faster than private key systems
b. Do not use digital signatures
c. Are slower than private key systems
d. Do not use alpha characters in the key
C. Public key methods are much slower than private methods and
cause overhead, which are their main disadvantages. The public key
contains alphanumeric characters. The public key systems use digital
signatures for authentication.
Which of the following is not a common route to data interception?
a. Direct observation
b. Data encryption
c. Interception of data transmission
d. Electromagnetic interception
B. There are three routes of data interception: direct observation,
interception of data transmission, and electromagnetic interception.
Data encryption can be a solution to data interception.
The combination of XEX tweakable block cipher with ciphertext stealing and advanced encryption standard (XTS-AES) algorithm was designed to provide which of the following?
1. Encryption of data on storage devices
2 Encryption of data in transit
3. Confidentiality for the protected data
4. Authentication of data
a. 1 and 2
b. 1 and 3
c. 2 and 4
d. 3 and 4
C. The XTS-AES mode was designed for the cryptographic
protection of data on storage devices that use fixed length data units,
and it was not designed for encryption of data in transit. This mode
also provides confidentiality for the protected data but not
authentication of data or access control.
Which of the following is not used for public key infrastructure-based (PKI-based) authentication of system users?
a. Validates certificates by constructing a certification path to an
accepted trust anchor
b. Establishes user control of the corresponding private key
c. Maps the authenticated identity to the user account
d. Uses a radius server with extensible authentication protocol and
transport layer security authentication
D. A radius server with extensible authentication protocol (EAP)
and transport layer security (TLS) authentication is used to identify
and authenticate devices on LANs and/or WANs. It is not used for
authenticating system users. The other three choices are used for PKI based authentication of system users.
Message authentication code (MAC) provides which of the following security services?
a. Confidentiality and integrity
b. Authentication and integrity
c. Accountability and availability
d. Assurance and reliability
B. The message authentication code (MAC) provides data
authentication and integrity. A MAC is a cryptographic checksum on
the data that is used to provide assurance that the data has not changed
and that the MAC was computed by the expected entity. It cannot
provide other security services.
Which of the following are countermeasures against traffic analysis attacks?
1. Traffic flow signal control
2. Traffic encryption key
3. Traffic flow security
4. Traffic padding
a. 1 and 2
b. 1 and 3
c. 2 and 4
d. 3 and 4
D. Traffic flow security is a technique to counter traffic analysis
attacks, which is the protection resulting from encrypting the source
and destination addresses of valid messages transmitted over a
communications circuit. Security is assured due to use of link
encryption and because no part of the data is known to an attacker.
Traffic padding, which generates mock communications or data units
to disguise the amount of real data units being sent, also protects traffic
analysis attacks.
The other two items cannot control traffic analysis attacks. Traffic flow
signal control is used to conduct traffic flow analysis. Traffic
encryption key is used to encrypt plaintext or to super-encrypt
previously encrypted text and/or to decrypt ciphertext.
Which of the following refers to a communications network architecture in which user data traversing a global Internet Protocol (IP) network is end-to-end encrypted at the IP layer?
a. RED
b. BLACK
c. Black core
d. Striped core
C. Black core refers to a communications network architecture in
which user data traversing a core (global) Internet Protocol (IP)
network is end-to-end encrypted at the IP layer.
RED refers to data/information or messages that contain sensitive or
classified information that is not encrypted whereas BLACK refers to
information that is encrypted. Striped core is a communications
network architecture in which user data traversing a core (global) IP
network is decrypted, filtered, and re-encrypted one or more times. The
process of decryption filtering, and re-encryption is performed within a
“red gateway”; consequently, the core is “striped” because the data
path is alternatively black, red, and black.
Digital signature generation should provide security strength of which of the following?
a. Less than 80 bits
b. Equal to or greater than 80 bits
c. Equal to or greater than 112 bits
d. Between 80 and 112 bits
C. Digital signature generation should provide security strength of
112 bits or more. Digital signature verification should provide security
strength of 80 bits or more. Less than 80 bits or a range between 80
and 112 bits are not acceptable for the digital signature generation.
Which of the following is not true about a digital signature?
a. It is an encrypted digest of the text that is sent along with a
message.
b. It authenticates the identity of the sender of a message.
c. It guarantees that no one has altered the sent document.
d. Electronic signatures and digital signatures are the same.
D. A digital signature is an electronic analogue of a handwritten
signature in that it can be used to prove to the recipient, or a third
party, that the originator in fact signed the message. It is an encrypted
digest of the text that is sent along with a message, usually a text
message, but possibly one that contains other types of information,
such as pictures. A digital signature authenticates the identity of the
sender of the message and also guarantees that no one has altered the
document.
On the other hand, an electronic signature is a cryptographic
mechanism that performs a similar function to a handwritten signature.
It is used to verify the origin and contents of a message (for example,
an e-mail message). It is a method of signing an electronic message
that (i) identifies and authenticates a particular person as the source of
the electronic message and (ii) indicates such person’s approval of the
information contained in the electronic message. Electronic signatures
can use either secret key or public key cryptography.Hence, electronic
signatures and digital signatures are not the same.
Traffic flow confidentiality uses which of the following security controls?
a. Traffic padding and address hiding
b. Test words and traffic padding
c. Traffic padding and seals/signatures
d. Address hiding and seals/signatures
A. Traffic flow confidentiality protects against sensitive
information being disclosed by observing network traffic flows. It uses
traffic (message) padding and address hiding controls. In traffic
padding, “dummy” traffic is generated to confuse the intruder. Address
hiding requires that protocol header information be protected from
unauthorized attack via cryptographic means.
Testword is incorrect because a string of characters is appended to a
transaction by the sending party and verified by the receiving party. A
testword is an early technology realization of a seal or signature used
in financial transactions. A seal or signature involves cryptographically
generating a value that is appended to a plain text data item. Both
testwords and seals are used to increase the data integrity of financial
transactions.
Cryptographic methods work effectively as a security measure for information and communication systems. To achieve that goal, cryptographic methods must meet all the following except:
a. Interoperable
b. Scalable
c. Mobile
d. Portable
B. Scalability means the system can be made to have more or less
computational power by configuring it with a larger or smaller number
of processors, amount of memory, interconnection bandwidth, number
of total connections, input/output bandwidth, and amount of mass
storage. Scalability is a technology or organizational issue, not a
cryptography issue.
Interoperability is incorrect because it is needed in cryptography where
two or more systems can interact with one another and exchange data
according to a prescribed method to achieve predictable results.
Mobility is incorrect because it is needed in cryptography to
authenticate between local and remote systems. Portability is incorrect
because it is needed in cryptography between operating systems and
application systems. The other three choices are cryptography issues to
deal with.
Which of the following provides less security?
a. SHA-1
b. SHA-224
c. SHA-256
d. SHA-384
A. Secure hash algorithm -1 (SHA-1), which is 160 bits, provides
less security than SHA-224, SHA-256, and SHA-384. Cryptographic
hash functions that compute a fixed size message digest (MD) from
arbitrary size messages are widely used for many purposes in
cryptography, including digital signatures. A hash function produces a
short representation of a longer message. A good hash function is a
one-way function: It is easy to compute the hash value from a
particular input; however, backing up the process from the hash value
back to the input is extremely difficult. With a good hash function, it is
also extremely difficult to find two specific inputs that produce the
same hash value. Because of these characteristics, hash functions are
often used to determine whether data has changed.
Researchers discovered a way to “break” a number of hash algorithms,
including MD4, MD5, HAVAL-128, RIPEMD, and SHA-0. New
attacks on SHA-1 have indicated that SHA-1 provides less security
than originally thought. Therefore, the use of SHA-1 is not
recommended for generating digital signatures in new systems. New
systems should use one of the larger and better hash functions, such as
SHA-224, SHA-256, SHA-384, and SHA-512.
In symmetric cryptography, if there are four entities using
encryption, how many keys are required for each relationship?
a. 4
b. 6
c. 8
d. 12
B. In symmetric cryptography, the same key is used for both
encryption and decryption. If there are four entities such as A, B, C,
and D, there are six possible relationships such as A-B, A-C, A-D, BC, B-D, and C-D. Therefore, six keys are required. It uses the formula
(n)(n–1)/2 where “n” equals the number of entities.
Which of the following key combinations is highly
recommended to use in the triple data encryption algorithm (TDEA)?
a. Independent key 1, Independent key 2, Independent key 3
b. Independent key 1, Independent key 2, Independent key 1
c. Independent key 1, Independent key 2, Independent key 2
d. Independent key 2, Independent key 3, Independent key 3
A. Triple data encryption algorithm (TDEA) encrypts data in
blocks of 64 bits, using three keys that define a key bundle. The use of
three distinctly different (i.e., mathematically independent) keys is
highly recommended because this provides the most security from
TDEA; this is commonly known as three-key TDEA (3TDEA or
3TDES). The use of two-key TDEA (2TDEA or 2TDES), in which the
first and third keys are identical and the second key is distinctly
different, is highly discouraged. Other configurations of keys in the
key bundle shall not be used.
For a cryptographic module, which of the following presents
the correct relationships for sensitive security parameters?
a. Port security parameters plus private security parameters
b. Critical security parameters plus public security parameters
c. Data security parameters plus critical security parameters
d. Public security parameters plus program security parameters
B. Critical security parameters (CSP) contain security-related
information (for example, secret and private cryptographic keys, and
authentication data such as passwords and PINs) whose disclosure or
modification can compromise the security of a cryptographic module
or the security of the information protected by the module. Public
security parameters (PSP) deal with security-related public information
(for example, public keys) whose modification can compromise the
security of a cryptographic module. Sensitive security parameters
(SSP) contain both CSP and PSP. In other words, SSP = CSP + PSP. A
trusted channel is generally established to transport the SSPs, data, and
other critical information shared by the cryptographic module and the
module’s operator.
The other three choices are incorrect. A port is a physical entry or exit
point of a cryptographic module that provides access to the module for
physical signals represented by logical information flows. The port
security parameters along with data/program security parameters are
not that important to the cryptographic module. The private security
parameters do not exist.
The U.S. government imposes export controls on strong cryptography. Which of the following is the acceptable encryption key for use behind the firewall for use in foreign countries or in networks that include nodes in a foreign country?
a. 40 bits
b. 56 bits
c. 75 bits
d. 90 bits
A. Encryption using keys of 40 or fewer bits is only acceptable for
use behind the firewall. Leading cryptographers recommend
businesses use key lengths of at least 75 bits, with 90 bits being
preferable. The Data Encryption Standard (DES) uses 56 keys, which
is still acceptable for near term use.
Which of the following should be considered during configuration of cryptographic controls in the implementation phase of a system development life cycle (SDLC) as it applies to selecting cryptographic mechanisms?
1. Mathematical soundness of the algorithm
2. Length of the cryptographic keys
3. Key management
4. Mode of operation
a. 2 only
b. 3 only
c. 1, 2, and 3
d. 1, 2, 3, and 4
D. In the implementation phase, the focus is on configuring the
system for use in the operational environment. This includes
configuring the cryptographic controls. After the system has been
configured, certification testing is performed to ensure that the system
functions as specified and that the security controls are operating
effectively. The security provided by a cryptographic control depends
on the mathematical soundness of the algorithm, the length of the
cryptographic keys, key management, and mode of operation. A
weakness in any one of these components may result in a weakness or
compromise to the security of the cryptographic control. A weakness
may be introduced at any phase of the system life cycle.
Audit trails should be considered as part of which of the following security controls during the security design, implementation, and use of a cryptographic module?
a. Physical access controls
b. Logical access controls
c. Integrity controls
d. User authentication
C. Cryptography may provide methods that protect security relevant software, including audit trails, from undetected modification.
This is addressed as part of the integrity controls. Physical access
controls are incorrect because they deal with prevention, detection,
physical replacement or modification of the cryptographic system, and
the keys within the system. Logical access controls are incorrect
because they may provide a means of isolating the cryptographic
software from attacks and modifications. The cryptographic module
boundary may consist of the hardware, operating system, and
cryptographic software. User authentication is incorrect because it
includes use of cryptographic authentication to provide stronger
authentication of users.
Which of the following is not a rule that guides the cryptography implementation in a system development life cycle (SDLC) as it applies to selecting cryptographic mechanisms?
a. Determine what information must be provided using a
cryptographic function.
b. Change the cryptographic keys when employees leave the
organization.
c. Protect data prior to signature generation/verification or
encryption/decryption.
d. Provide the capability for local users to view all data that is
being signed or encrypted.
B. It is a rule to follow in the operation and maintenance phase,
not in the implementation phase. For example, cryptographic keys that
are never changed, even when disgruntled employees leave the
organization, are not secure. The other three choices are incorrect
because they are the rules that guide the implementation of
cryptography.
During the operation and maintenance phase of a system
development life cycle (SDLC) as it relates to cryptography, which
of the following requires configuration management most?
1. Hardware and firmware
2. System software maintenance and update
3. Application software maintenance
4. Cryptographic key maintenance
a. 1 and 2
b. 2 and 3
c. 3 and 4
d. 1, 2, 3, and 4
- a. Configuration management (CM) is needed most for high-risk
areas such as hardware and firmware and system software maintenance
and update. CM ensures the integrity of managing system and security
features through controlling changes made to a system’s hardware,
firmware, software, and documentation. The documentation may
include user guidance, test scripts, test data, and test results. The
hardware and firmware maintenance scope covers adding new
capabilities, expanding the system to accommodate more users,
replacing nonfunctional equipment, changing platforms, and upgrading
hardware components. The system software maintenance and update
scope includes adding new capabilities, fixing errors, improving
performance, and replacing keys.
The application software maintenance scope covers updating
passwords, deleting users from access lists, updating remote access,
and changing roles and responsibilities of users and maintenance
personnel, which are mostly routine in nature. The cryptographic key
maintenance scope includes key archiving, key destruction, and key
change, as it is mostly done in the disposal phase
During the operational phase of cryptography, key recovery means which of the following?
1. Acquiring keying material from backup
2. Acquiring keying material by reconstruction
3. Binding keying material to information
4. Binding keying material to attributes
a. 1 and 2
b. 2 and 3
c. 3 and 4
d. 1, 2, 3, and 4
A. Acquiring the keying material from backup or by
reconstruction is commonly known as key recovery. The other items
deal with key registration, which results in the binding of keying
material to information or attributes associated with a particular entity.
A trusted third party (for example, Kerberos realm server or a PKI
certification authority) performs the binding.
During the operational phase of cryptography, which of the following keying material does not require backup storage?
a. Domain parameters
b. Passwords
c. Audit information
d. Random number generator seed
D. The keying material backup on an independent, secure storage
medium provides a source for key recovery. Keying material
maintained in backup should remain in storage for at least as long as
the same keying material is maintained in storage for normal
operational use. Not all keys need be backed up. For example, random
number generator (RNG) seed need not be backed up because it is a
secret value that is used to initialize a deterministic random bit
generator. In addition, storing the RNG seed would actually decrease
the security of the keys by increasing the risk of the material being
used to reverse-engineer the keys.
Domain parameters are incorrect because they can be backed up. It is a
parameter used with some public key algorithm to generate key pairs,
to create digital signatures, or to establish keying material. Passwords
are incorrect because they can be backed up. A password is a string of
characters (for example, letters, numbers, and other symbols) that are
used to authenticate an identity or to verify access authorization. Audit
information is incorrect because it can be backed up and can be used to
trace events and actions.
During the post-operational phase of cryptography, which of the following keying material does not require archive storage?
a. Initialization vector
b. Audit information
c. Passwords
d. Domain parameters
C. During the post-operational phase, keying material is no longer
in operational use, but access to the keying material may still be
possible. A key management archive is a repository containing keying
material and other related information of historical interest. Not all
keying material needs to be archived. For example, passwords which
often change need not be archived because storing passwords for the
keys can increase the risk of disclosure.
Initialization vector is incorrect because it can be archived. It can be
retained until it’s no longer needed to process the protected data. An
initialization vector is a vector used in defining the starting point of a
cryptographic process. Audit information can be archived and can be
retained until no longer needed. Domain parameters are incorrect
because they can be archived. These parameters can be retained until
all keying material, signatures, and signed data using the domain
parameters are removed from the archive.
Regarding cryptographic key management systems, which of
the following require frequent audits?
a. Security plans
b. Security procedures
c. Human actions
d. Protective mechanisms
C. On a more frequent basis, the actions of the humans who use,
operate, and maintain the system should be reviewed to verify that they
continue to follow established security procedures. Strong
cryptographic systems can be compromised by lax and inappropriate
human actions. Highly unusual events should be noted and reviewed as
possible indicators of attempted attacks on the system.
Security plans, security procedures, and protective mechanisms are
incorrect because they are considered as part of the human actions
audit and they continue to support the cryptographic key management
policy.
Regarding cryptographic key management system survivability, which of the following keys need to be backed up to decrypt stored enciphered information?
1. Master keys
2. Key encrypting key
3. Public signature verification keys
4. Authorization keys
a. 1 only
b. 3 only
c. 4 only
d. 1, 2, 3, and 4
D. Without access to the cryptographic keys that are needed to
decrypt information, organizations risk losing their access to that
information. Consequently, it is prudent to retain backup copies of the
keys necessary to decrypt stored enciphered information, including
master keys, key encrypting keys, public signature verification keys,
and authorization keys. These items should be stored until there is no
longer any requirement for access to the underlying plain text
information.
Which of the following is not a critical component of cryptographic key management system?
a. Point-to-point environment
b. Key distribution center environment
c. Key translation center environment
d. Key disclosure center environment
D. A cryptographic key management system must have three
components to operate: a point-to-point environment, a key
distribution center environment, and a key translation center
environment. A key disclosure center environment is not relevant here.
Which of the following is not used to obtain nonrepudiation
service?
a. Digital signatures
b. Digital message receipts
c. Integrity checks
d. Timestamps
C. Nonrepudiation services are obtained by employing various
techniques or mechanisms such as digital signatures, digital message
receipts, and timestamps, not integrity checks. Integrity checks are
used with operating systems.
In cryptographic key management, key zeroization means which of the following?
a. Key recovery
b. Key regeneration
c. Key destruction
d. Key correction
C. Key zeroization means key destruction. It is a method of
erasing electronically stored keys by altering the contents of key
storage so as to prevent the recovery of keys. The other three choices
do not need key zeroization. Key recovery is a function in the life
cycle of keying material in that it allows authorized entities to retrieve
keying material from the key backup or archive. Key regeneration and
key correction are needed when a key is compromised.
Which of the following binds the identity of a user to his
public key?
a. Private key technology and digital certificates
b. Symmetric key technology and digital signatures
c. Public key technology and digital certificates
d. Cryptographic key technology and electronic signatures
C. Binding an individual’s identity to the public key corresponds
to the protection afforded to the individual’s private signature key.
Digital certificates are used in this process.
Public key technology and digital certificates do not provide which of the following security services?
a. Authentication
b. Nonrepudiation
c. Availability
d. Data integrity
C. Public key technology and digital certificates can be used to
support authentication, encryption, nonrepudiation, and data integrity,
but not availability.
Quantum cryptography could be a possible replacement for public key algorithms used in which of the following computing environments?
a. Utility computing
b. On-demand computing
c. Quantum computing
d. Virtual computing
C. Quantum cryptography is related to quantum computing
technology, but viewed from a different perspective. Quantum
cryptography is a possible replacement for public key algorithms that
hopefully will not be susceptible to the attacks enabled by quantum
computing.
Quantum computing deals with large word size quantum computers in
which the security of integer factorization and discrete log-based
public-key cryptographic algorithms would be threatened. This would
be a major negative result for many cryptographic key management
systems that rely on these algorithms for the establishment of
cryptographic keys. Lattice-based public-key cryptography would be
resistant to quantum computing threats.
Utility computing means allowing users to access technology-based
services without much technical knowledge. On-demand computing
deals with providing network access for self-services. Virtual
computing uses virtual machine with software that allows a single host
to run one or more guest operating systems. Utility computing, on demand computing, and virtual computing are part of cloud
computing.
Which of the following is good practice for organizations issuing digital certificates?
a. Develop a consulting agreement.
b. Develop an employment agreement.
c. Develop a subscriber agreement.
d. Develop a security agreement.
C. Prior to issuance of digital certificates, organizations should
require a “subscriber agreement” in place that the subscriber manually
signs. This agreement describes his obligations to protect the private
signature key, and to notify appropriate authorities if it is stolen, lost,
compromised, unaccounted for, or destroyed. Often the provisions of a
subscriber agreement can be placed into other documents such as an
employment contract or security agreement.
Which of the following is required to accept digital certificates from multiple vendor certification authorities?
a. The application must be PKI-enabled.
b. The application must be PKI-aware.
c. The application must use X.509 Version 3.
d. The application must use PKI-vendor plug-ins.
C. Using the X.509 Version 3 standard helps application programs
in accepting digital certificates from multiple vendor CAs, assuming
that the certificates conform to consistent Certificate Profiles.
Application programs either have to be PKI-enabled, PKI-aware, or
use PKI vendor plug-ins prior to the use of X.509 Version 3 standard.
Version 3 is more interoperable so that an application program can
accept digital certificates from multiple vendor certification
authorities. Version 3 standard for digital certificates provides specific
bits that can be set in a certificate to ensure that the certificate is used
only for specific services such as digital signature, authentication, and
encryption.
Which of the following is primarily required for continued functioning of a public key infrastructure (PKI)?
a. Disaster recovery plans
b. Service level plans
c. Fraud prevention plans
d. Legal liability plans
A. At a minimum, organizations should consider establishing
backup and recovery sites for their key PKI components (RA, CA, and
Directories) that supply the services necessary for application
programs to use certificates. A PKI is an infrastructure, like a highway.
By itself, it does little. It is useful when application programs employ
the certificates and services that it supports. The PKI is a combination
of products, services, software, hardware, facilities, policies,
procedures, agreements, and people that provide for and sustain secure
interactions on open networks such as the Internet. The other three
choices are the side effects of using a PKI, which also needs to be
developed.
Which of the following can mitigate threats to integrity when public key cryptography is used?
a. Data checksums and secure hashes
b. Public key signatures and secure hashes
c. Cyclic redundancy checks and secure hashes
d. Simple checksums and secure hashes
B. Public key cryptography verifies integrity by using public key
signatures and secure hashes. A secure hash algorithm (SHA) is used
to create a message digest (hash). The hash can change if the message
is modified. The hash is then signed with a private key. The hash may
be stored or transmitted with the data. When the integrity of the data is
to be verified, the hash is recalculated, and the corresponding public
key is used to verify the integrity of the message.
Which of the following mitigate threats to nonrepudiation?
a. Secure hashes
b. Message digest 4
c. Message digest 5
d. Digital signatures and certificates
D. Data is electronically signed by applying the originator’s
private key to the data. The resulting digital signature can be stored or
transmitted with the data. Any party using the public key of the signer
can verify the signature. If the signature is verified, then the verifier
has confidence that the data was not modified after being signed and
that the owner of the public key was the signer. A digital certificate
binds the public key to the identity of the signer.
Regarding data sanitization practices in a cloud computing environment, which of the following is affected most when data from one subscriber is physically commingled with the data of other subscribers?
a. Data at rest
b. Data in transit
c. Data in use
d. Data to recover
D. The data sanitization practices have serious implications for
security and data recovery in the cloud computing environment and are
most affected. Sanitization is the removal of sensitive data from a
storage device such as (i) when a storage device is removed from
service or moved elsewhere to be stored, (ii) when residual data
remains upon termination of service, and (iii) when backup copies are
made for recovery and restoration of service. Data sanitization matters
can get complicated when data from one subscriber is physically
commingled with the data of other subscribers. It is also possible to
recover data from failed drives (for example, hard drives and flash
drives) that are not disposed of properly by cloud providers.
Procedures for protecting data at rest are not as well standardized in a
cloud computing environment. Cryptography can be used to protect
data in transit. Trust mechanisms such as requiring service contracts
and performing risk assessments can protect data in use because this is
an emerging area of cryptography.
Which of the following provides a unique user ID for a digital certificate?
a. User name
b. User organization
c. User e-mail
d. User message digest
D. The digital certificate contains information about the user’s
identity (for example, name, organization, and e-mail), but this
information may not necessarily be unique. A one-way (hash) function
can be used to construct a fingerprint (message digest) unique to a
given certificate using the user’s public key.
Which of the following is not included in the digital signature
standard (DSS)?
a. Digital signature algorithm (DSA)
b. Data encryption standard (DES)
c. Rivest, Shamir, and Adelman algorithm (RSA)
d. Elliptic curve digital signature algorithm (ECDSA)
B. DSA, RSA, and ECDSA are included in the DSS that specifies
a digital signature used in computing and verifying digital signatures.
DES is a symmetric algorithm and is not included in the DSS. DES is a
block cipher and uses a 56-bit key.
DES has been replaced by advanced encryption standard (AES) where
the latter is preferred as an encryption algorithm for new products. The
AES is a symmetric key encryption algorithm to protect electronic data
as it is fast and strong due to its Key-Block-Round combination. The
strength of DES is no longer sufficient
What keys are used to create digital signatures?
a. Public-key cryptography
b. Private-key cryptography
c. Hybrid-key cryptography
d. Primary-key cryptography
A. Public-key cryptography has been recommended for
distribution of secret keys and in support of digital signatures. Privatekey cryptography has been recommended for encryption of messages
and can be used for message integrity check computations. Hybrid
keys combine the best of both public and private keys. Primary keys
are used in database design and are not relevant here.
Elliptic curve systems are which of the following?
1. Asymmetric algorithms
2. Symmetric algorithms
3. Public-key systems
4. Private-key systems
a. 2 and 3
b. 1 and 3
c. 2 and 4
d. 1 and 4
B. Elliptic curve systems are public-key (asymmetric)
cryptographic algorithms. DES is private-key (symmetric)
cryptographic algorithms.
Data encryption standard (DES) cannot provide which of the following security services?
a. Encryption
b. Access control
c. Integrity
d. Authentication
D. Data encryption standard (DES) provides encryption, access
control, integrity, and key management standards. It cannot provide
authentication services. The DES is a cryptographic algorithm
designed for access to and protection of unclassified data. Because the
original “single” DES is insecure, the Triple DES should be used
instead.
The elliptic curve system uses which of the following to create digital signatures?
a. Hash algorithm
b. Prime algorithm
c. Inversion algorithm
d. Linear algorithm
A. The elliptic curve systems are used to create digital signatures
with a hash algorithm such as SHA-1 (160-bit key). The SHA-1 is used
to generate a condensed representation of a message called a message
digest. SHA-1 is a technical revision of SHA. A secure hash algorithm
(SHA) is used to generate a condensed message representation called a
message digest. SHA is used by PGP or GNU PGP to generate digital
signatures.
Which of the following clearly defines end-to-end encryption?
1. Encryption at origin
2. Decryption at destination
3. Visible routing information
4. No intermediate decryption
a. 1 and 2
b. 3 and 4
c. 1, 2, and 3
d. 1, 2, 3, and 4
D. End-to-end encryption refers to communications encryption in
which data is encrypted when being passed through a network (i.e.,
encryption at origin and decryption at destination) but routing
information remains visible without intermediate decryption. End-to end encryption is safe as end-to-end security in that information is
safeguarded from point of origin to point of destination.
Which one of the following provides data integrity?
a. Cyclic redundancy checks
b. Digitized signatures
c. Passwords and PINs
d. Biometrics
A. A cyclic redundancy check (CRC) can be used to verify the
integrity of data transmitted over a communications line. Passwords,
PINs, and biometrics can be used to authenticate user identity.
Digitized signatures do not provide data integrity because they are
simply created by scanning a handwritten signature.
Symmetric key algorithms are ideally suited for which of the following?
a. Authentication
b. Integrity
c. Confidentiality
d. Nonrepudiation
C. Symmetric key cryptography is a class of algorithms where
parties share a secret key. These algorithms are primarily used to
achieve confidentiality but may also be used for authentication,
integrity, and limited nonrepudiation services.
Which of the following is the most efficient way of handling the redundancy built into the encrypted messages in detecting transmission errors?
a. Using cyclic redundancy check (CRC) polynomial code
b. Using CRC code
c. Using Hamming code
d. Using parity bit code
C. As part of controls, all encrypted messages must contain some
redundancy as part of the message but have no meaning to the
message, such as cryptographic hash or a Hamming code, to do error
detection or correction to make the attacker work harder. The
redundancy should not be in the form of “n” zeros at the start or end of
a message because they yield predictable results to the attacker.
Hamming code is based on Hamming distance, which is the number of
bit positions in which two codewords differ. The codeword contains
both data and check bits. The goal is to keep the Hamming distance
shorter.
The cyclic redundancy code (CRC) is also known as the polynomial
code, which is based on treating bit strings as representations of
polynomials with coefficients of 0 and 1 only. Checksums based on
CRC are not effective in detecting errors because it yields undetected
errors due to the lack of random bits in the checksums. The CRC uses
an algorithm for generating error detection bits in a data link protocol.
The receiving station performs the same calculation as done by the
transmitting station. If the results differ, then one or more bits are in
error. CRC is not a cryptographically secure mechanism unlike a
cryptographic hash or message authentication code (MAC). Hence,
CRC is least effective in verifying against malicious tampering of data.
The parity bit code is not as effective as the Hamming code because
the former is used to detect single errors whereas the latter is used to
detect both single and burst errors. Hence, the Hamming code is the
most efficient way of detecting transmission errors.
For large volumes of data, asymmetric-key cryptography is not efficient to support which of the following?
a. Authentication
b. Confidentiality
c. Integrity
d. Nonrepudiation
B. Asymmetric key algorithms are used to achieve authentication,integrity, and nonrepudiation, and not to support confidentiality for handling large volumes of data efficiently. These algorithms are used
to perform three operations such as digital signatures, key transport,and key agreement. Although the asymmetric key is not efficient tohandle large volumes of data, it can be used to encrypt short messages,
thus providing for confidentiality for short messages. The asymmetrickey (public key) is an encryption system that uses a public-private keypair for encrypting/decrypting data and for generating/verifying digital
signature.
The secure hash algorithm (SHA) and hash-based message authentication code (HMAC) provide the basis for which of the following?
a. Data integrity
b. Confidentiality
c. Authentication
d. Nonrepudiation
A. The secure hash algorithm (SHA) and hash-based message
authentication code (HMAC) provide the basis for data integrity in
electronic communications. They do not provide confidentiality and
are a weak tool for authentication or nonrepudiation.
Which of the following is not part of public key infrastructure (PKI) data structures?
a. Public key certificate
b. Certificate revocation lists
c. Attribute certificate
d. Subject certificate
D. Two basic data structures are used in PKIs. These are the public
key certificates and the certificate revocation lists (CRLs). A third data
structure, the attribute certificate, may be used as an addendum. The
certificate authority (CA) issues a public key certificate for each
identity confirming that the identity has the appropriate credentials.
CAs must also issue and process CRLs, which are lists of certificates
that have been revoked. The X.509 attribute certificate binds attributes
to an attribute certificate holder. This definition is being profiled for
use in Internet applications. Subject certificate is meaningless here.
Which of the following is an example of asymmetric encryption algorithm?
a. DH
b. DES
c. 3DES
d. IDEA
A. The concept of public-key cryptography (asymmetric
encryption algorithm) was introduced by Diffie-Hellman (DH) to solve
the key management problem with symmetric algorithms. The other
three choices are incorrect because they are examples of symmetric
encryption algorithms.
Which of the following are examples of cryptographic hash functions?
a. SHA and 3DES
b. DES and CBC
c. MD5 and SHA-1
d. DAC and MAC
C. Both message digests 4 and 5 (MD4 and MD5) are examples of
hashing algorithms. They are effective when they work with SHA-1
algorithms. Cryptographic hash functions such as MD5 and SHA-1
execute much faster and use less system resources than typical
encryption algorithms. The other three choices are not relevant here.
Which of the following statement is true about hash functions?
a. They produce a larger message digest than the original message.
b. They produce a much smaller message digest than the original
message.
c. They produce the same size message digest as the original
message.
d. They produce a much larger message digest than the original
message.
B. Hash functions produce a much smaller message digest than the
original message. Encrypting them saves time and effort and improves
performance.
Which of the following is the best technique to detect duplicate transactions?
a. ECDSA and SHA
b. ECDSA and SHA-1
c. ECDSA and MID
d. ECDSA and MD5
C. When the elliptic curve digital signature algorithm (ECDSA) is
used with a message identifier (MID), it provides the capability of
detecting duplicate transactions. The MID operates on checking the
sequence number of transactions.
Countermeasures against replay attacks do not include which of the following?
a. Time-stamps
b. Protocols
c. Nonces
d. Kerberos
B. The term “protocols” is too generic to be of any use. A replay
attack refers to the recording and retransmission of message packets in
the network. Nonces are random numbers that are unique and fresh
each time of use. Kerberos and timestamps go hand-in-hand.
A cryptographic module is undergoing testing. Which of the following provides the highest level of testing?
a. Algorithm level
b. Module level
c. Application level
d. Product level
C. The highest level of testing occurs at the application or system
level. This level is also called certification testing. Algorithm level and
module level are incorrect because they provide low-level testing.
Product level is incorrect because it is the next higher level above
algorithm and module level testing.
For message digests to be effectively used in digital certificates, what must they be?
a. Access-resistant
b. Authorization-resistant
c. Collision-resistant
d. Attack-resistant
C. Message digests are used in cryptography to verify digital
signatures and to ensure data integrity. A unique user ID is determined
by constructing the hash of the client’s certificate using a trusted
algorithm. For the user ID to be unique, you must have reasonable
certainty that another client’s certificate will not hash to the same
value. This requirement is satisfied as long as the hash function is
sufficiently collision-resistant.
A hash function is which of the following?
a. One-to-one function
b. One-to-many function
c. Many-to-one function
d. Many-to-many function
C. A hash function is a many-to-one function that takes an
arbitrary-length-input message and constructs a fixed-length output
digest.
Which of the following is implemented in the Version 3 of X.509 protocol?
a. SSL
b. Regular MIME
c. SHA
d. S/MIME
D. Secure Multipurpose Internet Mail Extensions (S/MIME) is an
open standard where e-mail messages can be digitally signed.
Validating the signature on the e-mail can help the recipient know with
confidence who sent it and that it was not altered during transmission
(i.e., nonrepudiation). Previous versions are implemented in the regular
MIME. Both SSL and SHA are not relevant here.
Which of the following is used to encrypt the Internet Protocol (IP) Packets?
a. PPTP
b. HTTP
c. IPsec
d. PPP
C. Internet Protocol security (IPsec) is a protocol that operates
within the Internet protocol (IP). The IP transmits and routes messages,
breaks large messages into smaller sizes on one end, and reassembles
them into the original message on the other end. IP accomplishes these
tasks using the IP header, which is inserted at the beginning of each
packet. Point-to-point tunneling protocol (PPTP) hides information in
IP packets. Hypertext transfer protocol (HTTP) is a connection oriented protocol that uses transmission control protocol (TCP) to
carry Web traffic between a computer’s Web browser and the Web
server being accessed. Point-to-point protocol (PPP) is used in router to-router traffic and home user-to-ISP traffic.
Which one of the following encryption keys is slow?
a. Symmetric
b. Asymmetric
c. Semi-symmetric
d. Semi-asymmetric
B. Asymmetric keys (public keys) by definition are slow and
suitable for encrypting and distributing keys and for providing
authentication. On the other hand, symmetric (private keys) are faster
and suitable for encrypting files and communication channels.
Most cryptographic attacks focus on which of the following?
a. Cryptographic keys
b. Cryptographic passwords
c. Cryptographic parameters
d. Cryptographic PINs
C. A cryptographic module’s critical security parameters (CSPs)
contain keys, passwords, personal identification numbers (PINs), and
other information. CSPs are vulnerable to attacks.
Which of the following symmetric key block cipher algorithms provide authentication services?
a. ECB
b. CBC
c. CBC-MAC
d. CFB
C. In the Advanced Encryption Standard (AES), there are five
modes that can provide data confidentiality and one mode that can
provide data authentication. The confidentiality modes are the
Electronic Codebook (ECB), Cipher Block Chaining (CBC), Cipher
Feedback (CFB), Output Feedback (OFB), and Counter (CTR) modes.
The authentication mode is the Cipher Block Chaining-Message
Authentication Code (CBC-MAC) mode.
Hash-based message authentication code (HMAC) is heavily used in which of the following?
a. PPP operations
b. SET operations
c. IPsec operations
d. PPTP operations
C. Hash-based message authentication code (HMAC) provides
message integrity and is fast and therefore heavily used in IPsec
operations because of little or no overhead. It requires limited system
resources to operate. HMAC uses a key in combination with the hash
function to produce a message digest. It can be used with a hash
function in combination with a secret key. The other three choices are
not relevant here.
Which of the following statements is true about truncation of a message digest in cryptographic applications?
a. Smaller message digest length is applied to the data to be
hashed, and the resulting digest is truncated at the rightmost bits.
b. Larger message digest length is applied to the data to be hashed,
and the resulting digest is truncated at the leftmost bits.
c. Smaller message digest length is applied to the data to be
hashed, and the resulting digest is truncated at the leftmost bits.
d. Larger message digest length is applied to the data to be hashed,
and the resulting digest is truncated at the rightmost bits.
B. Some cryptographic applications may require a hash function
with a message digest length different than those allowed in standards.
In such cases, a truncated message digest may be used, whereby a hash
function with a larger message digest length is applied to the data to be
hashed, and the resulting message digest is truncated by selecting an
appropriate number of the leftmost bits. The least significant bit is the
rightmost bit of a bit string. The leftmost bit is the most significant bit.
Secure hash algorithms enable the determination of which of the following?
a. Message confidentiality
b. Message integrity
c. Message availability
d. Message identity
B. Secure hash algorithms (for example, SHA-224, 256,384, and
512) are used to hash a message. These algorithms enable the
determination of a message’s integrity; meaning any change to the
message results in a different message digest. SHA and SHA-1 should
not be used because they are not secure. Message identity is a field (for
example a sequence number) that may be used to identify a message.
Which of the following is not usually seen on a digital certificate?
a. Owner name
b. Public key
c. Effective dates for keys
d. Insurance company name
D. The information on the digital certificate includes the owner
name, public key, and start and end dates of its validity. The certificate
should not contain any owner information that changes frequently (for
example, the insurance company name).
What is the major requirement for a public key certification authority?
a. It must be independent.
b. It must have a proper contract.
c. It must be trusted.
d. It must have a good reputation.
C. A public key certificate is a credential that binds a key pair and
the identity of the owner of the key (i.e., to a legal person). The
necessary trust may come from several sources such as the role and
independence of the certification authority, reputation, contract,
management integrity, and other legal obligations.
Which of the following statements is true about elliptic curve cryptography?
a. It uses an asymmetric-key algorithm.
b. It competes with the Whitfield-Diffie algorithm.
c. It competes with the digital signature algorithm.
d. It uses a symmetric-key algorithm.
A. The elliptic curve is well suited for low bandwidth systems and
uses an asymmetric-key algorithm for encryption. The Rivest, Shamir,
and Adelman (RSA) and elliptic curve algorithms are used for
encryption, where the latter is a new one with shorter key lengths and
is less computationally intensive. The Whitfield-Diffie algorithm is
used for secure key exchange. The digital signature algorithm is used
only for digital signatures. Both Whitfield and digital signatures do not
compete with elliptic curve.
What is the best way to encrypt data?
a. Bulk encryption
b. Link encryption
c. Transaction encryption
d. End-to-end encryption
B. There are two modes of implementation of encryption in a
network, namely link (online) and end-to-end. Link encryption
encrypts all the data along a communications path (for example, a
satellite link, telephone circuit, or T1 line) and encrypts both headers
and trailer of the packet, which is the best thing to do. It provides good
protection against external threats such as traffic analysis because all
data flowing on links can be encrypted, including addresses and
routing information. Although a major advantage of link encryption is
that it is easy to incorporate into network protocols at the lower levels
of the OSI model, a major disadvantage is that it encrypts and decrypts
a message several times at each link or node in the clear text, thus
leading to node compromise.
Bulk encryption is simultaneous encryption of all channels of a
multichannel telecommunications trunk. Transaction encryption is
used in the payment card industry, perhaps using secure electronic
transaction (SET) protocol for secure transactions over the Internet.
In end-to-end encryption, a message is encrypted and decrypted only at
endpoints, does not encrypt headers and trailers, and operates at the
higher levels of the OSI model, thereby largely circumventing
problems that compromise intermediate nodes. In this type of
encryption, routing information remains visible and is a potential risk.
What is the correct sequence of keys in a triple data encryption standard (3DES) algorithm operating with three keys?
a. Encrypt-decrypt-encrypt
b. Decrypt-encrypt-decrypt
c. Encrypt-encrypt-encrypt
d. Decrypt-decrypt-decrypt
C. With three keys operating, the sequence is encrypt-encrypt encrypt, that is, one key is used for each mode of operation. Encrypt decrypt-encrypt is incorrect because it is an example of operating with
two keys where the first key is used to encrypt, the second key is to
decrypt, and the first key again to encrypt. The other two choices are
not meaningful here.
Which of the following is best qualified to evaluate the security of Public Key Infrastructure (PKI) systems and
procedures?
a. Certification authorities
b. Registration authorities
c. Trusted third parties
d. Subscribers
C. Trusted third parties, who are independent of the certification
and registration authorities and subscribers and who are employed by
independent audit or consulting organizations are good candidates to
conduct security evaluations (for example, reviews and audits) of the
PKI systems and procedures. A written report is published after the
security evaluation. A certification authority is a person or institution
that is trusted and can vouch for the authenticity of a public key. The
authority can be a principal or a government agency that is authorized
to issue a certificate. A registration authority manages the certificate
life cycle in terms of maintenance and revocation. Subscribers include
both individuals and business organizations that use the certificate in
their businesses.
Which of the following statements is not true about Secure
Sockets Layer (SSL)?
a. It uses both symmetric and asymmetric key cryptography.
b. It is used to perform authentication.
c. It is a point-to-point protocol.
d. It is a session-oriented protocol.
C. Secure sockets layer (SSL) uses a combination of symmetric
and asymmetric key cryptography to perform authentication and
encryption services. It is a session-oriented protocol used to establish a
secure connection between the client and the server for a particular
session. SSL is not a point-to-point protocol.
The two protocol algorithms used in cryptographic applications for compressing data are which of the following?
a. SHA1 and MD5
b. 3DES and IDEA
c. DSA and DSS
d. RSA and SKIPJACK
A. The secure hash algorithm (SHA1) produces a 160-bit hash of
the message contents. Message digest 5 (MD5) produces a 128-bit
hash of the message contents. Many cryptographic applications
generate and process both SHA1 and MD5. These are faster and take
less space to store data. The algorithms mentioned in the other three
choices do not have the ability to compress data. 3DES uses a 168-bit
key
Which of the following statements is not true about asymmetric-key cryptography?
a. It is used to provide an authentication service.
b. It is used to provide a digital signature service.
c. It can be used to encrypt large amounts of data.
d. It can be used to provide nonrepudiation service.
C. A disadvantage of asymmetric-key cryptography is that it is much slower than symmetric-key cryptography and is therefore impractical or efficient for use in encrypting large amounts of data. The other three choices are examples of advantages of using the asymmetric-key cryptography.
What is the major purpose of a digital certificate?
a. To achieve the availability goal
b. To maintain more information on the certificate
c. To verify the certificate authority
d. To establish user and device authentication
D. Digital certificates are used as a means of user and device
authentication. Entities can prove their possession of the private key by digitally signing known data or by demonstrating knowledge of a secret exchanged using public-key cryptographic methods.
For integrity protection, most Internet Protocol security
(IPsec) implementations use which of the following algorithms?
1. SHA-1
2. MD5
3. HMAC-SHA-1
4. HMAC-MD5
a. 1 only
b. 2 only
c. 1 and 2
d. 3 and 4
D. Both HMAC-SHA-1 and HMAC-MD5 algorithms are stronger than SHA-1 or MD5, either alone or together, because they use hash based message authentication codes (HMACs). Both the SHA-1 and MD5 algorithms are weaker by themselves.
Which of the following methods provide the highest level of
security to protect data access from unauthorized people?
a. Encryption
b. Callback or dial-back systems
c. Magnetic cards with personal identification number
d. User ID and password
A. Encryption provides the highest level of security to protect data access from unauthorized people. It is the process of transforming data to an unintelligible form in such a way that the original data either cannot be obtained (one-way encryption) or cannot be obtained without using the inverse decryption process (two-way encryption). It is difficult to break the encryption algorithm and the keys used in that
process. Callback or dial-back systems and magnetic cards with personal identification numbers provide medium protection, whereas user identification numbers and passwords provide minimum protection. Callback systems can be negated through the use of call forwarding features in a telephone system. Magnetic cards can be lost, stolen, or
counterfeited. User IDs and passwords can be shared with others or guessed by others, a control weakness.
To achieve effective security over transmission, what is the
best area where stronger encryption can be applied the most?
a. Packet level
b. Record level
c. File level
d. Field level
D. Encryption can protect anything from one message field to an entire message packet in the transmission over network lines. Because the message field is the lowest level element and an important element in terms of message content and value, security is effective and enhanced. Here, encryption is focused on where it matters the most.
Note that the field-level encryption is stronger than file-, record-, and packet-level encryption although encryption can be applied at each of these levels.
What is the least powerful method of protecting confidential
data or program files?
a. Scrambling the data
b. Encoding the data before transmission
c. Decoding the data after transmission
d. Using passwords and other identification codes
D. Use of passwords and other identification codes is not powerful due to their sharing and guessable nature. Scrambling, encoding, and decoding are cryptographic methods used in data transmission. Encryption is used in scrambling, encoding (encrypting), and decoding (decrypting) of data. Encryption is the process of transforming data to
an unintelligible form in such a way that the original data either cannot be obtained (one way encryption) or cannot be obtained without using the inverse decryption process (two-way encryption). Authorized users of encrypted computer data must have the key that was used to encrypt the data to decrypt it. The unique key chosen for use in a particular application makes the results of encrypting data using the algorithm unique. Using a different key causes different results. The cryptographic security of the data depends on the security provided for the keys used to encrypt and decrypt the data.
What is the best technique to thwart network masquerading?
a. Dial-back technique
b. Dial-forward technique
c. File encryption only
d. Dial-back combined with data encryption
D. Personal computers (PCs) are in increasing use as computer terminal devices are connected to larger host systems and when two or more PCs are connected to networks. Information transmitted over unprotected telecommunications lines can be intercepted by someone
masquerading as an authorized user, thereby actively receiving sensitive information. Encryption can be adapted as a means of remote user authorization. A user key, entered at the keyboard, authenticates the user. A second
encryption key can be stored in encrypted form in the calling system firmware that authenticates the calling system as an approved communications endpoint. When dial-back is used with two-key encryption, data access can be restricted to authorized users (with the user key) with authorized systems (those whose modems have the correct second key), located at authorized locations (those with phone numbers listed in the answering system’s phone directory). Dial-back technique alone cannot guarantee protection against
masquerading because hackers can use the dial-forward technique to reroute calls and spoof the connection. File encryption only may not be adequate because an intruder may have an opportunity to intercept the key while it is in transit. Managing the encryption key is critical.
Which of the following describes message authentication
correctly?
a. A process of guaranteeing that the message was sent as received
by the party identified in the header of the message.
b. A process of guaranteeing that the message was sent as received
by the party identified in the footer of the message.
c. A process of guaranteeing that the message sent was received at
the same time regardless of the location.
d. A process of guaranteeing that all delivered and undelivered
messages are reconciled immediately.
A. Message authentication is a process for detecting unauthorized changes made to data transmitted between users or machines or to data retrieved from storage. Message authentication keys should receive greater protection. It is the message header not the footer that identifies the receiving party of the message. There will be some delay for the messages to be transmitted and received, especially to remote, foreign destinations. Undelivered message reports may be produced at specific time intervals, not immediately.
What is the control technique that best achieves confidentiality of data in transfer?
a. Line encryption
b. One-time password
c. File encryption
d. End-to-end encryption
A. Here, the communication link from a user site to a CPU
computer is encrypted to provide confidentiality. Line encryption protects data in a transfer. One-time password is incorrect because it ensures that a particular password is used only once, in connection with a specific transaction.
It is similar to the one-time key used in the encryption process. The one-time password protects data in process.
File encryption is incorrect because it protects only the file in storage, not the entire communication line where the data transfer is taking place. File encryption protects data in storage. The end-to-end encryption is incorrect because it is applied to messages on the communication line twice, once by hardware and once by software techniques.
- Which of the following provides both integrity and
confidentiality services for data and messages?
a. Digital signatures
b. Encryption
c. Cryptographic checksums
d. Granular access control
B. An encryption security mechanism provides security services such as integrity, confidentiality, and authentication. The data and message integrity service helps to protect data and software on workstations, file servers, and other local-area network (LAN) components from unauthorized modification, which can be intentional or accidental.
The use of cryptographic checksums and granular access control and privilege mechanisms can provide this service. The more granular the access control or privilege mechanism, the less likely an unauthorized or accidental modification can occur. The data and message integrity service also helps to ensure that a message is not altered, deleted, or added to in any manner during transmission. A message authentication code, which is a type of cryptographic checksum, can protect against both accidental and intentional but not against unauthorized data modification. The use of digital signatures can also be used to detect the modification of data or messages. It uses either public key or private key cryptography. A digital signature provides two distinct services: nonrepudiation and
message integrity. The message authentication code can also be used to provide a digital signature capability. Nonrepudiation helps ensure that the parties or entities in a communication cannot deny having participated in all or part of the communication.
Which of the following independent statements is not true
about security?
a. The security of the cryptography can never be greater than the
security of the people using it.
b. The security of any electronic-mail program cannot be greater
than the security of the machine where the encryption is performed.
c. The security of an encryption algorithm is no more or less than
the security of the key.
d. The security of each electronic-mail message is encrypted with a
standard, nonrandom key.
D. Each electronic-mail message is encrypted with its own unique key. The security program generates a random key and uses it to encrypt the message. It is true that the security of the cryptography can never be greater than the security of the people using it because it is the people who make the security a success, security of any electronic-mail program cannot be greater than the security of the machine where the encryption is performed because security is an
extension of the machine, and (iii) security of an encryption algorithm is no more or less than the security of the key because it assumes that the algorithm used is a good one.
Which of the following statements about encryption is not
true?
a. Software encryption degrades system performance.
b. Hardware encryption is faster.
c. Encryption is a desirable option in a local-area network.
d. Key management is an administrative burden.
C. Encryption is a desirable option in mainframe but not in a local area network (LAN) environment due to performance problems. Although hardware-based encryption is faster, it degrades system performance as found in software-based encryption. In addition, keys used in the encryption require management’s attention in terms of key distribution and disposition. Therefore, encryption is not a desirable option for LANs. As the capacity of CPU processors increase, it could become a desirable option for LANs for mitigating insider risks.
Which of the following encryption schemes is more secure?
a. Encrypting once with the same key
b. Encrypting twice with the same key
c. Encrypting twice with two keys
d. Multiple encryptions with different keys
D. Any encryption scheme can be made more secure through multiple encryptions with different keys. Similarly, a triple encryption is stronger than a double or single encryption. However, costs and overhead increase as the number of encryptions increase. Also, system performance degrades as the number of encryptions increase. For example, 2DES encryption with two keys is no more secure than a 1DES encryption due to the possibility of the meet-in-the middle attack. Therefore, 3DES (triple DES) should be considered.
Which of the following technologies are required to ensure
reliable and secure telecommunications networks?
a. Cryptography and trusted encryption keys
b. Advanced identification and authentication techniques and cryptography
c. Firewalls, cryptography, and trusted encryption keys
d. Cryptography, advanced identification and authentication
techniques, firewalls, and trusted encryption keys
D. Secure and reliable telecommunications networks must have effective ways for authenticating information and assuring the confidentiality of information. There is no single technology or technique that can produce the needed security and reliability of networks. A range of technologies, including cryptography, improved identification and authentication technologies, and firewalls will be required, along with trusted encryption keys and security Management infrastructures.
Which of the following should not be subject to review during
a periodic review of a cryptographic system?
a. Parameters
b. Operations
c. Keys
d. Controls
C. A cryptographic system should be monitored and periodically reviewed to ensure that it is satisfying its security objectives. All parameters associated with correct operation of the cryptographic system should be reviewed, and operation of the system itself should be periodically tested and the results evaluated. Certain information,
such as secret keys or private keys in public key systems, should not be subject to review. However, nonsecret or nonprivate keys could be used in a simulated review procedure. Physical protection of a cryptographic module is required to prevent physical replacement or modification of the cryptographic system.
Which of the following threats is not addressed by digital
signatures and random number challenges?
a. Masquerade
b. Replay attacks
c. Password compromise
d. Denial-of-service
D. Denial-of-service (DoS) is any action or series of actions that prevent any part of a system from functioning in accordance with its intended purpose. This includes any action that causes the unauthorized destruction, modification, or delay of service. By using a private key to generate digital signatures for authentication, it becomes computationally infeasible for an attacker to masquerade as
another entity. Using random number challenges (tokens) and digital signatures eliminates the need for transmitting passwords for authentication, thus reducing the threat of their compromise. The use of random number challenges also prevents an intruder from copying an authentication token signed by another user and replaying it successfully at a later time. However, a new random number challenge
should be generated for each authentication exchange.
Electronic signatures and handwritten signatures are useful in their own ways. Which of the following statements is not true about these two types of signatures?
a. Both signatures have the same legal status.
b. Both signatures are subject to forgery with equal difficulty.
c. Both signatures link a document with a particular person.
d. Both signatures are subject to trickery or coercion.
B. An electronic signature is a cryptographic mechanism that
performs a similar function to a handwritten signature. It is used to verify the origin and contents of a message. For example, a recipient of data (such as an e-mail message) can verify who signed the data and that the data was not modified after being signed. This also means that the originator (for example, sender of an e-mail message) cannot falsely deny having signed the data. Electronic signatures are difficult to forge; although, written signatures are easily forged. Electronic signatures can use either secret (private) key or public key cryptography; however, public key methods are generally easier to use. The other three choices are incorrect because they are true statements. In general, electronic signatures have received the same legal status as
that of written signatures. Cryptography can provide a means of linking a document with a particular person, as is done with a written signature. Electronic signatures rely on the secrecy of the keys, the link or binding between the owner of the key, and the key itself. If a key is compromised due to social engineering by theft, coercion, or trickery,
then the electronic originator of a message may not be the same as the owner of the key. Although the binding of cryptographic keys to actual people is a significant problem, it does not necessarily make electronic signatures less secure than written signatures. Trickery and coercion
are problems for written signatures as well.
Which of the following security services or statements is not
true about the U.S. digital signature standard (DSS)?
a. It generates a digital signature.
b. It does not require a third-party certificate.
c. It assures nonrepudiation of a message.
d. It verifies a digital signature.
B. A digital signature provides two distinct services:
nonrepudiation and message integrity. The digital signature standard (DSS) specifies a digital signature algorithm (DSA) that should be used when message and data integrity is required. The DSA digital signature is a pair of large numbers represented in a computer as strings of binary digits. The digital signature is computed using a set of
rules (i.e., the DSA) and a set of parameters such that the identity of the signatory and the integrity of the data can be verified. The DSA provides the capability to generate and verify digital signatures. Signature verification makes use of a public key that corresponds to, but is not the same as, the private key. Each user possesses a private and public key pair. It is assumed that the public knows about public keys. Private keys are never shared. Anyone can verify the signature of a user by employing that user’s public key. Only
the possessor of the user’s private key can perform signature generation. Because of this, nonrepudiation of a message is achieved. This means that the parties to an electronic communication could not dispute having participated in the communication, or it can prove to a
third party that data was actually signed by the generator of the signature. The DSS can be implemented in hardware, software, and/or firmware and is subject to U.S. Commerce Department export controls. The DSS technique is intended for use in electronic mail, electronic funds transfer, electronic data interchange, software distribution, data
storage, and other applications that require data integrity assurance and origin authentication. A digital signature system requires a means for associating pairs of public and private keys with the corresponding users. A mutually
trusted third party such as a certifying authority can bind a user’s identity and his public key. The certifying authority could issue a “certificate” by signing credentials containing a user’s identity and public key. Hence, a third-party certificate is needed.
Pretty good privacy (PGP) and privacy enhanced mail (PEM) are electronic-mail security programs. Which of the following statements is not true about PGP and PEM?
a. They both encrypt messages.
b. They both sign messages.
c. They both have the same uses.
d. They are both based on public-key cryptography.
C. Both pretty good privacy (PGP) and privacy enhanced mail
(PEM) encrypt messages and sign messages based on public-key cryptography. However, they operate on different philosophies. PGP is based on a distributed network of individuals. PEM is based on the concept of a hierarchical organization. PGP is suited for individuals communicating on the Internet, whereas PEM might be more suited for application systems in all organizations. PGP is a product, not a standard. It does not interoperate with any other security product, either PEM or non-PEM. PGP is portable to a wide variety of hardware platforms.
It is particularly important to protect audit trail data against
modification during communication between parties. Which of the following security control techniques would protect against such modifications?
a. Strong access controls, such as passwords
b. Digital signatures
c. Logging before and after image records of modifications
d. Review of audit trail data
B. A digital signature is a cryptographic checksum computed as a function of a message and a user’s private key. A user’s digital signature varies with the data and protects against modification. This does not prevent deletion or modification of the audit trail, but it provides an alert that the audit trail has been altered. Access to online audit logs should be strictly controlled Passwords are not strong access controls due to their weaknesses, such as sharing or writing them down. Logging before and after image records of modification is incorrect because it is a passive activity and
does not protect against modification. Audit trail data can be used to review what occurred after an event, for periodic reviews, and for real time analysis.
Cryptography is a branch of mathematics based on the
transformation of data. Which of the following is not a true
statement about cryptography used in computer security?
a. Cryptography ensures data confidentiality.
b. Cryptography ensures data integrity.
c. Cryptography ensures data availability.
d. Cryptography ensures electronic signatures.
C. Cryptography, a hidden writing, is an important tool for
protecting information and is used in many aspects of computer security. It can help provide data confidentiality, data integrity, electronic signatures, and advanced user authentication. It has nothing to do with data availability, which is a property that a given resource will use during a given time period.
In cryptography, the Rivest, Shamir, and Adelman (RSA)
scheme has which of the following pairs of characteristics?
1. Secret key encryption algorithm system
2. Asymmetric cipher system
3. Public key encryption algorithm system
4. Symmetric cipher system
a. 1 and 4
b. 2 and 3
c. 1 and 2
d. 3 and 4
B. The Rivest, Shamir, and Adelman (RSA) scheme uses a public key encryption algorithm and is an asymmetric cipher system. The data encryption standard (DES) uses a secret key encryption algorithm and is a symmetric cipher system. RSA uses two keys (private and public), whereas DES uses one key (private).
What is the most common attack against cryptographic algorithms?
a. Ciphertext-only attack
b. Birthday attack
c. Chosen plain text attack
d. Adaptive chosen plain text attack
A. Exploiting a weakness is called an attack. In a ciphertext-only attack, an attacker has some ciphertext encrypted with an algorithm. He does not know the plain text or the key, but he knows the algorithm. His goal is to find the corresponding plain text. This is the most common attack. A birthday attack is an attack against message digest 5 (MD5), a hash function. The attack is based on probabilities where it finds two
messages that hash to the same value (collision) and then exploits it to attack. The attacker is looking for “birthday” pairs of two messages with the same hash values. This attack is not feasible given today’s computer technology.
In a chosen plain text attack, the attacker knows the plain text and the corresponding ciphertext and algorithm but does not know the key. This type of attack is harder but still possible. The adaptive chosen plain text attack is a variation of the chosen plain text attack where the selection of the plain text is changed based on the previous attack results.
A message authentication code can protect against which of
the following combinations of actions?
1. Authorized, accidental data modification
2. Authorized, intentional data modification
3. Unauthorized, accidental data modification
4. Unauthorized, intentional data modification
a. 2 and 4
b. 2 and 3
c. 3 and 4
d. 1 and 4
C. A message authentication code, a type of cryptographic
checksum, can protect against both accidental and intentional, but unauthorized, data modification. Ordinary error detecting codes such as cyclic redundancy codes are not adequate because they cannot detect intentional modification. A message authentication code is initially calculated by applying a cryptographic algorithm and a secret value, called the key, to the data. The initial code is retained. The data is later verified by applying the cryptographic algorithm and the same secret key to the data to produce another, second code; this second code is then compared to the initial code. If the two codes are equal, then the data is considered authentic. Otherwise, an unauthorized modification is assumed. Any party trying to modify the data without knowing the key would not know how to calculate the appropriate code corresponding to the altered data.
Which of the following encryption algorithms or schemes is
absolutely unbreakable?
a. Data encryption standard
b. One-time pad
c. International data encryption algorithm
d. Rivest cipher 2 and 4
B. One-time pad is unbreakable given infinite resources. Each random key in the one-time pad is used exactly once, for only one message, and for only a limited time period. The algorithm for a one time pad requires the generation of many sets of matching encryption keypads. Each pad consists of a number of random key characters, not generated by a cryptographic key generator. Each key character in the pad is used to encrypt one and only one plain text character; then the key character is never used again. The number of random keypads that need to be generated must be at least equal to the volume of plain text
messages to be encrypted. Due to the number of random keypads to be generated, this approach is not practical for high-speed communication systems. This is the reason the one-time pad is absolutely unbreakable. Brute force attack is possible with the data encryption standard (DES) and international data encryption algorithm (IDEA). The key length in Rivest cipher 2 and 4 (RC2 and RC4) is variable, and details of their algorithms are unknown because they are new proprietary algorithms. IDEA is a new algorithm and works as a double-DES (2DES). DES is in the public domain so that anyone can use it. IDEA is patented and requires a license for commercial use. RC2 and RC4 are unpatented
but are trade secrets.
Which of the following statements is true about one-way hash
function and encryption algorithm?
a. They both convert a plain text into an unintelligent text.
b. They both can reverse from output to input.
c. They both do not destroy information.
d. They both operate on a key.
A. A hash function can detect modification of a message,
independent of any connection with signatures. That is, it can serve as a cryptographic checksum. It is a solution to the problem of signing long messages. A one-way hash function converts an arbitrary-length message into a fixed-length hash. Like an encryption algorithm, a one way hash function converts a plain text message into an unintelligent text. This is where the similarity stops. However, unlike an encryption
algorithm, there is no way to go backward with a one-way hash function. It is impossible to reverse a one-way hash function to get the original input from the output value. An encryption algorithm does not destroy any information. A one-way hash function destroys information and does not have a key. No secrecy is involved in the one-way hash function; the security is in the lack of ability to reverse
itself. This property makes it a useful way to identify a message.
What do controls to protect against malicious changes to a
message include?
a. Data checksums and cyclic redundancy code
b. Message integrity code and message authentication code
c. Message integrity code and cyclic redundancy code
d. Data checksums and message authentication code
B. A message integrity code uses a secret key to produce a fixed length hash code that is sent with the message. Integrity codes are used to protect the integrity of large interbank electronic funds transfers. A message authentication code is a hashed representation of a message and is computed by the message originator as a function of the message being transmitted and the secret key. If the message authentication code computed by the recipient matches the authentication code appended to the message, the recipient is assured that the message was not modified. Both integrity codes and authentication codes are cryptographic checksums, which are stronger than non-cryptographic checksums. Cryptography can effectively detect both intentional and unintentional modification; however, cryptography does not protect files from being
modified. Both secret key and public key cryptography can be used to ensure integrity. When secret key cryptography is used, a message authentication code is calculated and appended to the data. To verify that the data has not been modified at a later time, any party with access to the correct secret key can recalculate the authentication code. The new authentication code is compared with the original authentication code. If they are identical, the verifier has confidence that an unauthorized party has not modified the data. Data checksums are digits or bits summed according to arbitrary rules and used to verify the integrity of data. A cyclic redundancy code (CRC) uses an algorithm for generating error detection bits in a data link protocol. The receiving station performs the same calculation as done by the transmitting station. If the results differ, then one or more bits are in error. Both data checksums and CRC are not based on cryptographic checksums. Instead, they are based on algorithms.
Which of the following statements about secret key and
message digest algorithms are not true?
1. The drive for message digest algorithms starts with public key cryptography.
2. Message digest algorithms make the RSA much more useful.
3. Secret key algorithm is designed to be irreversible.
4. Message digest algorithm is designed to be reversible.
a. 1 and 2
b. 3 and 4
c. 1 and 3
d. 2 and 4
B. The significant difference between a secret key algorithm and a message digest algorithm is that a secret key algorithm is designed to be reversible and a message digest algorithm is designed to be impossible to reverse. It is true that the drive for a message digest algorithm started with public key cryptography. Rivest, Shamir, and Adelman (RSA) is used to perform digital signatures on messages. A
cryptographically secure message digest function with high
performance would make RSA much more useful. This is because a long message is compressed into a small size by first performing a message digest and then computing an RSA signature on the digest.
When compared to the Rivest, Shamir, and Adelman (RSA)
algorithm, the Digital Signature Standard (DSS) does not provide:
a. Digital signature
b. Authentication
c. Encryption
d. Data integrity
C. Both RSA and DSS provide digital signature, authentication, and data integrity capabilities. RSA provides encryption; DSS does not. The digital signature algorithm (DSA) is specified in the DSS. The DSS contains the DSA to create signatures as well as the secure hash algorithm (SHA) to provide data integrity. SHA is used in electronic
mail and electronic funds transfer applications.
Which of the following attacks are made on block ciphers?
a. Meet-in-the-middle attacks
b. Codebook attacks
c. Man-in-the-middle attacks
d. Bucket brigade attacks
A. Meet-in-the-middle (MIM) attacks occur when one end is
encrypted and the other end is decrypted, and the results are matched in the middle. MIM attacks are made on block ciphers. A block cipher algorithm is a (i) symmetric key cryptographic algorithm that transforms a block of information at a time using a cryptographic key and (ii) a family of functions and their inverse functions that is
parameterized by a cryptographic key; the functions map bit strings of a fixed length to bit strings of the same length. This means, the length of the input block is the same as the length of the output block. The other three choices are incorrect because they do not use block ciphers. Codebook attacks are a type of attack where the intruder attempts to create a codebook of all possible transformations between
plaintext and ciphertext under a single key. Man-in-the-middle (MitM) attacks are a type of attack that takes advantage of the store-and forward mechanism used by insecure networks, such as the Internet. MitM attacks are also called bucket brigade attacks.
Which of the following statements about digital signatures is
not true?
a. It enhances authentication.
b. It makes repudiation by the sender possible.
c. It prevents nonrepudiation by the receiver.
d. It makes repudiation by the sender impossible.
B. Digital signatures use Rivest, Shamir, and Adelman (RSA), a public-key (two-key) cryptographic algorithm. RSA enhances authentication and confidentiality due to the use of a two-key system; one key is public and the other one is private. The use of RSA in digital signatures prevents repudiation by the sender as well as by the receiver. Nonrepudiation means the sender cannot say that he never
sent the message, and the receiver cannot say that he never received the message. Nonrepudiation is possible due to the use of a two-key system where the private key of the sender and the receiver is kept secret while their public key is known only to each party. Both the sender and the receiver cannot deny having participated in the message transmission.
Which of the following statements is true? Rivest, Shamir, and Adelman (RSA) algorithm has a:
a. Slower signature generation and slower verification than DSA
b. Slower signature generation and faster verification than DSA
c. Faster signature generation and faster verification than DSA
d. Faster signature generation and slower verification than DSA
B. It has been tested and proven that the RSA algorithm has a slower signature generation capability and faster verification than the digital signature algorithm (DSA). On the other hand, the DSA has faster signature generation and slower verification than the RSA. RSA is much slower to compute than popular secret key algorithms like data encryption standard (DES) and international data encryption
algorithm (IDEA). RSA algorithm uses a variable length public key a long key for enhanced security or a short key for efficiency. RSA encryption algorithm requires greater computing power (i.e., memory or disk storage space) necessary to generate keys. The keys for RSA algorithm are large numbers generated mathematically by combining prime numbers. The algorithm is powerful and has resisted
all attempts to break it to date, except for 40-bit RSA.
Cryptography provides all the following services except:
a. Authentication
b. Confidentiality
c. Integrity
d. Availability
D. Availability is the property of a given resource that is usable during a given time period; it is not provided by cryptography. Data communications channels are often insecure, subjecting messages transmitted over the channels to various passive and active attacks (threats). Cryptography is the solution to counteract such threats.
Cryptography is the science of mapping readable text, called plain text, into an unreadable format, called ciphertext, and vice versa. The mapping process is a sequence of mathematical computations. The computations affect the appearance of the data, without changing its meaning.
To protect a message, an originator transforms a plain text message into ciphertext. This process is called encryption or encipherment. The ciphertext is transmitted over the data communications channel. If the message is intercepted, the intruder has access to only the unintelligible ciphertext. Upon receipt, the message recipient transforms the ciphertext into its original plain text format. This process is called decryption or decipherment. The mathematical operations used to map between plain text and ciphertext are identified by cryptographic algorithms. Cryptographic
algorithms require the text to be mapped and, at a minimum, require some value that controls the mapping process. This value is called a key. Given the same text and the same algorithm, different keys produce different mappings. Cryptographic algorithms need not be kept secret. The success of cryptography is attributed to the difficulty of inverting an algorithm. In other words, the number of mappings from which plaintext can be transformed into ciphertext is so great that it is impractical to find the correct mapping without the key. For example, the Data Encryption Standard (DES) uses a 56-bit key. A user with the correct key can easily decrypt a message, whereas a user without the key needs to attempt random keys from a set of more than 72 quadrillion possible values.
Authentication is incorrect because it is one of the services provided by cryptography. Authentication allows the recipient of a message to validate its origin. It prevents an imposter from masquerading as the sender of the message. Confidentiality is incorrect because it is one of the services provided by cryptography. Confidentiality prevents disclosure of the message to unauthorized users. Integrity is incorrect because it is one of the services provided by cryptography. Integrity assures the recipient that the message was not modified en route. Note that the integrity service allows the recipient to detect message modification but not prevent it.
Which one of the following items is unrelated to the other
three items?
a. S-box
b. P-box
c. Product ciphers
d. Sandbox
D. Sandbox is not related to S-box, P-box, and product ciphers. Sandbox is a system that allows an untrusted application to run in a highly controlled environment where the application’s permissions are restricted to an essential set of computer permissions. In particular, an application in a sandbox (for example, JavaApplet) is usually restricted
from accessing the file system or the network. The other three choices are related to each other. S-box is a nonlinear
substitution table box used in several byte substitution transformations and in the key expansion routine to perform a one-for-one substitution of a byte value. This substitution, which is implemented with simple electrical circuits, is done so fast in that it does not require any
computation, just signal propagation. P-box is a permutation box used to effect a transposition on an 8-bit input in a product cipher. This transposition, which is implemented
with simple electrical circuits, is done so fast in that it does not require any computation, just signal propagation.
Product ciphers are a whole series of combination of S-boxes and Pboxes cascaded. In each iteration or round, first there is an S-box followed by a P-box. In addition, there is one P-box at the beginning and one P-box at the end of each round. Common product ciphers operate on k-bit inputs to product k-bit outputs.
Which of the following key algorithms decrypt data with the
same key used for encryption?
a. Symmetric key algorithm
b. Asymmetric key algorithm
c. Symmetric and public key algorithms
d. Asymmetric and secret key algorithms
A. Cryptography is the process of scrambling information in such a manner that it becomes unintelligible and can be unscrambled only by the intended recipient(s). In cryptographic terms, this process involves the encryption of plain text data to produce ciphertext, and the subsequent decryption of ciphertext to recover the original plain text.
Encryption and decryption are therefore inverse processes.
Cryptographic processing depends on the use of keys, which are of primary importance in the security of a cryptographic system. Cryptographic keys are conceptually similar to the keys used with padlocks, in the sense that data can be locked, or encrypted, through the use of a key with a cryptographic algorithm. Symmetric key algorithms decrypt data with the same key used for encryption. Asymmetric key algorithms use a pair of keys, consisting of a public key component and a private key component, both having a specific mathematical relationship. Symmetric and asymmetric key algorithms are commonly referred to as secret key and public key algorithms, respectively. Cryptography plays a major role in information security
and is a critical component of authentication technology.
Common encryption algorithms that implement symmetric
cryptography do not include which of the following?
a. Digital encryption standard (DES)
b. Tripe DES (3DES)
c. Rivest, Shamir, and Adelman (RSA)
d. Advanced encryption standard (AES)
C. Symmetric cryptography uses the same key for both encryption and decryption, whereas asymmetric cryptography uses separate keys for encryption and decryption, or to digitally sign and verify a signature. RSA is an example of asymmetric cryptography. DES, 3DES, and AES are examples of symmetric cryptography.
Which of the following are examples of block cipher algorithms for encryption and decryption?
a. AES and RAS
b. TDEA and DES
c. AES and TDEA
d. MAC and HMAC
C. Encryption is used to provide data confidentiality. The data to be protected is called plain-text. Encryption transforms the plain-text data into ciphertext data. Cipher-text can be transformed back into plain-text using decryption. The approved algorithms for encryption
and decryption include the advanced encryption standard (AES) and the triple data encryption algorithms (TDEA). Each of these algorithms operates on blocks (chunks) of data during an encryption or decryption operation. For this reason, these algorithms are commonly referred to
as block cipher algorithms. RAS is remote access server, which is not a block cipher, and DES is data encryption standard, which is a block cipher. Message authentication code (MAC) is incorrect because it is not a block cipher because it provides an assurance of authenticity and
integrity. HMAC is a MAC that uses a cryptographic hash function in combination with a secret key. Both MAC and HMAC are based on hash functions, which are used by (i) keyed hash message authentication coded algorithms, (ii) digital signature algorithms, (iii) key derivation functions for key agreement, and (iv) random number generators. Typically, MACs are used to detect data modifications that
occur between the initial generation of the MAC and the verification of the received MAC. They do not detect errors that occur before the MAC is originally generated.
Cross-certification is not allowed in which of the following
public key infrastructure (PKI) architectures?
a. Hierarchical PKI model
b. Mesh PKI model
c. Bridge PKI model
d. Complex PKI model
A. There are four architectures used to link certificate authorities (CAs), including hierarchical, mesh, bridge, and complex. In a hierarchical PKI model, authorities are arranged hierarchically under a “root CA” that issues certificates to subordinate CAs. A CA delegates when it certifies a subordinate CA. Trust delegation starts at a root CA that is trusted by every node in the infrastructure. Therefore, cross certification is not allowed in the hierarchical PKI model. Mesh (network) PKI model is incorrect because trust is established between any two CAs in peer relationships (cross-certification), thus allowing the possibility of multiple trust paths between any two CAs.
Independent CAs cross-certify each other resulting in a general mesh of trust relationships between peer CAs. The bridge PKI model was designed to connect enterprise PKIs regardless of the architecture; enterprises can link their own PKIs to those of their business partners. The complex PKI model is a combination of hierarchical PKI model and mesh PKI model because they are not mutually exclusive.
Which of the following should not be archived during the
disposition phase of a system development life cycle (SDLC)
because it applies to selecting cryptographic mechanisms?
a. Long-term symmetric key
b. Signing keys used by traditional certification authorities (CAs)
c. An individual’s signing keys
d. Signing keys used by non-traditional CAs
C. When a system is shut down or transitioned to a new system, one of the primary responsibilities is ensuring that cryptographic keys are properly destroyed or archived. Long-term symmetric keys may need to be archived to ensure that they are available in the future to decrypt data. Signing keys used by traditional and non-traditional CAs
may also need to be maintained for signature verification.
An individual’s signing keys should not be archived due to constant changes and employee turnover.
Which of the following provides the level of “trust” required
for the digital certificates to reliably complete a transaction?
a. Certificate policy
b. Certification practices statement
c. Identity proofing
d. Outsourcing
C. A level of “trust” is required for an organization to complete the digital certificate transaction reliably. This includes determining the level of identity proofing required for a subscriber to get a certificate, the strength of the key lengths and algorithms employed, and how the
corresponding private key is protected. The Certificate Authority (CA) operates under a Certificate Policy (CP) and Certification Practices Statement (CPS) that collectively describe the CA’s responsibilities and duties to its customers and trading partners. Organizations can operate their own certification authority duties or outsource that function.
- A birthday attack is targeted at which of the following?
a. MD5
b. SSL
c. SLIP
d. SET
A. A birthday attack is against message digest 5 (MD5), a hash algorithm. The attack is based on probabilities where it finds two messages that hash to the same value and then exploits it to attack. MD5 is a message authentication method based on producing a 128-bit hash code (signature fingerprint) from a message. The other three choices are not subjected to birthday attacks. SSL is secure sockets
layer, SLIP is serial line interface protocol, and SET is secure
electronic transaction.
A fundamental principle for protecting cryptographic keys
includes which of the following?
a. Zeroization and total knowledge
b. Split knowledge and dual control
c. Single control and formal proof
d. Zero-knowledge proof and triple control
B. One of the fundamental principles for protecting keys is the practice of split knowledge and dual control. These are used to protect the centrally stored secret keys and root private keys and secure the distribution of user tokens. Zeroization is a method of erasing electronically stored data by altering the contents of the data storage so as to prevent the recovery of data. Zero-knowledge proof is where one
party proving something to another without revealing any additional information. Total knowledge, single control, triple control, and formal proof are not relevant here.
The primary goal of a public key infrastructure (PKI) is to
create which of the following?
a. Closed environment
b. Trusted environment
c. Open environment
d. Bounded environment
B. Use of electronic processes provides benefits such as time
savings, enhanced services, cost-savings, and improved data quality and integrity. Public key technology can create a trusted environment that promotes the use and growth of all electronic processes, not just digital signatures.
In a public key infrastructure (PKI), which one of the following certificate authorities (CA) is subordinate to another CA and has a CA subordinate to it?
a. Root CA
b. Superior CA
c. Intermediate CA
d. Subordinate CA
C. This is the definition of an intermediate CA in that he has a superior CA and a subordinate CA. In a hierarchical PKI, the root CA’s public key serves as the most trusted datum (i.e., the beginning of trusted paths) for a security domain. The superior CA has certified the certificate signature key of another CA and who constrains the activities of that CA. Another CA certifies the subordinate CA’s certificate signature key.
Digital signatures are not used for which of the following?
a. Authentication
b. Availability
c. Nonrepudiation
d. Integrity
B. Digital signatures provide authentication, nonrepudiation, and
integrity services. Availability is a system requirement intended to
ensure that systems work promptly and that service is not denied to
authorized users.
What are public-key cryptographic systems known as?
a. Two-keys or asymmetric systems
b. Two-keys or symmetric systems
c. One-key or symmetric systems
d. One-key or asymmetric systems
A. Public-key cryptographic systems are known as two-key or
asymmetric systems. Private-key cryptographic systems are known as one-key or symmetric systems.
Cryptographic key management is a difficult problem for which of the following?
a. Symmetric-key algorithms
b. Asymmetric-key algorithms
c. Hybrid-key algorithms
d. Hash-key algorithms
A. In symmetric key algorithms, parties share a single, secret key. Establishing that shared key is called key management, and it is a difficult problem. In asymmetric key algorithms, there are two keys (public and private) for each party. The public and private keys are generated at the same time, and data encrypted with one key can be decrypted with the other key. Hybrid key algorithms combine the best features of public and private key systems. Hash key algorithms is
meaningless here.
Which of the following should be used to prevent an
eavesdropping attack from remote access to firewalls?
a. File encryption
b. Bulk encryption
c. Session encryption
d. Stream encryption
C. Session encryption is used to encrypt data between application and end users. This provides strong authentication. File encryption protects data in storage. Bulk encryption is simultaneous encryption of all channels of a multichannel telecommunications trunk. Stream encryption encrypts and decrypts arbitrarily sized messages not a
strong authentication.
Common encryption algorithms that implement symmetric
cryptography do not include which of the following?
a. Elliptic curve DSA (ECDSA)
b. Hash message authentication code (HMAC)
c. Message digest 5 (MD5)
d. Secure hash algorithm (SHA-1)
A. Symmetric cryptography uses the same key for both encryption and decryption, whereas asymmetric cryptography uses separate keys for encryption and decryption, or to digitally sign and verify a signature. ECDSA is an example of asymmetric cryptography. HMAC,MD5, and SHA-1 are examples of symmetric cryptography.
During the operational phase of cryptography, a new key is
needed to replace the old key. Which of the following is not a method to accomplish this goal?
a. Rekeying
b. Key update
c. Entity deregistration
d. Key derivation
C. The entity deregistration function removes the authorization of an entity to participate in a security domain. Deregistration is intended to prevent other entities from relying on or using the deregistered entity’s keying material. At the end of a key’s crypto-period, a new key needs to be available to replace the old key if operations are to be
continued. This can be accomplished by rekeying, key update, or key derivation.
Asymmetric authentication is susceptible to known attacks
due to which of the following?
a. Client authenticates the gateway and then uses that channel to authenticate the client.
b. Authenticating the server to the client.
c. Authenticating the client to the server.
d. Authenticating each endpoint to other.
A. Asymmetric authentication is susceptible to attacks because of the way the authentication is performed. The client authenticates the gateway and then uses that channel to authenticate the client. It is a weak form of authentication. The other three choices provide strong forms of authentication because they are a function of either transport layer security (TLS) or Internet Protocol security (IPsec).
Zero-knowledge proof is used in which of the following
applications?
a. Public-key encryption process
b. Zeriozation process
c. Degaussing operation
d. Data remanence operation
A. Zero-knowledge proof requires that one party proves something to another without revealing any additional information. This proof has applications in public-key encryption process. Zeroization process is a method of erasing electronically stored data by altering the contents of the data storage so as to prevent the recovery of data. Degaussing operation is a process whereby the magnetic media is erased, that is, returned to its original state. Data remanence operation is the residual physical representation of data that has been in some way erased.
Which of the following is not part of cryptographic key
management process?
a. Key layering
b. Key distribution
c. Key storage
d. Key generation
A. Key management provides the foundation for the secure
generation, storage, distribution, and translation of cryptographic keys. Key layering is a meaningless term here.
An original cryptographic key is split into “n” multiple key
components using split knowledge procedure. If knowledge of “k” components is required to construct the original key, knowledge of which of the following provides no information about the original key?
a. n – 1 key components
b. k – 1 key components
c. k – n key components
d. n – k key components
B. This is an application of split knowledge procedure. An
original cryptographic key is split into “n” multiple key components, individually providing no knowledge of the original key, which can be subsequently combined to recreate the original cryptographic key. If knowledge of “k” components is required to construct the original key,
then knowledge of any k–1 key components provides no information about the original key. However, it may provide information about the length of the original key. Here, “k” is less than or equal to “n.”
Which of the following can mitigate threats to integrity when
private key cryptography is used?
a. Message authentication code
b. Message identifier
c. Message header
d. Message trailer
A. When private (secret) key cryptography is used, a data
(message) authentication code is generated. Typically, a code is stored or transmitted with data. When data integrity is to be verified, the code is generated on the current data and compared with the previously generated code. If the two values are equal, the integrity (i.e.,authenticity) of the data is verified. Message identifier is a field that may be used to identify a message, usually a sequence number. Message header and trailer contain information about the message. The other three choices do not have the code generation and verification capabilities.
In a public key infrastructure (PKI) environment, finding
which of the following is a major challenge in the public-key
certificate’s path discovery?
a. Root certificate
b. Trust anchor
c. Cross certificate
d. Intermediate certificate
D. All certification paths begin with a trust anchor, include zero or more intermediate certificates, and end with the certificate that contains the user’s public key. This can be an iterative process, and finding the appropriate intermediate certificates is one of PKI’s challenges in path discovery, especially when there is more than one intermediary involved. A certificate authority (CA) generally issues a
self-signed certificate called a root certificate or trust anchor; this is used by applications and protocols to validate the certificates issued by a CA. Note that CAs issue cross certificates that bind another issuer’s name to that issuer’s public key.
Public-key cryptographic systems are not suitable for which
of the following?
a. Link encryption
b. End-to-end encryption
c. Bulk encryption
d. Session encryption
C. Public-key cryptographic systems have low bandwidth and
hence are not suitable for bulk encryption, where the latter requires a lot of bandwidth. The other three choices are applicable for specific needs.
Which of the following is an example of public-key
cryptographic systems?
a. MAC and DAC
b. DES and 3DES
c. RSA and IDEA
d. RSA and DSS
D. Public-key cryptography is particularly useful when the parties wanting to communicate cannot rely upon each other or do not share a common key (for example, Rivest-Shamir-Adelman [RSA] and digital signature standard [DSS]). Mandatory access control (MAC) and discretionary access control (DAC) are examples of access control mechanisms. Data encryption standard, DES, (56-bit key), three key
triple data encryption standard, 3DES, (168-bit key), and international data encryption algorithm, IDEA, (128-bit key) are examples of private-key cryptographic systems. IDEA is another block cipher, similar to DES, and is a replacement for or an improvement over DES. IDEA is used in pretty good privacy (PGP) for data encryption.
Which one of the following is unlike the others?
a. Social engineering attack
b. Side-channel attack
c. Phishing attack
d. Shoulder surfing attack
B. Side channel attacks result from the physical implementation of a cryptosystem through the leakage of information by monitoring sound from computations to reveal cryptographic key-related information. Side-channel attacks are based on stealing valuable information whereas the other three choices deal with deceiving people.
Social engineering attacks focus on coercing people to divulge passwords and other valuable information. Phishing attack involves tricking individuals into disclosing sensitive personal information through deceptive computer-based means. Phishing is a digital form of social engineering that uses authentic-looking but bogus e-mails to request information from users or direct them to a fake website that
requests valuable personal information. Shoulder surfing attack is similar to social engineering where the attacker uses direct observation techniques such as looking over someone’s shoulder to obtain passwords, PINs, and other valuable codes.
A cryptographic key may pass through several states between its generation and its distribution. A cryptographic key may not enter the compromised state from which of the following states?
a. Pre-activation state
b. Destroyed state
c. Active state
d. Deactivated state
B. A cryptographic key may pass through several states between its generation and its destruction. Six key-states include pre-activation state, active state, deactivated state, destroyed state, compromised state, and destroyed compromised state. In general, keys are compromised when they are released to or determined by an unauthorized entity. If the integrity or secrecy of the key is suspect, the
compromised key is revoked. A cryptographic key may enter the compromised state from all states except the destroyed state and destroyed compromised states. A compromised key is not used to apply cryptographic protection to information. Even though the key no longer exists in the destroyed state, certain key attributes such as key
name, key type, and crypto-period may be retained, which is risky. The other three choices are not risky. In the pre-activation state, the key has been generated but is not yet authorized for use. In this state the key may be used only to perform proof-of-possession or key confirmation. In the active state, a key may be used to cryptographically protect information or to cryptographically process previously protected information (for example, decrypt ciphertext or
verify a digital signature) or both. When a key is active, it may be designated to protect only, process only, or both protect and process. In the deactivated state, a key’s crypto-period has expired, but it is still needed to perform cryptographic processing until it is destroyed.
The ARK Company just discovered that its mail server was used for phishing by an outside attacker. To protect its reputation and reduce future impersonation attacks, the company wants to implement reasonable, cost-effective, public key infrastructure (PKI) tools. Which of the following is required to accept digital certificates from multiple vendor certification authorities?
a. The application must be PKI-enabled.
b. The application must be PKI-aware.
c. The application must use X.509 Version 3.
d. The application must use PKI-vendor plug-ins.
C. Using the X.509 Version 3 standard helps application programs in accepting digital certificates from multiple vendor CAs, assuming that the certificates conform to a consistent Certificate Profiles. Application programs either have to be PKI-enabled, PKI-aware, or use PKI vendor plug-ins prior to the use of X.509 Version 3 standard. Version 3
is more interoperable so that an application program can accept digital certificates from multiple vendor certification authorities. Version 3 standard for digital certificates provides specific bits that can be set in a certificate to ensure that the certificate is used only for specific services such as digital signature, authentication, and encryption.
The ARK Company just discovered that its mail server was used for phishing by an outside attacker. To protect its reputation and reduce future impersonation attacks, the company wants to implement reasonable, cost-effective, public key infrastructure (PKI) tools. Which of the following provides a unique user ID for a digital
certificate?
a. Username
b. User organization
c. User e-mail
d. User message digest
D. The digital certificate contains information about the user’s identity (for example, name, organization, and e-mail), but this information may not necessarily be unique. A one-way (hash) function can be used to construct a fingerprint (message digest) unique to a given certificate using the user’s public key.
The ARK Company just discovered that its mail server was used for phishing by an outside attacker. To protect its reputation and reduce future impersonation attacks, the company wants to implement reasonable, cost-effective, public key infrastructure (PKI) tools. Which of the following is not included in the digital signature
standard (DSS)?
a. Digital signature algorithm (DSA)
b. Data encryption standard (DES)
c. Rivest, Shamir, Adleman algorithm (RSA)
d. Elliptic curve digital signature algorithm (ECDSA)
B. DSA, RSA, and ECDSA are included in the DSS that specifies a digital signature used in computing and verifying digital signatures. DES is a symmetric algorithm and is not relevant here. DES is a block cipher and uses a 56-bit key.
The ARK Company just discovered that its mail server was used for phishing by an outside attacker. To protect its reputation and reduce future impersonation attacks, the company wants to implement reasonable, cost-effective, public key infrastructure (PKI) tools. Digital signatures are not used for which of the following?
a. Authentication
b. Availability
c. Nonrepudiation
d. Integrity
B. Digital signatures provide authentication, nonrepudiation, and integrity services. Availability is a system requirement intended to ensure that systems work promptly and that service is not denied to authorized users.
The ARK Company just discovered that its mail server was used for phishing by an outside attacker. To protect its reputation and reduce future impersonation attacks, the company wants to implement reasonable, cost-effective, public key infrastructure (PKI) tools. What keys are used to create digital signatures?
a. Public-key cryptography
b. Private-key cryptography
c. Hybrid-key cryptography
d. Primary-key cryptography
A. Public-key cryptography has been recommended for distribution of secret keys and in support of digital signatures. Private-key cryptography has been recommended for encryption of messages and
can be used for message integrity check computations. Hybrid keys combine the best of both public and private keys. Primary keys are used in database design and are not relevant here.
The ARK Company just discovered that its mail server was used for phishing by an outside attacker. To protect its reputation and reduce future impersonation attacks, the company wants to implement reasonable, cost-effective, public key infrastructure (PKI) tools. Which of the following is not usually seen on a digital
certificate?
a. Owner name
b. Public key
c. Effective dates for keys
d. Insurance company name
D. The information on the digital certificate includes the owner name, the public key, and start and end dates of its validity. The certificate should not contain any owner information that changes frequently (for example, the insurance company name).
The ARK Company just discovered that its mail server was used for phishing by an outside attacker. To protect its reputation and reduce future impersonation attacks, the company wants to implement reasonable, cost-effective, public key infrastructure (PKI) tools.7. What is the major purpose of a digital certificate?
a. To achieve availability goal
b. To maintain more information on the certificate
c. To verify the certificate authority
d. To establish user authentication
D. Digital certificates are used as a means of user authentication. Entities can prove their possession of the private key by digitally signing known data or by demonstrating knowledge of a secret exchanged using public-key cryptographic methods
Encryption using keys of 40 or fewer bits is only acceptable for use
Behind the firewall
Outside the Firewall
Behind the firewall
Leading cryptographers recommend businesses use key lengths of at least
40 bits
75 bits
90 bits
75 bits - 90 is preferable
The Data Encryption Standard (DES) uses
28 keys
56 keys
78 keys
56 keys
The AES-128 bit key is an example of
Optional-to-implement that provides a greater security
Mandatory-to-implement encryption algorithms that do not provide adequate security.
Optional-to-implement that provides a greater security
The DES algorithm, RC2, and the RSA-512 bit key are examples of
Optional-to-implement that provides a greater security
Mandatory-to-implement encryption algorithms that do not provide adequate security.
Mandatory-to-implement encryption algorithms that do not provide adequate security.
This algorithm’s security is based on the difficulty of factoring large numbers into their original prime numbers.
A. ECC
B. RSA
C. DES
D. Diffie-Hellman
B. RSA
This algorithm is a one-way function. It is easier to calculate the product than it is to identify the prime numbers used to
generate that product.
A. ECC
B. RSA
C. DES
D. Diffie-Hellman
B. RSA
Occurs when the relationship between the plaintext and the key is so complicated that an attacker can’t merely continue altering the plaintext and analyzing the resulting ciphertext to determine the key.
Confusion
Occurs when a change in the plaintext results in multiple changes spread throughout the ciphertext.
Diffusion
Digital signatures cannot by themselves provide Confidentiality.
True
False
True
There are three primary types of modern encryption: symmetric, asymmetric, and hashing. This encryption uses a single key to encrypt and decrypt.
A. Symmetric
B. Asymmetric
C. Hashing
A.Symmetric
There are three primary types of modern encryption: symmetric, asymmetric, and hashing. This encryption uses a uses two keys, one to encrypt and the other to decrypt.
A. Symmetric
B. Asymmetric
C. Hashing
B. Asymmetric
There are three primary types of modern encryption: symmetric, asymmetric, and hashing. This encryption uses a one-way cryptographic transformation using an algorithm, but no key.
A. Symmetric
B. Asymmetric
C. Hashing
C. Hashing
This encryption is also called “secret key” encryption because the key must be kept secret from third parties. Strengths of this method include speed and cryptographic strength per bit of key; however, the major weakness is that the key must be securely shared before two parties may communicate secure.
A. Symmetric
B. Asymmetric
C. Hashing
A. Symmetric
This mode Symmetric encryption means that it encrypt blocks of data each round; for example, 64 bits for the Data Encryption Standard (DES), and 128 bits for AES. .
A. Stream
B. Block
A. Block
Some block ciphers in Symmetric encryption can emulate stream ciphers by setting the block size to 1 bit; they are still considered block ciphers.
A. True
B. False
A. True
This mode in Symmetric encryption means each bit is independently encrypted in a “stream.”
A. Stream
B. Block
A. Stream
Some symmetric ciphers use an initialization vector to ensure that the first encrypted block of data is random.
A. True
B. False
A. True
This ensures that identical plaintexts encrypt to different ciphertexts
Restricting Bluetooth device discovery relies on the secrecy of what?
A. MAC address
B. Symmetric key
C. Private key
D. Public key
A. Restricting Bluetooth device discovery relies on the secrecy of the 48-bit Bluetooth MAC address. Incorrect answers and explanations: Answers B, C, and D are incorrect. While E0 is a symmetric cipher, it not used to restrict discover though it is used for data encryption. Public or private keys are also not used for Bluetooth discovery.
What are the names of the OSI model layers in order from bottom to top?
A. Physical, Data Link, Transport, Network, Session, Presentation, Application
B. Physical, Network, Data Link, Transport, Session, Presentation, Application
C. Physical, Data Link, Network, Transport, Session, Presentation, Application
D. Physical, Data Link, Network, Transport, Presentation, Session, Application
C. The OSI model layers from bottom to top are: Physical, Data Link, Network, Transport, Session, Presentation, and
Application. Remember “Please Do Not Throw Sausage Pizza Away” as a useful mnemonic to remember this.
What is the most secure type of EAP?
A. EAP-TLS
B. EAP-TTLS
C. LEAP
D. PEAP
A. EAP-TLS is the most secure (and costly) form of EAP because it requires both server and client-side certificates. Incorrect answers and explanations: Answers B, C, and D are incorrect. EAP TTLS and PEAP are similar and don’t require client-side certificates. LEAP is a Cisco-proprietary protocol that does not require client-side certificates; it also has fundamental security weaknesses.
What is the most secure type of firewall?
A. Packet filter
B. Stateful firewall
C. Circuit-level proxy firewall
D. Application-layer proxy firewall
D. Application-layer firewalls are the most secure, as they have the ability to filter based on OSI Layers 3–7.Incorrect answers and explanations: Answers A, B, and C are incorrect. All are firewalls. A packet filter is the least secure of the four, due to the lack of state. A stateful firewall is more secure than a packet filter, but its decisions are limited to Layers 3 and 4. Circuit-level proxy firewalls operate at Layer 5 and
cannot filter based on application-layer data.
Accessing an IPv6 network via an IPv4 network is called what?
A. CIDR
B. NAT
C. Translation
D. Tunneling
D. Accessing an IPv6 network via an IPv4 network is called tunneling. Incorrect answers and explanations: Answers A, B, and C are incorrect. CIDR is classless Inter domain Routing, a way to create flexible subnets. NAT is network address translation, which translates one IP address for another. Translation is a distractor answer
Dorothy is using a network sniffer to evaluate network connections. She focuses on the initialization of a TCP session. What is the first phase of the TCP three-way handshake sequence?
A. SYN flagged packet
B. ACK flagged packet
C. FIN flagged packet
D. SYN/ACK flagged packet
A. The SYN flagged packet is first sent from the initiating host to the destination host; thus it is the first step or phase in the TCP three-way handshake sequence used to establish a TCP session. The destination host then responds with a SYN/ACK flagged packet; this is the second step or phase of the TCP three-way handshake sequence. The initiating host sends an ACK flagged packet, and the connection is then established (the final or third step or phase). The FIN flag is used to gracefully shut down an established session.
UDP is a connectionless protocol that operates at the Transport layer of the OSI model and uses ports to manage simultaneous connections. Which of the following terms is also related to UDP?
A. Bits
B. Logical addressing
C. Data reformatting
D. Simplex
D. UDP is a simplex protocol at the Transport layer (layer 4 of the OSI model). Bits is associated with the Physical layer (layer 1). Logical addressing is associated with the Network layer (layer 3). Data reformatting is associated with the Presentation layer (layer 6). 3. A, B, D. The means by which IPv6 and IPv4 can coexist on the same network is to use
one or more of three primary options: dual stack, tunneling, or NAT-PT. Dual stack is to have most systems operate both IPv4 and IPv6 and use the appropriate protocol for each
conversation. Tunneling allows most systems to operate a single stack of either IPv4 or IPv6 and use an encapsulation tunnel to access systems of the other protocol. Network address translation-Protocol Translation (NAT-PT) (RFC-2766) can be used to convert between IPv4 and IPv6 network segments similar to how NAT converts between internal and external addresses. IPsec is a standard of IP security extensions used as an add-on for IPv4 and integrated into IPv6, but it does not enable the use of both IPv4 and IPv6 on the same system (although it doesn’t prevent it either). IP side loading is not a real concept.
Which of the following is a means for IPv6 and IPv4 to be able to coexist on the same network? (Choose all that apply.)
A. Dual stack
B. Tunneling
C. IPsec
D. NAT-PT
E. IP sideloading
A, B, D. The means by which IPv6 and IPv4 can coexist on the same network is to use one or more of three primary options: dual stack, tunneling, or NAT-PT. Dual stack is to
have most systems operate both IPv4 and IPv6 and use the appropriate protocol for each conversation. Tunneling allows most systems to operate a single stack of either IPv4 or IPv6 and use an encapsulation tunnel to access systems of the other protocol. Network address Translation-Protocol Translation (NAT-PT) (RFC-2766) can be used to convert between IPv4 and IPv6 network segments similar to how NAT converts between internal and external addresses. IPsec is a standard of IP security extensions used as an add-on for IPv4 and integrated into IPv6, but it does not enable the use of both IPv4 and IPv6 on the same system (although it doesn’t prevent it either). IP sideloading is not a real concept.
Security configuration guidelines issued by your CISO require that all HTTP communications be secure when communicating with internal web services. Which of the following is true in regards to using TLS? (Choose all that apply.)
A. Allows for use of TCP port 443
B. Prevents tampering, spoofing, and eavesdropping
C. Requires two-way authentication
D. Is backward compatible with SSL sessions
E. Can be used as a VPN solution
A, B, E. TLS allows for use of TCP port 443; prevents tampering, spoofing, and eavesdropping; and can be used as a VPN solution. The other answers are incorrect. TLS supports both one-way and two-way authentication. TLS and SSL are not interoperable or backward compatible.
Your network supports TCP/IP. TCP/IP is a multilayer protocol. It is primarily based on IPv4, but the organization is planning on deploying IPv6 within the next year. What is both a benefit and a potentially harmful implication of multilayer protocols?
A. Throughput
B. Encapsulation
C. Hash integrity checking
D. Logical addressing
B. Encapsulation is both a benefit and a potentially harmful implication of multilayer protocols. Encapsulation allows for encryption, flexibility, and resiliency, while also enabling covert channels, filter bypass, and overstepping network segmentation boundaries. Throughput is the capability of moving data across or through a network; this is not an implication of multilayer protocols. Hash integrity checking is a common benefit of multilayer protocols because most layers include a hash function in their header or footer. Logical addressing is a benefit of multilayer protocols; this avoids the restriction of using only physical addressing.
A new VoIP system is being deployed at a government contractor organization. They require high availability of five nines of uptime for the voice communication system. They are also concerned about introducing new vulnerabilities into their existing data network structure.
The IT infrastructure is based on fiber optics and supports over 1 Gbps to each device; the network often reaches near full saturation on a regular basis. What option will provide the best outcome of performance, availability, and security for the VoIP service?
A. Create a new VLAN on the existing IT network for the VoIP service.
B. Replace the current switches with routers and increase the interface speed to
1,000 Mbps.
C. Implement a new, separate network for the VoIP system.
D. Deploy flood guard protections on the IT network.
C. In this scenario, the only viable option to provide performance, availability, and security for the VoIP service is to implement a new, separate network for the VoIP system that is independent of the existing data network. The current data network is already at capacity, so creating a new VLAN will not provide sufficient insurance that the VoIP service will be highly available. Replacing switches with routers is usually not a valid strategy for increasing network capacity, and 1,000 Mbps is the same as 1 Gbps. Flood guards are useful against DoS and some transmission errors (such as Ethernet floods or broadcast storms), but they do not add more capacity to a network or provide reliable uptime for a VoIP service.
Micro segmentation is dividing up an internal network in numerous subzones, potentially as small as a single device, such as a high-value server or even a client or endpoint device. Which of the following is true in regard to micro segmentation? (Choose all that apply.)
A. It is the assignment of the cores of a CPU to perform different tasks.
B. It can be implemented using ISFWs.
C. Transactions between zones are filtered.
D. It supports edge and fog computing management.
E. It can be implemented with virtual systems and virtual networks.
B, C, E. Micro segmentation can be implemented using internal segmentation firewalls (ISFWs), transactions between zones are filtered, and it can be implemented with virtual systems and virtual networks. Affinity or preference is the assignment of the cores of a CPU to perform different tasks. Micro segmentation is not related to edge and fog computing management.
A new startup company is designing a sensor that needs to connect wirelessly to a PC or IoT hub in order to transmit its gathered data to a local application or cloud service for data analysis. The company wants to ensure that all transferred data from the device cannot be disclosed to unauthorized entities. The device is also intended to be located within 1 meter of the PC or IoT hub it communicates with. Which of the following concepts is the best choice for this device?
A. Zigbee
B. Bluetooth
C. FCoE
D. 5G
A. The device in this scenario would benefit from the use of Zigbee. Zigbee is an IoT equipment communications concept that is based on Bluetooth. Zigbee has low power consumption and a low throughput rate, and it requires close proximity of devices. Zigbee communications are encrypted using a 128-bit symmetric algorithm. Bluetooth is not a good option since it is usually plaintext. Bluetooth Low Energy (BLE) might be a viable option if custom encryption was added. Fiber Channel over Ethernet (FCoE) is not a wireless technology or an IoT technology—it is a high-speed fiber optic–based storage technology. 5G is the latest mobile service technology that is available for use on mobile phones, tablets, and other equipment. Though many IoT devices may support and use 5G, it is mostly used to
provide direct access to the internet rather than as a link to a local short-distance device, such as a PC or IoT hub.
James has been hired to be a traveling repair technician. He will be visiting customers all over the country in order to provide support services. He has been issued a portable workstation with 4G and 5G data service. What are some concerns when using this capability? (Choose all that apply.)
A. Eavesdropping
B. Rogue towers
C. Data speed limitations
D. Reliability of establishing a connection
E. Compatibility with cloud services
F. Unable to perform duplex communications
A, B, D. Cellular services, such as 4G and 5G, raise numerous security and operational concerns. Although cellular service is encrypted from device to tower, there is a risk of being fooled by a false or rogue tower. A rogue tower could offer only plaintext connections, but even if it supported encrypted transactions, the encryption only applies to the radio transmissions between the device and the tower. Once the communication is on the tower, it will be decrypted, allowing for eavesdropping and content manipulation. Even without a rogue tower, eavesdropping can occur across the cellular carrier’s interior network as well as across the internet, unless a VPN link is established between the remote mobile device and the network of the organization James works for. Being able to establish a connection can be unreliable depending on exactly where James’s travel takes him. 3G, 4G, and 5G coverage is not 100 percent available everywhere. 5G coverage is the most limited since it is the latest technology and still not universally deployed, and each 5G tower covers less area than a 4G tower. If James is able to establish a connection, 4G and 5G speeds should be sufficient for most remote technician activities, since 4G supports 100 Mbps for mobile devices and 5G supports up to 10 Gbps. If connectivity is established, there should be no issues with cloud interaction or duplex conversations.
A new startup company needs to optimize delivery of high-definition media content to its customers. They are planning the deployment of resource service hosts in numerous data centers across the world in order to provide low latency, high performance, and high availability of the hosted content. What technology is likely being implemented?
A. VPN
B. CDN
C. SDN
D. CCMP
B. A content distribution network (CDN), or content delivery network, is a collection of resource service hosts deployed in numerous data centers across the world in order to provide low latency, high performance, and high availability of the hosted content. VPNs are used to transport communications over an intermediary medium through the means of
encapsulation (i.e., tunneling), authentication, and encryption. Software-defined networking (SDN) aims at separating the infrastructure layer from the control layer on networking hardware in order to reduce management complexity. Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) (Counter-Mode/CBC-MAC Protocol) is the combination of two block cipher modes to enable streaming by a block algorithm.
Which of the following is a true statement about ARP poisoning or MAC spoofing?
A. MAC spoofing is used to overload the memory of a switch.
B. ARP poisoning is used to falsify the physical address of a system to impersonate that of
another authorized device.
C. MAC spoofing relies on ICMP communications to traverse routers.
D. ARP poisoning can use unsolicited or gratuitous replies.
D. The true statement is: ARP poisoning can use unsolicited or gratuitous replies—specifically, ARP replies for which the local device did not transmit an ARP broadcast request. Many systems accept all ARP replies regardless of who requested them. The other statements are false. The correct versions of those statements would be: (A) MAC flooding is used to overload the memory of a switch, specifically the CAM table stored in switch memory when bogus information will cause the switch to function only in flooding mode. (B) MAC spoofing is used to falsify the physical address of a system to impersonate that of another authorized device. ARP poisoning associates an IP address with the wrong MAC address. (C) MAC spoofing relies on plaintext Ethernet headers to initially gather valid MAC addresses of legitimate network devices. ICMP crosses routers because it is carried as the payload of an IP packet
An organization stores group project data files on a central SAN. Many projects have numerous files in common but are organized into separate project containers. A member
of the incident response team is attempting to recover files from the SAN after a malware infection. However, many files are unable to be recovered. What is the most likely cause of this issue?
A. Using Fibre Channel
B. Performing real-time backups
C. Using file encryption
D. Deduplication
D. The most likely cause of the inability to recover files from the SAN in this scenario is deduplication. Deduplication replaces multiple copies of a file with a pointer to one copy. If the one remaining file is damaged, then all of the linked copies are damaged or inaccessible as well. File encryption could be an issue, but the scenario mentions that groups of people work on projects and typically file encryption is employed by individuals, not by groups. Whole drive encryption would be more appropriate for group-accessed files as well as for a SAN in general. This issue is not related to what SAN technology is used, such as Fibre Channel. This problem might be solvable by restoring files from a backup, whether real-time or not, but the loss of files is not caused by performing backups.
Jim was tricked into clicking on a malicious link contained in a spam email message. This caused malware to be installed on his system. The malware initiated a MAC flooding attack. Soon, Jim’s system and everyone else’s in the same local network began to receive all transmissions from all other members of the network as well as communications from other parts of the next-to-local members. The malware took advantage of what condition in the network?
A. Social engineering
B. Network segmentation
C. ARP queries
D. Weak switch configuration
D. In this scenario, the malware is performing a MAC flooding attack, which causes the switch to get stuck in flooding mode. This has taken advantage of the condition that the switch had weak configuration settings. The switch should have MAC limiting enabled in order to prevent MAC flooding attacks from being successful. Although Jim was initially fooled by a social engineering email, the question asked about the malware’s activity. A MAC flooding attack is limited by network segmentation to the local switch, but the malware took advantage of weak or poor configuration on the switch and was still successful. MAC flooding is blocked by routers from crossing between switched network segments. The malware did not use ARP queries in its attack. ARP queries can be abused in an ARP poisoning attack,
but that was not described in this scenario.
A ______________ is an intelligent hub because it knows the hardware addresses of the systems connected on each outbound port. Instead of repeating traffic on every outbound port, it repeats traffic only out of the port on which the destination is known to exist.
A. Repeater
B. Switch
C. Bridge
D. Router
B. A switch is an intelligent hub. It is considered to be intelligent because it knows the addresses of the systems connected on each outbound port. Repeaters are used to strengthen the communication signal over a cable segment as well as connect network segments that use the same protocol. A bridge is used to connect two networks together—even networks of different topologies, cabling types, and speeds—in order to connect network segments that
use the same protocol. Routers are used to control traffic flow on networks and are often used to connect similar networks and control traffic flow between the two. Routers manage traffic based on logical IP addressing.
What type of security zone can be positioned so that it operates as a buffer between the secured private network and the internet and can host publicly accessible services?
A. Honeypot
B. Screened subnet
C. Extranet
D. Intranet
B. A screened subnet is a type of security zone that can be positioned so that it operates as a buffer network between the secured private network and the internet and can host publicly accessible services. A honeypot is a false network used to trap intruders; it isn’t used to host public services. An extranet is for limited outside partner access, not public. An intranet is the private secured network.
An organization wants to use a wireless network internally, but they do not want any possibility of external access or detection. What security tool should be used?
A. Air gap
B. Faraday cage
C. Biometric authentication
D. Screen filters
B. A Faraday cage is an enclosure that blocks or absorbs electromagnetic fields or signals. Faraday cage containers, computer cases, rack-mount systems, rooms, or even building materials are used to create a blockage against the transmission of data, information, metadata, or other emanations from computers and other electronics. Devices inside a Faraday cage can use EM fields for communications, such as wireless or Bluetooth, but devices outside of the cage will not be able to eavesdrop on the signals of the systems within the cage. Air gaps do not contain or restrict wireless communications—in fact, for an air gap to be effective, wireless cannot even be available. Biometric authentication has nothing to do with controlling radio signals. Screen filters reduce shoulder surfing but do not address radio signals
Neo is the security manager for the southern division of the company. He thinks that deploying a NAC will assist in improving network security. However, he needs to convince the CISO of this at a presentation next week. Which of the following are goals of NAC that Neo should highlight? (Choose all that apply.)
A. Reduce social engineering threats
B. Detect rogue devices
C. Map internal private addresses to external public addresses
D. Distribute IP address configurations
E. Reduce zero-day attacks
F. Confirm compliance with updates and security settings
B, E, F. Network access control (NAC) involves controlling access to an environment through strict adherence to and implementation of security policy. The goals of NAC are to detect/block rogue devices, prevent or reduce zero-day attacks, confirm compliance with updates and security settings, enforce security policy throughout the network, and use identities to perform access control. NAC does not address social engineering, mapping IP addresses, or distributing IP addresses—those are handled by training, NAT, and DHCP, respectively.
The CISO wants to improve the organization’s ability to manage and prevent malware infections. Some of her goals are to (1) detect, record, evaluate, and respond to suspicious activities and events, which may be caused by problematic software or by valid and invalid users,
(2) collect event information and report it to a central ML analysis engine, and (3) detect abuses that are potentially more advanced than what can be detected by traditional antivirus or HIDSs. The solution needs to be able to reduce response and remediation time, reduce false positives, and manage multiple threats simultaneously. What solution is the CISO wanting to implement?
A. EDR
B. NGFW
C. WAF
D. XSR
A. Endpoint detection and response (EDR) is a security mechanism that is an evolution of traditional antimalware products. EDR seeks to detect, record, evaluate, and respond to suspicious activities and events, which may be caused by problematic software or by valid and invalid users. It is a natural extension of continuous monitoring, focusing on both the endpoint device itself and network communications reaching the local interface. Some EDR solutions employ an on-device analysis engine whereas others report events back to a central analysis server or to a cloud solution. The goal of EDR is to detect abuses that are potentially more advanced than what can be detected by traditional antivirus or HIDSs, while optimizing the response time of incident response, discarding false positives, implementing blocking for advanced threats, and protecting against multiple threats occurring simultaneously and via various threat vectors. A next-generation firewall (NGFW) is a unified threat management (UTM) device that is based on a traditional firewall with numerous other integrated network and security services and is thus not the security solution needed in this scenario. A web application firewall (WAF) is an appliance, server add-on, virtual service, or system filter that defines a strict set of communication rules for a website and is not the security solution needed in this scenario. Cross-site request forgery (XSRF) is an attack against web-based services, not a malware defense.
A(n) _________________ firewall is able to make access control decisions based on the content of communications as well as the parameters of the associated protocol and software.
A. Application-level
B. Stateful inspection
C. Circuit-level
D. Static packet filtering
A. An application-level firewall is able to make access control decisions based on the content of communications as well as the parameters of the associated protocol and software. Stateful inspection firewalls make access control decisions based on the content and context of communications, but are not typically limited to a single application-layer protocol.
Circuit-level firewalls are able to make permit and deny decisions in regard to circuit establishment either based on simple rules for IP and port, using captive portals, requiring port authentication via 802.1X, or more complex elements such as context- or attribute-based access control. Static packet-filtering firewalls filter traffic by examining data from a message header. Usually, the rules are concerned with source and destination IP address (layer 3) and
port numbers (layer 4).
Which of the following is true regarding appliance firewalls? (Choose all that apply.)
A. They are able to log traffic information.
B. They are able to block new phishing scams.
C. They are able to issue alarms based on suspected attacks.
D. They are unable to prevent internal attacks
A, C, D. Most appliance (i.e., hardware) firewalls offer extensive logging, auditing, and monitoring capabilities as well as alarms/alerts and even basic IDS functions. It is also true that firewalls are unable to prevent internal attacks that do not cross the firewall. Firewalls are unable to block new phishing scams. Firewalls could block a phishing scam’s URL if it was already on a block list, but a new scam likely uses a new URL that is not yet known to be malicious.
Layer 2 of the OSI model has two sublayers. What are those sublayers, and what are two IEEE standards that describe technologies at that layer?
A. LCL and MAC; IEEE 802.2 and 802.3
B. LCL and MAC; IEEE 802.1 and 802.3
C. Network and MAC; IEEE 802.1 and 802.3
D. LLC and MAC; IEEE 802.2 and 802.3
D. LLC and MAC; IEEE 802.2 and 802.3
Which of the following is not an effective countermeasure
against spam?
A. Open mail relay servers
B. Properly configured mail relay servers
C. Filtering on an e-mail gateway
D. Filtering on the client
A. Open mail relay servers
Robert is responsible for implementing a common architecture used when customers need to access confidential information through Internet connections. Which of the following best describes this type of architecture?
A. Two-tiered model
B. Screened subnet
C. Three-tiered model
D. Public and private DNS zones
C. Three-tiered model
Which of the following indicates to a packet where to go and
how to communicate with the right service or protocol on the destination computer?
A. Socket
B. IP address
C. Port
D. Frame
A. Socket
Several different tunneling protocols can be used in dial-up
situations. Which of the following would be best to use as a
VPN tunneling solution?
A. L2P
B. PPTP
C. IPSec
D. L2TP
B. PPTP
Which of the following correctly describes Bluejacking?
A. Bluejacking is a harmful, malicious attack.
B. It is the process of taking over another portable device via a
Bluetooth-enabled device.
C. It is commonly used to send contact information.
D. The term was coined by the use of a Bluetooth device and the act of hijacking another device.
C. It is commonly used to send contact information.
DNS is a popular target for attackers due to its strategic role on the Internet. What type of attack uses recursive queries to
poison the cache of a DNS server?
A. DNS spoofing
B. Manipulation of the hosts file
C. Social engineering
D. Domain litigation
A. DNS spoofing
IP telephony networks require the same security measures as those implemented on an IP data network. Which of the following is unique to IP telephony?
A. Limiting IP sessions going through media gateways
B. Identification of rogue devices
C. Implementation of authentication
D. Encryption of packets containing sensitive information
A. Limiting IP sessions going through media gateways
Cross-site scripting (XSS) is an application security vulnerability usually found in web applications. What type of XSS vulnerability occurs when a victim is tricked into opening a URL programmed with a rogue script to steal sensitive information?
A. Persistent XSS vulnerability
B. Non persistent XSS vulnerability
C. Second-order vulnerability
D. DOM-based vulnerability
B. Non persistent XSS vulnerability
Angela wants to group together computers by department to make it easier for them to share network resources. Which of the following will allow her to group computers logically?
A. VLAN
B. Open network architecture
C. Intranet
D. VAN
A. VLAN
Which of the following incorrectly describes how routing
commonly takes place on the Internet?
A. EGP is used in the areas “between” each AS.
B. Regions of nodes that share characteristics and behaviors are called ASs.
C. CAs are specific nodes that are responsible for routing to
nodes outside of their region.
D. Each AS uses IGP to perform routing functionality.
C. CAs are specific nodes that are responsible for routing to
nodes outside of their region.
Both de facto and proprietary interior protocols are in use
today. Which of the following is a proprietary interior protocol that chooses the best path between the source and destination?
A. IGRP
B. RIP
C. BGP
D. OSPF
A. IGRP
Which of the following does not describe IP telephony security?
A. VoIP networks should be protected with the same security controls used on a data network.
B. Softphones are more secure than IP phones.
C. As endpoints, IP phones can become the target of attacks.
D. The current Internet architecture over which voice is
transmitted is less secure than physical phone lines.
B. Softphones are more secure than IP phones.
When an organization splits naming zones, the names of its
hosts that are only accessible from an intranet are hidden from the Internet. Which of the following best describes why this is done?
A. To prevent attackers from accessing servers
B. To prevent the manipulation of the hosts file
C. To avoid providing attackers with valuable information that can be used to prepare an attack
D. To avoid providing attackers with information needed for
cybersquatting
C. To avoid providing attackers with valuable information that can be used to prepare an attack
Which of the following best describes why e-mail spoofing is
easily executed?
A. SMTP lacks an adequate authentication mechanism.
B. Administrators often forget to configure an SMTP server toprevent inbound SMTP connections for domains it doesn’t
serve.
C. Keyword filtering is technically obsolete.
D. Blacklists are undependable.
A. SMTP lacks an adequate authentication mechanism.
Which of the following is not a benefit of VoIP?
A. Cost
B. Convergence
C. Flexibility
D. Security
D. Security
Which of the following is not a benefit of VoIP?
A. Cost
B. Convergence
C. Flexibility
D. Security
D. Security
Today, satellites are used to provide wireless connectivity
between different locations. What two prerequisites are needed for two different locations to communicate via satellite links?
A. They must be connected via a phone line and have access to a modem.
B. They must be within the satellite’s line of sight and footprint.
C. They must have broadband and a satellite in low Earth orbit.
D. They must have a transponder and be within the satellite’s footprint.
B. They must be within the satellite’s line of sight and footprint.
Brad is a security manager at Thingamabobs Inc. He is
preparing a presentation for his company’s executives on the risks of using instant messaging (IM) and his reasons for
wanting to prohibit its use on the company network. Which of the following should not be included in his presentation?
A. Sensitive data and files can be transferred from system to
system over IM.
B. Users can receive information—including malware—from an attacker posing as a legitimate sender.
C. IM use can be stopped by simply blocking specific ports on the network firewalls.
D. A security policy is needed specifying IM usage restrictions
C. IM use can be stopped by simply blocking specific ports on the network firewalls.
Hanna is a new security manager for a computer consulting
company. She has found out that the company has lost
intellectual property in the past because malicious employees installed rogue devices on the network, which were used to capture sensitive traffic. Hanna needs to implement a solution that ensures only authorized devices are allowed access to the company network. Which of the following IEEE standards was developed for this type of protection?
A. IEEE 802.1AR
B. IEEE 802.1AE
C. IEEE 802.1AF
D. IEEE 802.1XR
A. IEEE 802.1AR
There are common cloud computing service models.
_______________ usually requires companies to deploy their
own operating systems, applications, and software onto the
provided infrastructure. _________________ is the software
environment that runs on top of the infrastructure. In the
__________ model the provider commonly gives the customers network-based access to a single copy of an application.
A. Platform as a Service, Infrastructure as a Service, Software as a Service
B. Platform as a Service, Platform as Software, Application as a Service
C. Infrastructure as a Service, Application as a Service,
Software as a Service
D. Infrastructure as a Service, Platform as Software, Software as a Service
D. Infrastructure as a Service, Platform as Software, Software as a Service
____________ is a set of extensions to DNS that provides to DNS clients (resolvers) origin authentication of DNS data to reduce the threat of DNS poisoning, spoofing, and similar attack types.
A. Resource records
B. Zone transfer
C. DNSSEC
D. Resource transfer
C. DNSSEC
Which of the following best describes the difference between a virtual firewall that works in bridge mode versus one that is embedded into a hypervisor?
A. Bridge-mode virtual firewall allows the firewall to monitor
individual traffic links, and hypervisor integration allows the
firewall to monitor all activities taking place within a host
system.
B. Bridge-mode virtual firewall allows the firewall to monitor
individual network links, and hypervisor integration allows
the firewall to monitor all activities taking place within a
guest system.
C. Bridge-mode virtual firewall allows the firewall to monitor
individual traffic links, and hypervisor integration allows the
firewall to monitor all activities taking place within a guest
system.
D. Bridge-mode virtual firewall allows the firewall to monitor
individual guest systems, and hypervisor integration allows
the firewall to monitor all activities taking place within a
network system.
A. Bridge-mode virtual firewall allows the firewall to monitor
individual traffic links, and hypervisor integration allows the
firewall to monitor all activities taking place within a host
system.
Who creates and publishes the OSI model from the
following organizations?
A. IEEE
B. ISO
C. IANA
D. IETF
2.Answer: B. ISO
Explanation: The OSI model was developed by the
International Organization for Standardization (ISO). The IEEE, IANA, and IETF are also involved in networking standards, but the OSI model is attributed explicitly to ISO.
Which device listed as follows does not function at
the Data Link or Layer 2?
A. Hub
B. Switch
C. Wireless access point
D. Bridge
Answer: A. Hub
Explanation: A hub operates at the OSI model’s
Physical Layer (Layer 1), simply forwarding incoming signals to all other ports without any filtering or decision-making process. In contrast, a switch, wireless access point (WAP), and bridge all have functionalities at the Data Link Layer (Layer 2). A switch uses MAC addresses to determine the
destination port for each incoming frame, a WAP allows Wi-Fi devices to connect to a wired network and can use MAC addresses for some decision making processes, and a bridge is used to divide a network into segments, filtering traffic between them using MAC addresses. Therefore, the correct
answer is A. Hub, as it is the only device not operating at the Data Link Layer.
Which protocols work at the Transport Layer, or
Layer 4, and offer a best-effort, connectionless
method for delivering segments?
A. ARP
B. IGMP
C. TCP
D. UDP
Answer: D. UDP
Explanation: The User Datagram Protocol (UDP)
operates at the Transport Layer and is known for its
best-effort, connectionless delivery. Unlike TCP, it
does not provide error checking or guaranteed
delivery, making it faster but less reliable. ARP and
IGMP do not operate at this layer.
What is the term for the data and header information
processed at the Network Layer, or Layer 3, of the
OSI model?
A. Packet
B. Data stream
C. Frame
D. Segment
Answer: A. Packet
Explanation: At Layer 3 of the OSI model,
information is processed into units known as
packets. This layer is responsible for logical
addressing, routing, and path determination. The
terms frame and segment refer to Layer 2 and 4
units, respectively, while “data stream” doesn’t
specifically refer to a Layer 3 structure.
Which of the following sequences accurately
represents the order of the OSI model layers when
processing incoming data from the network media?
A. Application, Presentation, Session, Transport,
Network, Data Link, Physical
B. Physical, Transport, Network, Data Link, Presentation, Session, Application
C. Application, Session, Presentation, Transport,
Network, Data Link, Physical
D. Physical, Data Link, Network, Transport,
Session, Presentation, Application
Answer: D. Physical, Data Link, Network, Transport,
Session, Presentation, Application
Explanation: When processing inbound data from
the network, the OSI model layers are traversed
from the Physical Layer (Layer 1) to the Application
Layer (Layer 7). Option D correctly lists the layers in
this order.
Which of the following media types offers the highest protection against the detection of emanations?
A. Coax
B. Shielded twisted pair
C. Unshielded twisted pair
D. Fiber optic
Answer: D. Fiber optic
Explanation: Fiber-optic cables use light signals
to transmit data, making them less susceptible to
electromagnetic interference (emanation detection).
Therefore, fiber-optic cables provide the best
protection against this type of detection compared to
other listed media types.
Which of the following media access control methods
is based on contention?
A. Token-passing bus
B. Carrier Sense Multiple Access with Collision
Detection (CSMA/CD)
C. Token-passing ring
D. Polling
Answer: B. Carrier Sense Multiple Access with
Collision Detection (CSMA/CD)
Explanation: Carrier Sense Multiple Access with
Collision Detection (CSMA/CD) is based on
contention among the media access control methods
listed. In this method, devices listen to the network
and transmit when they believe the channel is free.
If a collision is detected, they stop and wait for a
random time before trying again. This contrasts with
other methods, such as the token-passing bus and
token-passing ring, where devices must wait for a
token to transmit data, ensuring orderly access, and
polling, where a master device controls access
without contention.
What filter is used in firewalls to block packets
leaving a private network using a public source IP
address?
A. Ingress filter
B. Content filter
C. Egress filter
D. Stateful filter
Answer: C. Egress filter
Explanation: An egress filter controls traffic flow
as it leaves a network, blocking traffic that should
not be exiting the network, such as packets with a
public source IP address from a private network.
How is a bastion host best described?
A. A system that has been hardened against attack
B. A system that uses a default deny rule
C. A system that performs FQDN-to-IP-address
resolution
D. A system that replaces private IP addresses with
public IP addresses as the packet exits the
private network
Answer: A. A system that has been hardened against
attack Explanation: A bastion host is best described as a
system hardened against attack (option A). It is a
special-purpose computer on a network specifically
designed and configured to withstand attacks,
serving as a critical part of a network’s security
system. While other options may describe various
network functions, such as a default deny rule
(option B), FQDN-to-IP-address resolution (option C,
typically a DNS server) or replacing private IP
typically a DNS server), or replacing private IP
addresses with public ones as the packet exits the
private network (option D, describing Network
Address Translation), they do not define the primary
function of a bastion host.
Which protocol places a tag in front of the Layer 2
header of a frame to help its transmission through
the protocol-compliant cloud?
A. Multiprotocol Label Switching (MPLS)
B. Network Address Translation (NAT)
C. Open Shortest Path First (OSPF)
D. Dynamic Host Configuration Protocol (DHCP)
Answer: A. Multiprotocol Label Switching (MPLS)
Explanation: Multiprotocol Label Switching
(MPLS) is a protocol that uses labels to route
packets quickly through a network. These labels are
inserted before the Layer 2 header, allowing routers
to forward the packets based on the labels without
looking at the packet’s actual content.
Which of the following options enables systems to
utilize various existing and future mechanisms for
authenticating user identities?
A. Zero-knowledge proof
B. Extensible Authentication Protocol (EAP)
C. Challenge Handshake Authentication Protocol
(CHAP)
D. Synchronous Optical Network (SONET)
Answer: B. Extensible Authentication Protocol (EAP)
Explanation: Extensible Authentication Protocol
(EAP) is a framework frequently used in network
security and authentication. It supports multiple
authentication methods, including token cards,
smart cards, and public key authentication. It can
also be extended to support new authentication
mechanisms as they are developed, making it a
fitting choice for the question.
Which IEEE specification refers to a wireless access
point employing multiple transmitters, receivers, and antenna?
A. 802.11h
B. 802.11j
C. 802.11b
D. 802.11n
Answer: D. 802.11n
Explanation: The IEEE 802.11n specification is
designed to support multiple-input and multipleoutput (MIMO) technology, which uses several
transmitters and receivers to send and receive more
data simultaneously. This technology increases the
performance and range of wireless connections.
Which attack from the following options utilizes a
collection of compromised computers, known as
zombies?
A. Ping of death
B. DDoS attack
C. LAND attack
D. SYN flood
Answer: B. DDoS attack
Explanation: A distributed denial-of-service
(DDoS) attack involves an “army” of compromised
computers, often called zombies or bots, which an
attacker controls. These computers flood a target
system with traffic, rendering it inaccessible. Other
options listed do not typically involve using multiple
compromised computers in the same way as a DDoS
attack.
On which layer of the OSI reference model is
Ethernet (IEEE 802.3) positioned?
A. Layer 1 – Physical Layer
B. Layer 2 – Data Link Layer
C. Layer 3 – Network Layer
D. Layer 4 – Transport Layer
Answer: B. Layer 2 – Data Link Layer
Explanation: Ethernet (IEEE 802.3) operates at
the OSI model’s Data Link Layer (Layer 2). It is
responsible for the framing, addressing, and error
detection of data packets.
What would be considered the BEST proactive
network defense strategy?
A. Redundant firewalls
B. Business continuity planning
C. Disallowing P2P traffic
D. Perimeter surveillance and intelligence gathering
Answer: D. Perimeter surveillance and intelligence
gathering
Explanation: Among the options provided, the
BEST proactive network defense strategy would be
D. Perimeter surveillance and intelligence gathering.
While redundant firewalls (option A) increase
resilience, business continuity planning (option B) is
more reactive, and disallowing P2P traffic (option C)
is a specific measure not applicable to all
organizations, perimeter surveillance and
intelligence gathering (option D) represents a
comprehensive and proactive approach. By
monitoring the perimeter and gathering intelligence
on potential threats, an organization can identify and
mitigate risks before they materialize, making this
strategy the most holistic and effective choice for
proactive defense.
In which scenario is the network not the direct target of the attack?
A. A denial-of-service attack on servers on a network
B. Hacking into a router
C. A virus outbreak saturating network capacity
D. A man-in-the-middle attack
Answer: D. A man-in-the-middle attack
Explanation: A man-in-the-middle (MITM) attack
primarily targets the communication between two
parties rather than the network itself. The attacker
intercepts, alters, or relays messages between two
parties without them knowing that they are being
manipulated.
What is the MOST effective Countermeasure against a distributed denial-of-service (DDoS) attack?
A. Secret fully qualified domain names (FQDNs)
B. Redundant network layout
C. Traffic filtering
D. Network Address Translation (NAT)
Answer: C. Traffic filtering
Explanation: Among the options provided, the MOST effective countermeasure against a distributed denial-of-service (DDoS) attack is C. Traffic filtering. While keeping a fully qualified domain name’s (FQDN’s) secret (option A) may obscure targets and having a redundant network layout (option B) can increase resilience, neither approach directly addresses the nature of DDoS
attacks. On the other hand, traffic filtering (option C) involves analyzing incoming traffic and filtering out malicious or unwanted requests. Via identifying
and blocking the traffic associated with a DDoS attack, this method can prevent the attack from reaching its target, thereby maintaining the availability of the service, making it the most effective choice for mitigating such attacks.
Where is the optimal location for network-based intrusion detection systems (NIDS)?
A. On the network perimeter, to alert the network
administrator of all suspicious traffic
B. On network segments with business-critical systems
C. At the network operations center (NOC)
D. At an external service provider
Answer: A. On the network perimeter, to alert the network administrator of all suspicious traffic
Explanation: Placing NIDS on the network
perimeter allows for early detection of suspicious
activity and attacks, providing a critical line of
defense.
Which combination of endpoint devices would MOST likely be included in a converged IP network?
A. File server, IP phone, security camera
B. IP phone, thermostat, cypher lock
C. Security camera, cypher lock, IP phone
D. Thermostat, file server, cypher lock
Answer: A. File server, IP phone, security camera
Explanation: A converged IP network integrates
various services such as voice, video, and data.
Devices like IP phones, security cameras, and file
servers are common in these environments.
What security advantage does fiber optic cable offer over copper cables?
A. Fiber optics provides higher bandwidth.
B. Fiber optics are more difficult to wiretap.
C. Fiber optics are immune to wiretap.
D. None – the two are equivalent; network security is independent of the Physical Layer.
Answer: B. Fiber optics are more difficult to wiretap.
Explanation: Fiber-optic cables transmit data using light signals, making them more difficult to intercept or wiretap than copper cables that use electrical signals.
What devices are best to be included in a robust network perimeter defense strategy?
A. A boundary router, a firewall, a proxy server
B. A firewall, a proxy server, a host-based intrusion detection system (HIDS)
C. A proxy server, a host-based intrusion detection system (HIDS), a firewall
D. A host-based intrusion detection system (HIDS), a firewall, a boundary router
Answer: A. A boundary router, a firewall, a proxy server
Explanation: A robust network perimeter defense typically includes boundary routers (to route data), firewalls (to filter traffic), and proxy servers (to act as intermediaries between internal and external networks).
What is the principal security risk associated with wireless LANs?
A. Lack of physical access control
B. Demonstrably insecure standards
C. Implementation weaknesses
D. War driving
Answer: A. Lack of physical access control
Explanation: Wireless LANs are susceptible to risks from the lack of physical access control. Since the signals are transmitted through the air, unauthorized individuals can access the network without physical access to a network jack or cable.
Which configuration related to a WLAN’s SSID
provides adequate security protection?
A. Using an obscure SSID to confuse and distract
an attacker
B. Not using any SSID at all to prevent an attacker
from connecting to the network
C. Not broadcasting an SSID to make it harder to
detect the WLAN
D. An SSID does not provide protection
Answer: D. An SSID does not provide protection
Explanation: An SSID (Service Set Identifier) is
simply a network name and does not provide any
inherent security protection. While hiding or
obscuring an SSID might make it slightly more
difficult for casual users to find the network, it does
not deter determined attackers. Tools that can
discover hidden SSIDs are readily available, so
relying on an SSID for security is not an effective
strategy. Therefore, the correct answer is that an
SSID does not provide protection, and other security
measures, such as robust encryption and
authentication methods, should be implemented to
secure a WLAN.
What is true about IPSec?
A. It provides mechanisms for authentication and
encryption.
B. It provides mechanisms for non-repudiation.
C. It will only be deployed with IPv6.
D. It only authenticates clients against a server.
Answer: A. It provides mechanisms for
authentication and encryption.
Explanation: IPSec (Internet Protocol Security) is
a suite of protocols that secure Internet Protocol (IP)
communications by authenticating and encrypting
each IP packet in a data stream. The other options
are not accurate descriptions of IPSec’s primary
function.
What is the principal weakness of the Domain Name
System (DNS)?
A. Lack of authentication of servers and thereby authenticity of records
B. Its latency, which enables insertion of records between the time when a record has expired and when it is refreshed
C. The fact that it is a simple, distributed, hierarchical database instead of a singular, relational one, thereby giving rise to the possibility of inconsistencies going undetected
for a certain amount of time
D. The fact that addresses in email can be spoofed
without checking their validity in DNS, caused
by the fact that DNS addresses are not digitally
signed
Answer: A. Lack of authentication of servers and
thereby authenticity of records
Explanation: The principal weakness of DNS lies
in its lack of authentication, which can allow
malicious actors to perform attacks like DNS
spoofing. This can lead to false DNS responses,
redirecting users to fraudulent websites.
What is the function of a security event management
(SEM) service?
A. Gathers firewall logs for archiving
B. Aggregates logs from security devices and application servers looking for suspicious activity
C. Reviews access control logs on servers and physical entry points to match user system authorization with physical access permissions
D. Coordination software for security conferences
and seminars
Answer: B. Aggregates logs from security devices and application servers looking for suspicious activity
Explanation: Security event management (SEM)
focuses on real-time monitoring, correlating events,
notifications, and console views. It aggregates log
data generated throughout the organization’s
technology infrastructure, looking for signs of
malicious or otherwise suspicious activity.
Which statement about open email relays is incorrect?
A. An open email relay is a server that forwards email from domains other than the ones it serves.
B. Open email relays are a principal tool for distribution of spam.
C. Using a deny list of open email relays provides a Using a deny list of open email relays provides a secure way for an email administrator to identify open mail relays and filter spam.
D. An open email relay is widely considered a sign of bad system administration.
Answer: C. Using a deny list of open email relays provides a secure way for an email administrator to identify open mail relays and filter spam
Explanation: Relying solely on a denylist of open
email relays is not a secure way to filter spam. Open
relays constantly change, and denylists may become
outdated quickly, leading to false positives or
negatives.
How can a botnet be characterized?
A. A network used solely for internal communications
B. An automatic security alerting tool for corporate networks
C. A group of dispersed, compromised machines controlled remotely for illicit reasons
D. A type of virus
Answer: C. A group of dispersed, compromised
machines controlled remotely for illicit reasons
Explanation: A botnet is a network of
compromised computers, known as “bots” or
“zombies,” controlled remotely by an attacker. These
machines can be commanded to perform malicious
activities such as DDoS attacks, spam distribution,
or other illicit actions.
Why is a mesh network topology rarely implemented
in modern networks?
A. Cost
B. Poor redundancy
C. Throughput
D. Optical fiber limits
Answer: A. Cost
Explanation: Mesh networks provide high
redundancy and resilience by creating multiple
connections between devices, but the complexity and
the need for more cabling or connections make them
more expensive to implement and maintain.
What offers the strongest wireless encryption when
installing an 801.11n wireless access point?
A. WPA
B. WEP
C. PKI
D. WPA2
Answer: D. WPA2
Explanation: WPA2 (Wi-Fi Protected Access 2)
provides stronger data protection by using the
Advanced Encryption Standard (AES) protocol. It is
considered more secure than the other options
listed.
What media is best suited in a heavy manufacturing
area with substantial electromagnetic radiation and power fluctuations if little traffic degradation is tolerated?
A. Coax cable
B. Wireless
C. Shielded twisted pair
D. Fiber
Answer: D. Fiber
Explanation: Fiber-optic cables use light to
transmit data, making them immune to
electromagnetic interference (EMI) and power
fluctuations. They are the most suitable option in
environments where such interference is prevalent.
What is true about multilayer protocols like Modbus
used in industrial control systems?
A. Often have their own encryption and security like IPv6
B. Are used in modern routers as a routing interface control
C. Are often insecure by their very nature as they were not designed to natively operate over today’s IP networks
D. Have largely been retired and replaced with newer protocols such as IPv6 and NetBIOS
Answer: C. Are often insecure by their very nature
as they were not designed to natively operate over
today’s IP networks
Explanation: Modbus and similar multilayer
protocols used in industrial control systems were
designed for closed, trusted environments. As they
were not created with modern security challenges in
mind, they often lack the necessary security features
to protect against current threats, particularly when
adapted to operate over the public Internet.
For a security professional needing to administer a server remotely, assuming they can access the BEST
server from their location, what is the BEST approach for access?
A. TELNET
B. SSHv2
C. FTP
D. TFTP
Answer: B. SSHv2
Explanation: SSHv2 (Secure Shell version 2) is a
network protocol providing secure remote server
access. Unlike TELNET, FTP, and TFTP, which send
information, including passwords, in clear text,
SSHv2 encrypts the session, making it a far more
secure option for remote administration.
As a security consultant for a company that requires
a secure connection for online financial transactions,
what Extensible Authentication Protocol would you
recommend that’s the most secure but also the most
costly?
A. EAP-LEAP
B. EAP-MD5
C. EAP-TLS
D. EAP-SIM
Answer: C. EAP-TLS
Explanation: EAP-TLS (Extensible Authentication
Protocol–Transport Layer Security) provides strong
security by using client and server authentication
certificates. It’s considered highly secure but costly
and complex to implement due to the need for a
public key infrastructure (PKI) to manage the
certificates.
If two people are discussing stealing electronic serial
numbers (ESNs), what type of attack is being planned?
A. Bank card hacking
B. Modem hacking
C. PBX hacking
D. Cell phone hacking
Answer: D. Cell phone hacking
Explanation: Stealing electronic serial numbers
(ESNs) is associated with cell phone hacking. ESNs
are unique identifiers for mobile devices, and
unauthorized access can be used for fraudulent
activities.
What is the BEST protocol if a company needs link to-link communications supporting encryption and authentication compatible with IPv6 and using L2TP at Layer 3 of the OSI model?
A. IPSec Transport mode
B. IPSec Tunnel mode
C. PPTP
D. L2F
Answer: B. IPSec Tunnel mode
Explanation: IPSec Tunnel mode is suitable for
encrypting traffic between different networks, and it
supports both IPv4 and IPv6. It best fits this
scenario, providing the required encryption and
authentication for link-to-link communications.
Which mechanism converts internal IP addresses found in IP headers into public addresses for transmission over the Internet?
A. ARP
B. DNS
C. DHCP
D. NAT
Answer: D. NAT
Explanation: NAT (Network Address Translation) is the process of translating private IP addresses into public IP addresses for communication over the
Internet. This enables multiple devices within a local network to share a single public IP address.
If you need to implement IPv6 on an existing IPv4 network without a native connection to an IPv6 network, what technology should you use?
A. VRRP
B. Teredo
C. 802.1AE
D. 6to4
Answer: D. 6to4
Explanation: 6to4 is a transition mechanism for migrating from IPv4 to IPv6, allowing IPv6 packets to be transmitted over an IPv4 network. It’s suitable for a scenario with no native connection to an IPv6 network.
What is the term for a situation where a path is no longer available and shows an infinite hop count?
A. Loopback
B. Split horizon
C. Classless Inter-Domain Routing
D. Poison reverse
Answer: D. Poison reverse
Explanation: Poison reverse is the term for a
situation where a path is no longer available and
shows an infinite hop count. Among the given
options, loopback refers to a special IP address used
for testing, split horizon is a method to prevent
routing loops by restricting route advertisement, and
Classless Inter-Domain Routing (CIDR) is a method
for allocating IP addresses. In contrast, poison
reverse is used in distance-vector routing protocols
to prevent routing loops. When a router learns that a
route is no longer available, it advertises the route
with an infinite metric, effectively “poisoning” the
route and informing other routers that it is no longer
reachable, making it the correct answer for the
described situation.
What is a current updated standard to the WEP protocol?
A. WPA2
B. SMLI
C. PGP
D. POP
Answer: A. WPA2
Explanation: WPA2 (Wi-Fi Protected Access 2) enhances WEP (Wired Equivalent Privacy) and WPA, which provides more robust security. It has become the standard for securing wireless networks.
What closely resembles a packet filtering device, making decisions based on addresses, ports, and protocols?
A. Stateless firewall
B. Circuit-level proxy
C. Application proxy
D. Stateful firewall
Answer: A. Stateless firewall
Explanation: A stateless firewall filters packets based solely on predefined rules concerning the source and destination IP addresses, ports, and protocols without keeping track of the state of active
connections. It is the simplest type of firewall and closely resembles a packet filtering device.
What protocol is a forerunner to Frame Relay and works over POTS lines?
A. SMDS
B. ATM
C. X.25
D. T-carriers
Answer: C. X.25
Explanation: X.25 is a protocol suite widely used in the 1980s for packet-switched network services over public data networks (including over POTS lines). It’s considered a forerunner to newer protocols like Frame Relay.
What does RADIUS provide?
A. Authentication and accountability
B. Authorization and accountability
C. Authentication and authorization
D. Authentication, authorization, and accountability
Answer: D. Authentication, authorization, and accountability
Explanation: RADIUS (Remote Authentication Dial-In User Service) is a protocol that provides centralized authentication, authorization, and
accounting (often called AAA) for network users. It is commonly used in ISP and corporate environments to manage access to network
resources.
Which cell-switched WAN technology is the most suitable to use in rural areas considering that you don’t want to use circuit-switched tech?
A. DSL
B. T1
C. ISDN
D. ATM
Answer: D. ATM
Explanation: ATM (Asynchronous Transfer Mode) is a cell-switched technology that uses small, fixed size cells to transmit data. It can be used in various applications, including WAN connections, making it
suitable for the given scenario.
What is considered a third-generation firewall?
A. Packet filter
B. Circuit proxy
C. Application proxy
D. Stateful firewall
Answer: D. Stateful firewall
Explanation: Third-generation firewalls are
referred to as stateful firewalls. They monitor the state of active connections and make decisions based on the context of the traffic, such as TCP handshake completion and more.
Identify the protocols corresponding to OSI Layers 2, 6, 3, 4, and 7, respectively.
A. ARP, SQL, ICMP, SMB, and SNMP
B. L2TP, SMB, IP, SQL, and HTTP
C. WEP, ASCII, IPX, TCP, and BootP
D. PPP, ZIP, SPX, UDP, and TFTP
Answer: D. PPP, ZIP, SPX, UDP, and TFTP
Explanation: The question requires identifying
protocols corresponding to OSI Layers 2, 6, 3, 4, and
7. The correct match for these layers would be
protocols responsible for node-to-node
communication (Layer 2), data translation including
encryption and formatting (Layer 6), routing and
forwarding (Layer 3), ensuring reliable data transfer
(Layer 4), and interfacing with applications and enduser services (Layer 7). Analyzing the given options,
the correct answer is D. PPP, ZIP, SPX, UDP, and
TFTP, as these protocols correspond respectively to
the functions of the specified OSI layers Other
the functions of the specified OSI layers. Other
options include protocols that do not typically align
with the required OSI layers for this question.
Which wireless standard operates in the frequency
range of 5.15–5.35 GHz to 5.725–5.825 GHz and has a range of approximately 60 feet?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
Answer: A. 802.11a
Explanation: The 802.11a standard operates in
the 5 GHz bands, specifically in the 5.15–5.35 GHz
and 5.725–5.825 GHz ranges, and typically has a
shorter range, around 60 feet, depending on the
environment and obstacles.
What is the BEST description of ISAKMP (Internet
Security Association and Key Management Protocol)?
A. Defines procedures for managing Security Associations, utilizes IKE, etc.
B. Enables authentication of parties in a secure transition and contains certificate details
C. Manages private keys and certificates and follows X.509 standard
D. Defines protection of keys, establishes key lifetimes, and includes elements of business continuity
Answer: A. Defines procedures for managing
Security Associations, utilizes IKE, etc
Explanation: ISAKMP is a protocol that defines
procedures and packet formats for the
establishment, negotiation, modification, and
deletion of Security Associations. It typically uses
IKE (Internet Key Exchange) for key exchange but
can implement other methods, making option A the
correct description.
What is the OSI model in the context of network communication?
A. A seven-layer architecture for open systems interconnection
B. A five-layer architecture for closed systems interconnection
C. A protocol for data encryption
D. A type of firewall technology
Answer: A. A seven-layer architecture for open systems interconnection
Explanation: The OSI (open systems
interconnection) model is a structured, layered architecture comprising seven layers. It allows open systems to interconnect and communicate with each
other using protocols.
Which of the following is NOT a method to handle collisions in network topologies?
A. Token-based collision avoidance
B. Polling
C. Carrier Sense Multiple Access (CSMA)
D. Data fragmentation
Answer: D. Data fragmentation
Explanation: Data fragmentation is not a method
to handle collisions. The methods mentioned in the
content for handling collisions are token-based
collision avoidance, polling, and Carrier Sense
Multiple Access (CSMA).
What is the primary function of the Address Resolution Protocol (ARP)?
A. Mapping IP addresses to MAC addresses
B. Encrypting data packets
C. Managing wireless signals
D. Detecting network intrusions
Answer: A. Mapping IP addresses to MAC addresses
Explanation: ARP (Address Resolution Protocol)
Explanation: ARP (Address Resolution Protocol)
allows IP addresses to be mapped to physical MAC
addresses. It facilitates communication between
devices on a network.
Which of the following is a security feature of the Open Shortest Path First (OSPF) routing protocol?
A. Data fragmentation
B. IP mapping
C. Encryption
D. Voice over IP
Answer: C. Encryption
Explanation: OSPF (Open Shortest Path First) is a routing protocol routers use to manage and direct network traffic. It includes security features such as
encryption, making it a more secure routing
protocol.
What is the purpose of a Virtual Local Area Network (VLAN)?
A. To increase the speed of data transmission
B. To create virtual tunnels through physical networks to connect devices
C. To detect and prevent network attacks
D. To encrypt wireless communication
Answer: B. To create virtual tunnels through physical networks to connect devices
Explanation: VLAN (Virtual Local Area Network) can be created using devices, technologies, and software. It reduces the need for physical rewiring by creating virtual tunnels through physical networks to connect devices, thereby enhancing
network management and security.
Which of the following is a type of cable that utilizes
light pulses to represent 0s and 1s?
A. Twisted pair
B. Coaxial
C. Fiber optic
D. Radio frequency
Answer: C. Fiber optic
Explanation: Fiber-optic cable utilizes light pulses
to represent 0s and 1s. It offers great advantages in
speed and security compared to other types of
cables like twisted pair and coaxial.
What is the primary purpose of the Internet Control
Message Protocol (ICMP)?
A. Encrypting data
B. Providing feedback about problems in the
network communication environment
C. Managing wireless signals
D. Handling collisions
Answer: B. Providing feedback about problems in the
network communication environment
Explanation: ICMP (Internet Control Message
Protocol) is used for messaging and specifically
provides feedback about problems in the network
communication environment. Commands like Ping
and traceroute utilize ICMP.
Which of the following security solutions for the
802.11 wireless protocol family is the most updated?
A. WEP
B. WPA
C. WPA2
D. WPA3
Answer: D. WPA3
Explanation: WPA3 (Wi-Fi Protected Access 3) is
a security solution for the 802.11 wireless protocol
family released in 2018 It includes access control
family, released in 2018. It includes access control,
authentication, encryption, and integrity protection.
What is the main difference between a denial-of service (DoS) attack and a distributed denial-of service (DDoS) attack?
A. DoS involves multiple machines, while DDoS involves a single machine.
B. DoS involves a single machine, while DDoS involves multiple machines.
C. DoS encrypts data, while DDoS decrypts data.
D. DoS and DDoS are the same and have no differences.
Answer: B. DoS involves a single machine, while
DDoS involves multiple machines.
Explanation: A denial-of-service (DoS) attack
involves a single machine attempting to impede or
deny functionality, while a distributed denial-of service (DDoS) attack involves multiple devices
acting in unison to achieve the same goal.
Which of the following is NOT a layer in the OSI
model?
A. Application
B. Session
C. Transport
D. Fragmentation
Answer: D. Fragmentation
Explanation: The OSI model consists of seven
layers: Application, Presentation, Session, Transport,
Network, Data Link, and Physical. Fragmentation is
not one of the layers in the OSI model.
Which of the following protocols is responsible for
securely transmitting data over the Internet?
A. HTTPS
B. ICMP
C. ARP
D. OSPF
Answer: A. HTTPS
Explanation: HTTPS (Hypertext Transfer Protocol
Secure) securely transmits data over the Internet. It
encrypts the client and server data, ensuring
confidentiality and integrity.
What is the primary function of the Data Link Layer
in the OSI model?
A. Routing data between networks
B. Encrypting data
C. Providing error detection and correction at the
physical level
D. Managing sessions between applications
Answer: C. Providing error detection and correction
at the physical level
Explanation: The Data Link Layer in the OSI
model provides error detection and correction at the
physical level. It ensures that data frames are
transmitted without errors.
Which of the following is a common method used to prevent unauthorized access to a wireless network?
A. Data fragmentation
B. MAC address filtering
C. ICMP feedback
D. OSPF routing
Answer: B. MAC address filtering
Explanation: MAC address filtering is a security measure that controls access to a wireless network. Allowing or denying specific MAC addresses prevents unauthorized devices from connecting to
the network.
What type of attack involves intercepting and
altering communications between two parties
without their knowledge?
A. Denial-of-service attack
B. Man-in-the-middle attack
C. Distributed denial-of-service attack
D. Brute-force attack
Answer: B. Man-in-the-middle attack
Explanation: A man-in-the-middle (MITM) attack
involves an attacker intercepting and possibly
altering communications between two parties
without their knowledge. It can lead to
eavesdropping or data manipulation.
Which of the following is NOT a characteristic of a
Virtual Private Network (VPN)?
A. Encrypts data transmission
B. Creates a virtual tunnel through the public Internet
C. Allows remote access to a private network
D. Increases data transmission speed
Answer: D. Increases data transmission speed
Explanation: A Virtual Private Network (VPN) encrypts data transmission, creates a virtual tunnel through the public Internet, and allows remote access to a private network. It does not inherently
increase data transmission speed.
What is the main purpose of the Simple Network Management Protocol (SNMP)?
A. Encrypting data transmission
B. Managing network devices
C. Detecting network intrusions
D. Routing data between networks
Answer: B. Managing network devices
Explanation: SNMP (Simple Network
Management Protocol) manages network devices. It allows administrators to monitor, configure, and control network devices such as routers and switches.
Which of the following is a characteristic of a stateful firewall?
A. It monitors only the source and destination addresses.
B. It monitors the state of active connections.
C. It operates only at the Application Layer of the OSI model.
D. It does not require any configuration.
Answer: B. It monitors the state of active
connections.
Explanation: A stateful firewall monitors the state
of active connections and makes decisions based on
the context of the traffic, such as TCP handshake
completion. It provides more advanced filtering
compared to stateless firewalls.
What type of encryption is used by the Wired Equivalent Privacy (WEP) protocol?
A. RSA
B. AES
C. RC4
D. SHA-256
Answer: C. RC4
Explanation: WEP (Wired Equivalent Privacy)
uses the RC4 encryption algorithm. It was an early security protocol for wireless networks but has been largely replaced due to its vulnerabilities.
Which of the following best describes the function of
a proxy server?
A. It provides a direct connection between a client and a server.
B. It acts as an intermediary between a client and a server.
C. It manages network collisions.
D. It encrypts all data on a local network.
Answer: B. It acts as an intermediary between a client and the server.
Explanation: A proxy server is an intermediary between a client and a server. It can provide content filtering, privacy enhancement, and caching
functions.
What is the primary purpose of the Transport Layer
in the OSI model?
A. It provides physical connectivity between devices.
B. It ensures reliable data transmission between devices.
C. It translates data into a user-friendly format.
D. It defines the network topology.
Answer: B. It ensures reliable data transmission
between devices.
Explanation: The Transport Layer in the OSI
model is responsible for ensuring reliable data
transmission between devices. It manages error
recovery and data flow control and ensures that data
packets are delivered in the correct sequence.
Which of the following protocols provides secure file transfer capabilities?
A. FTP
B. HTTP
C. SFTP
D. SNMP
Answer: C. SFTP
Explanation: SFTP (Secure File Transfer Protocol) provides secure file transfer capabilities by encrypting the data during transmission. It ensures the confidentiality and integrity of the files being
transferred.
What is the primary function of the Network Layer in the OSI model?
A. It manages the physical connection between devices.
B. It ensures reliable data transmission.
C. It routes data between different networks.
D. It translates data into a user-friendly format.
Answer: C. It routes data between different
networks.
Explanation: The Network Layer in the OSI model is responsible for routing data between different networks. It determines the best path for data to travel from the source to the destination.
Which of the following is a common method used to authenticate users on a network?
A. Data fragmentation
B. MAC address filtering
C. Two-factor authentication
D. ICMP feedback
Answer: C. Two-factor authentication
Explanation: Two-factor authentication (2FA) is a common method used to authenticate users on a network. It requires two separate forms of identification, enhancing security by adding a layer of authentication.