Cryptographic Solutions Flashcards
1.4 - Explain the importance of using appropriate cryptographic solutions 2.3 - Explain various types of vulnerabilities 2.4 - Given a scenario, you must be able to analyze indicators of malicious activity
Which of the following are true about symmetric encryption? (Choose Two)
A. Uses a single key for encryption and decryption
B. Provides non-repudiation
C. Requires a shared secret key between sender and receiver
D. Is faster than asymmetric encryption
Answer:
A. Uses a single key for encryption and decryption
C. Requires a shared secret key between sender and receiver
Explanation:
Correct Options:
A: Symmetric encryption uses the same key for both encryption and decryption.
C: Both the sender and receiver must share the same secret key, which is a challenge in large-scale usage.
Incorrect Options:
B: Symmetric encryption does not provide non-repudiation because multiple parties share the same key, making it impossible to prove who performed the encryption or decryption.
D: While symmetric encryption is faster than asymmetric encryption, this is not a defining characteristic of symmetric encryption itself.
Which of the following are examples of asymmetric encryption algorithms? (Choose Three)
A. AES
B. RSA
C. Diffie-Hellman
D. ECC (Elliptic Curve Cryptography)
Answer:
B. RSA
C. Diffie-Hellman
D. ECC (Elliptic Curve Cryptography)
Explanation:
Correct Options:
B: RSA is a widely used asymmetric encryption algorithm.
C: Diffie-Hellman is used for secure key exchange and is part of asymmetric cryptography.
D: ECC is an asymmetric encryption method that provides strong security with smaller key sizes.
Incorrect Option:
A: AES is a symmetric encryption algorithm, not asymmetric.
What is the primary advantage of using a hybrid encryption approach?
A. It eliminates the need for encryption keys
B. It combines the speed of symmetric encryption with the key distribution benefits of asymmetric encryption
C. It uses only public keys for encryption and decryption
D. It is slower but more secure than symmetric encryption
Answer:
B. It combines the speed of symmetric encryption with the key distribution benefits of asymmetric encryption
Explanation:
Correct Option:
B: A hybrid approach uses asymmetric encryption to securely share a symmetric key, which is then used for fast bulk data encryption.
Incorrect Options:
A: Encryption keys are still required in a hybrid approach.
C: A hybrid approach uses both public and private keys for key exchange, not just public keys.
D: A hybrid approach is designed to be both fast and secure, not slower.
Which of the following is a characteristic of a stream cipher?
A. Encrypts data in fixed-size blocks
B. Uses a keystream generator and XOR function for encryption
C. Is typically implemented in software
D. Is slower than block ciphers
Answer:
B. Uses a keystream generator and XOR function for encryption
Explanation:
Correct Option:
B: Stream ciphers encrypt data bit-by-bit or byte-by-byte using a keystream generator and XOR function.
Incorrect Options:
A: This describes block ciphers, not stream ciphers.
C: Stream ciphers are often implemented in hardware, not software.
D: Stream ciphers are generally faster than block ciphers, especially for real-time data streams.
What is the main challenge of symmetric encryption in large-scale usage?
A. Lack of confidentiality
B. Difficulty in distributing shared secret keys
C. Slower performance compared to asymmetric encryption
D. Inability to encrypt data in real-time
Answer:
B. Difficulty in distributing shared secret keys
Explanation:
Correct Option:
B: Symmetric encryption requires both parties to share the same secret key, which becomes challenging as the number of users increases.
Incorrect Options:
A: Symmetric encryption provides confidentiality, not a lack of it.
C: Symmetric encryption is faster than asymmetric encryption.
D: Symmetric encryption can encrypt data in real-time, especially with stream ciphers.
Which of the following are common vulnerabilities associated with symmetric encryption? (Choose Two)
A. Key distribution challenges
B. Lack of non-repudiation
C. Susceptibility to brute-force attacks
D. Slower performance compared to asymmetric encryption
Answer:
A. Key distribution challenges
B. Lack of non-repudiation
Explanation:
Correct Options:
A: Distributing shared secret keys securely is a major challenge in symmetric encryption.
B: Symmetric encryption does not provide non-repudiation because multiple parties share the same key.
Incorrect Options:
C: While brute-force attacks are a risk, they are not unique to symmetric encryption.
D: Symmetric encryption is faster than asymmetric encryption.
Which of the following could indicate malicious activity in a network using symmetric encryption? (Choose Two)
A. Unauthorized users gaining access to shared secret keys
B. Frequent changes to public keys
C. Unexpectedly high CPU usage during encryption processes
D. Use of hybrid encryption for secure communication
Answer:
A. Unauthorized users gaining access to shared secret keys
C. Unexpectedly high CPU usage during encryption processes
Explanation:
Correct Options:
A: Unauthorized access to shared secret keys is a clear indicator of malicious activity.
C: High CPU usage during encryption could indicate a brute-force attack or unauthorized encryption processes.
Incorrect Options:
B: Frequent changes to public keys are not directly related to symmetric encryption.
D: Hybrid encryption is a legitimate and secure approach, not an indicator of malicious activity.
Which of the following are true about DES (Data Encryption Standard)? (Choose Two)
A. It uses a 64-bit key with 56 effective bits due to parity.
B. It encrypts data in 128-bit blocks.
C. It was widely used from the 1970s to the early 2000s.
D. It is a stream cipher.
Answer:
A. It uses a 64-bit key with 56 effective bits due to parity.
C. It was widely used from the 1970s to the early 2000s.
Explanation:
Correct:
A: DES uses a 64-bit key, but only 56 bits are effective for encryption due to parity bits.
C: DES was widely used from the 1970s to the early 2000s before being replaced by more secure algorithms.
Incorrect Options:
B: DES encrypts data in 64-bit blocks, not 128-bit blocks.
D: DES is a block cipher, not a stream cipher.
What is the effective key strength of Triple DES (3DES)?
A. 56 bits
B. 112 bits
C. 128 bits
D. 256 bits
Answer:
B. 112 bits
Explanation:
Correct:
B: Triple DES uses three 56-bit keys, resulting in an effective key strength of 112 bits.
Incorrect Options:
A: 56 bits is the key strength of standard DES, not 3DES.
C: 128 bits is the key size for AES-128, not 3DES.
D: 256 bits is the key size for AES-256, not 3DES.
Which of the following symmetric algorithms is a stream cipher?
A. AES
B. RC4
C. Blowfish
D. Twofish
Answer:
B. RC4
Explanation:
Correct:
B: RC4 is a stream cipher, unlike the others listed, which are block ciphers.
Incorrect Options:
A: AES is a block cipher.
C: Blowfish is a block cipher.
D: Twofish is a block cipher.
Which of the following algorithms was chosen as the replacement for DES and 3DES by the US government?
A. IDEA
B. AES
C. Blowfish
D. RC6
Answer:
B. AES
Explanation:
Correct:
B: AES (Advanced Encryption Standard) was chosen by the US government as the replacement for DES and 3DES.
Incorrect Options:
A: IDEA was a contender but not chosen.
C: Blowfish was developed as a DES replacement but not widely adopted.
D: RC6 was a contender but not chosen.
Which of the following are true about AES (Advanced Encryption Standard)? (Choose Three)
A. It supports key sizes of 128, 192, and 256 bits.
B. It is also known as the Rijndael Cipher.
C. It is a stream cipher.
D. It is the encryption standard for sensitive unclassified information.
Answer:
A. It supports key sizes of 128, 192, and 256 bits.
B. It is also known as the Rijndael Cipher.
D. It is the encryption standard for sensitive unclassified information.
Explanation:
Correct:
A: AES supports key sizes of 128, 192, and 256 bits.
B: AES is also known as the Rijndael Cipher, named after its creators.
D: AES is the encryption standard for sensitive unclassified information.
Incorrect Options:
C: AES is a block cipher, not a stream cipher.
Which of the following algorithms uses a 128-bit key and is faster and more secure than DES?
A. DES
B. 3DES
C. IDEA
D. RC4
Answer:
C. IDEA
Explanation:
Correct:
C: IDEA (International Data Encryption Algorithm) uses a 128-bit key and is faster and more secure than DES.
Incorrect Options:
A: DES uses a 56-bit key and is less secure.
B: 3DES uses three 56-bit keys but is slower than DES.
D: RC4 is a stream cipher with variable key sizes, not specifically faster or more secure than DES.
Which of the following are true about Blowfish and Twofish? (Choose Two)
A. Both are block ciphers.
B. Both were developed as replacements for DES.
C. Both are patented and proprietary.
D. Both use 128-bit block sizes.
Answer:
A. Both are block ciphers.
B. Both were developed as replacements for DES.
Explanation:
Correct:
A: Blowfish and Twofish are both block ciphers.
B: Both were developed as replacements for DES.
Incorrect Options:
C: Neither Blowfish nor Twofish are patented; they are open source.
D: Blowfish uses a 64-bit block size, while Twofish uses a 128-bit block size.
Which of the following are part of the RC Cipher Suite? (Choose Three)
A. RC1
B. RC4
C. RC5
D. RC6
Answer:
B. RC4
C. RC5
D. RC6
Explanation:
Correct:
B: RC4 is a stream cipher used in SSL and WEP.
C: RC5 is a block cipher with key sizes up to 2048 bits.
D: RC6 is a stronger version of RC5 and was a contender for the DES replacement.
Incorrect Options:
A: RC1 was never published.
Which of the following is the most widely used symmetric encryption algorithm today?
A. DES
B. 3DES
C. AES
D. Blowfish
Answer:
C. AES
Explanation:
Correct:
C: AES is the most widely used symmetric encryption algorithm today and is considered the strongest.
Incorrect Options:
A: DES is outdated and insecure.
B: 3DES is slower and less efficient than AES.
D: Blowfish is not as widely adopted as AES.
Alice wants to send Bob a confidential message. She also wants to ensure that Bob can verify the message’s integrity and confirm that it was indeed sent by her. Which of the following steps should Alice follow to achieve confidentiality, non-repudiation, and integrity?
A. Encrypt the message using Bob’s public key, hash the message using SHA-256, and encrypt the hash using her private key.
B. Hash the message using SHA-256, encrypt the hash using her private key, and encrypt the message using her public key.
C. Encrypt the message using her private key, hash the message using SHA-256, and encrypt the hash using Bob’s public key.
D. Hash the message using SHA-256, encrypt the hash using Bob’s public key, and encrypt the message using her private key.
Answer:
A. Encrypt the message using Bob’s public key, hash the message using SHA-256, and encrypt the hash using her private key.
Explanation:
Correct Option:
A:
Confidentiality is ensured by encrypting the message with Bob’s public key because only Bob can decrypt it using his private key.
Integrity is achieved by hashing the message using SHA-256 to produce a unique fingerprint.
Non-repudiation is provided by encrypting the hash (digital signature) with Alice’s private key because only Alice could have signed it.
Incorrect Options:
B: Encrypting the message with Alice’s public key does not ensure confidentiality because anyone can decrypt it using Alice’s public key.
C: Encrypting the message with Alice’s private key does not ensure confidentiality because anyone can decrypt it using her public key.
D: Encrypting the hash with Bob’s public key is incorrect for non-repudiation because it does not prove that Alice signed it.
Bob receives a confidential message from Alice. The message also includes a digital signature. What steps should Bob take to verify the integrity and authenticity of the message?
A. Decrypt the message using Alice’s public key, hash the message using SHA-256, and compare it to the hash from the digital signature.
B. Decrypt the message using his private key, hash the message using SHA-256, decrypt the signature using Alice’s public key, and compare the hashes.
C. Hash the message using SHA-256, decrypt the hash using Alice’s private key, and compare the hashes.
D. Decrypt the message using his public key, decrypt the hash using Alice’s private key, and compare the hashes.
Answer:
B. Decrypt the message using his private key, hash the message using SHA-256, decrypt the signature using Alice’s public key, and compare the hashes.
Explanation:
Correct Option:
B:
Bob decrypts the message using his private key because the message was encrypted using his public key (confidentiality).
Bob hashes the decrypted message using the same hash algorithm (e.g., SHA-256).
Bob decrypts the digital signature (encrypted hash) using Alice’s public key, verifying that Alice signed it (non-repudiation).
Bob compares the two hashes. If they match, the message’s integrity and authenticity are verified.
Incorrect Options:
A: Decrypting the message with Alice’s public key is incorrect; the message was encrypted with Bob’s public key.
C: The hash from the message must be compared to the decrypted digital signature, not the other way around.
D: Decrypting the message with Bob’s public key is incorrect since the message was encrypted with Bob’s public key and requires his private key.
Alice needs to send a file to Bob. The file must remain confidential, and Bob should be able to verify that Alice was the sender and that the file was not tampered with. Which of the following describes the correct order of operations?
A. Hash the file, encrypt the file with Bob’s public key, and encrypt the hash with Alice’s private key.
B. Encrypt the file with Bob’s private key, hash the file, and encrypt the hash with Alice’s public key.
C. Encrypt the file with Bob’s public key, hash the file, and encrypt the hash with Alice’s private key.
D. Hash the file, encrypt the hash with Bob’s public key, and encrypt the file with Alice’s private key.
Answer:
C. Encrypt the file with Bob’s public key, hash the file, and encrypt the hash with Alice’s private key.
Explanation:
Correct Option:
C:
Alice encrypts the file with Bob’s public key to ensure confidentiality (only Bob can decrypt it).
Alice hashes the file to produce a unique hash for integrity.
Alice encrypts the hash (digital signature) with her private key to provide non-repudiation (proving she signed it).
Incorrect Options:
A: Hashing the file first is fine, but encrypting the file with Alice’s private key does not ensure confidentiality.
B: Encrypting the file with Bob’s private key is incorrect; it must be encrypted with his public key to ensure confidentiality.
D: Encrypting the hash with Bob’s public key is incorrect for non-repudiation, as it does not prove Alice signed it.
You are a security engineer tasked with implementing a digital signature system to verify the authenticity of messages exchanged between your company’s servers and its clients. Your team suggests the following options for signing the hash of the messages. Which three options would be appropriate for signing the hash? (Choose Two)
A. RSA
B. DSA
C. Diffie-Hellman
D. ECDSA
E. AES
Answer:
A. RSA
D. ECDSA
Explanation:
Correct Options:
RSA: RSA is a versatile algorithm that can be used for both encryption and digital signatures. It is commonly used for signing and verifying messages.
ECDSA: The Elliptic Curve Digital Signature Algorithm (ECDSA) is specifically designed for digital signing and is a more efficient alternative to RSA due to its smaller key sizes and faster computations.
Incorrect Options:
DSA: While DSA is also a valid digital signature algorithm, the question asks for two options, and RSA and ECDSA are more widely used in modern implementations.
Diffie-Hellman: Diffie-Hellman is a key exchange protocol, not a digital signature algorithm. It is designed to securely establish shared keys, not sign or verify data.
AES: AES is a symmetric encryption algorithm used for encrypting data, not for signing or verifying messages.
A software company is using Elliptic Curve Cryptography (ECC) to secure its communications. One of the team members suggests using ECC for both encrypting messages and signing them. Why would this not work for the signing process?
A. ECC is only used for key exchange.
B. ECC does not support signing directly; a specific algorithm like ECDSA is needed.
C. ECC cannot be used with public/private key pairs.
D. ECC cannot be used for encrypting data or signing.
Answer:
B. ECC does not support signing directly; a specific algorithm like ECDSA is needed.
Explanation:
Correct Option:
B: Elliptic Curve Cryptography (ECC) is a general cryptographic framework, not a digital signature algorithm by itself. To perform digital signing using ECC, you need a specific algorithm like ECDSA (Elliptic Curve Digital Signature Algorithm).
Incorrect Options:
A: ECC is not limited to key exchange. It can also be used for encryption and as a foundation for digital signature algorithms (e.g., ECDSA).
C: ECC is based on public/private key pairs and is used extensively in cryptography.
D: ECC is widely used for encrypting data and serves as a foundation for secure algorithms like ECDSA for signing.
Your team is evaluating different cryptographic algorithms for signing documents. One team member suggests using Diffie-Hellman for the signing process because it is a robust cryptographic algorithm. What is the main issue with this suggestion?
A. Diffie-Hellman is too slow for signing.
B. Diffie-Hellman is designed for key exchange, not signing.
C. Diffie-Hellman does not support asymmetric key pairs.
D. Diffie-Hellman does not use hashing.
Answer:
B. Diffie-Hellman is designed for key exchange, not signing.
Explanation:
Correct Option:
B: Diffie-Hellman is specifically designed for secure key exchange between parties and is not capable of signing or verifying data.
Incorrect Options:
A: The issue is not about speed; Diffie-Hellman is simply not designed for signing.
C: Diffie-Hellman does use asymmetric key pairs, but they are for secure key exchange, not for signing.
D: Hashing is not relevant to Diffie-Hellman’s purpose, as it is focused on exchanging keys, not signing or verifying data.
A company wants to adopt a digital signature algorithm for signing sensitive email messages. They consider RSA and AES as potential candidates. Why is RSA the correct choice in this context?
A. RSA uses hashing for integrity, while AES does not.
B. RSA can be used for digital signatures, but AES is only for encryption.
C. AES is faster but does not support public/private key pairs.
D. RSA supports both key exchange and encryption, making it better than AES.
Answer:
B. RSA can be used for digital signatures, but AES is only for encryption.
Explanation:
Correct Option:
B: RSA is an asymmetric encryption algorithm that supports both encryption and digital signature operations. AES, on the other hand, is a symmetric encryption algorithm and cannot be used for signing.
Incorrect Options:
A: While RSA uses hashing as part of the digital signature process, this is not the main reason AES cannot be used. AES simply does not support signing.
C: While AES is faster than RSA for encrypting data, it cannot sign data because it is symmetric.
D: The ability to perform key exchange is not directly relevant to why RSA is preferred for digital signatures.
Which of the following explains why specific algorithms like RSA, DSA, or ECDSA are used for digital signatures instead of encryption algorithms like AES ?
A. Digital signature algorithms use hashing to ensure integrity, while encryption algorithms do not.
B. Digital signature algorithms rely on public/private key pairs, which are not used in symmetric encryption.
C. Encryption algorithms cannot generate unique identifiers for messages.
D. Encryption algorithms are too slow for signing.
Answer:
B. Digital signature algorithms rely on public/private key pairs, which are not used in symmetric encryption.
Explanation:
Correct Option:
B: Digital signature algorithms are designed to work with asymmetric cryptography, which involves a public/private key pair. Symmetric algorithms like AES do not have this capability and therefore cannot be used for signing.
Incorrect Options:
A: While hashing is part of the digital signature process, it is not exclusive to digital signature algorithms. Encryption algorithms can also use hashing for other purposes.
C: This is not accurate; encryption algorithms do not generate unique identifiers for messages, but that is also not their purpose.
D: The issue is not speed, but rather the lack of support for public/private key operations in symmetric encryption algorithms.
A developer needs to distribute a software application securely to ensure its authenticity and integrity. The developer decides to use RSA for code signing. Which of the following steps would the developer follow to sign the software?
A. Hash the software code, then encrypt the hash using their private key.
B. Encrypt the entire software code using their private key.
C. Hash the software code, then encrypt the hash using the recipient’s public key.
D. Encrypt the software code using their public key, then attach the encrypted code with the software.
Answer:
A. Hash the software code, then encrypt the hash using their private key.
Explanation:
Correct: Option A is correct because code signing involves hashing the code to create a fixed-size digest and then encrypting that digest with the developer’s private key to create a digital signature.
Incorrect Options:
B: Encrypting the entire software with a private key is highly inefficient and not the purpose of a digital signature.
C: Encrypting with the recipient’s public key ensures confidentiality, not authenticity or integrity.
D: Encrypting with the public key doesn’t verify the authenticity of the developer and would not serve as a valid signature.
A company distributes a software patch and includes a digital signature to verify its integrity. The recipient of the patch downloads the file and uses the company’s public key to decrypt the signature. What will the recipient obtain after decrypting the digital signature?
A. The original software patch.
B. The hash digest of the software patch.
C. A copy of the company’s private key.
D. A certificate verifying the software’s publisher.
Answer:
B. The hash digest of the software patch.
Explanation:
Correct: The digital signature is the encrypted hash digest of the software. Decrypting it with the company’s public key reveals the original hash digest, which can then be compared with a freshly computed hash of the downloaded software to verify integrity.
Incorrect Options:
A: The digital signature does not contain the original software.
C: The private key is never shared and cannot be obtained by decrypting the signature.
D: Certificates verify the publisher’s identity, but they are separate from the digital signature.
A software engineer claims to have signed their software using a hashing algorithm and a regular encryption algorithm like Diffie-Hellman (DH). Why is this process incorrect?
A. DH cannot be used for encrypting a hash digest as it’s not a signing algorithm.
B. Hashing cannot be used in conjunction with encryption.
C. The hash digest cannot be encrypted; only the full software can be encrypted.
D. The process is correct, as any encryption algorithm can sign data.
Answer:
A. DH cannot be used for encrypting a hash digest as it’s not a signing algorithm.
Explanation:
Correct: Option A is correct because digital signature algorithms like RSA or ECDSA are specifically designed for signing purposes. Regular encryption algorithms like DH or ECC (in its standard form) are not designed for signing data.
Incorrect Options:
B: Hashing is essential in signing processes and can be used with encryption.
C: The hash digest can (and should) be encrypted in a digital signature process, not the full software.
D: Not all encryption algorithms are suitable for signing; only specific digital signature algorithms should be used.
When verifying a code signature, a recipient hashes the downloaded software and decrypts the attached digital signature using the developer’s public key. What does the recipient compare to ensure the integrity of the software?
A. The decrypted hash digest and the software’s source code.
B. The hash of the software and the decrypted hash digest.
C. The decrypted hash digest and the developer’s private key.
D. The hash of the software and the recipient’s private key.
Answer:
B. The hash of the software and the decrypted hash digest.
Explanation:
Correct: To verify the code’s integrity, the recipient compares the freshly computed hash of the downloaded software with the hash digest decrypted from the digital signature. If they match, the code has not been tampered with.
Incorrect Options:
A: The software’s source code is not directly involved in this process.
C: The developer’s private key is not accessible during the verification process.
D: The recipient’s private key is irrelevant for verifying a digital signature.
Which of the following is not true about digital signatures in the context of code signing?
A. Digital signatures prove the authenticity of the developer.
B. Digital signatures ensure the confidentiality of the software.
C. Digital signatures protect the integrity of the code.
D. Digital signatures are created by encrypting the hash digest with the developer’s private key.
Answer:
B. Digital signatures ensure the confidentiality of the software.
Explanation:
Correct: Digital signatures are used to ensure authenticity and integrity but not confidentiality. Confidentiality is achieved by encrypting the content with the recipient’s public key, which is unrelated to digital signing.
Incorrect Options:
A: Authenticity is proven as only the developer has access to their private key to sign the hash.
C: Integrity is ensured as tampering with the code would result in a mismatched hash.
D: Digital signatures are created by encrypting the hash digest with the private key, making this statement true.
Alice wants to send a confidential message to Bob. To ensure that only Bob can read the message, Alice retrieves Bob’s public key from a trusted certificate authority (CA). She encrypts the message using this public key. Bob will then decrypt the message using his private key. Which of the following is true about the key distribution process in this scenario?
A. Alice and Bob must share a symmetric key before they can encrypt and decrypt messages.
B. Alice is distributing a private key to Bob.
C. Alice is distributing Bob’s public key to herself.
D. Bob will use his private key to decrypt the message encrypted with his public key.
Answer:
D. Bob will use his private key to decrypt the message encrypted with his public key.
Explanation:
Correct:
D: In asymmetric encryption, a message encrypted with a public key can only be decrypted with the corresponding private key. Since Alice encrypted the message using Bob’s public key, Bob will use his private key to decrypt it.
Incorrect Options:
A: This scenario describes asymmetric encryption, not symmetric encryption. Symmetric encryption requires a shared key, but here, Alice and Bob are using public and private keys, which do not require prior key sharing.
B: Alice is not distributing a private key to Bob. Private keys are never shared; they are kept secret by their owner.
C: Alice is not distributing Bob’s public key to herself. She retrieves Bob’s public key from a trusted certificate authority (CA) to encrypt the message, but this is not considered “distribution” in the context of key exchange.
In a secure communication system, two parties want to exchange confidential data over the internet. They decide to use a Diffie-Hellman key exchange protocol to securely agree on a shared secret key, which will be used for symmetric encryption. During the exchange, the parties only send public information, and they each compute the shared secret key independently.
Which of the following is true about the key exchange process in this scenario?
A. The shared key is sent over the internet and decrypted by both parties.
B. The public keys of the parties are used to compute the shared key without directly transmitting the key itself.
C. Both parties use their private keys to generate a symmetric key for encryption.
D. The Diffie-Hellman process requires the use of a public key infrastructure (PKI).
Answer: B. The public keys of the parties are used to compute the shared key without directly transmitting the key itself.
Explanation:
Correct: In Diffie-Hellman, both parties exchange public information and then independently compute a shared secret key, which is never directly transmitted.
Incorrect Options:
A: The shared key is not sent over the internet; it is computed independently by each party.
C: The Diffie-Hellman process does not use private keys directly to generate a symmetric key for encryption; it focuses on the secure exchange of public values to compute a shared key.
D: While Diffie-Hellman can be used in conjunction with a PKI, it does not require one for its operation.
Bob wants to securely communicate with Alice using symmetric encryption. They decide to use a secure messaging application that relies on a Key Distribution Center (KDC) to distribute the symmetric encryption keys. Alice and Bob authenticate themselves with the KDC, which then sends each of them a copy of the shared symmetric key.
Which of the following statements best describes the key distribution process used here?
A. The KDC distributes a public key to each user for asymmetric encryption.
B. Alice and Bob receive the same symmetric key from the KDC to encrypt and decrypt messages.
C. The KDC ensures that Alice and Bob exchange private keys for encryption.
D. The KDC only sends Alice’s private key to Bob, allowing for secure communication.
Answer: B. Alice and Bob receive the same symmetric key from the KDC to encrypt and decrypt messages.
Explanation:
Correct: The Key Distribution Center (KDC) provides Alice and Bob with a shared symmetric key. This key is used for encryption and decryption during communication.
Incorrect Options:
A: The KDC distributes a symmetric key, not a public key for asymmetric encryption.
C: The KDC does not exchange private keys; it distributes a shared symmetric key.
D: The KDC does not send Alice’s private key to Bob, as private keys should never be shared.
Alice and Bob are using Elliptic Curve Diffie-Hellman (ECDH) to securely exchange a shared key over an insecure channel. Both Alice and Bob exchange public information, and they each compute a shared secret key independently. After this, they use the shared key for encrypting their communication with symmetric encryption.
Which of the following best describes this process?
A. Alice and Bob are using asymmetric encryption to share a symmetric key.
B. The public keys of Alice and Bob are used to create a shared secret key that will be used for symmetric encryption.
C. Alice and Bob use the shared key to encrypt their communication using asymmetric encryption.
D. The key exchange process involves distributing a public key to all parties involved in the communication.
Answer: B. The public keys of Alice and Bob are used to create a shared secret key that will be used for symmetric encryption.
Explanation:
Correct: In ECDH, Alice and Bob use their respective public and private keys to independently compute a shared secret key. This shared key is then used for symmetric encryption.
Incorrect Options:
A: While ECDH is part of an asymmetric encryption system, the key exchange results in a shared secret for symmetric encryption, not a direct encryption of the message using asymmetric encryption.
C: Alice and Bob use the shared secret for symmetric encryption, not asymmetric encryption.
D: The key exchange does not involve distributing public keys to all parties; it involves two parties agreeing on a shared key.
A client and a server are trying to establish a secure communication channel using the RSA key exchange method. The client encrypts the communication with the server’s public key and sends it. The server then uses its private key to decrypt the message.
Which of the following best describes the key distribution process in this scenario?
A. The client and server exchange private keys during the key exchange process.
B. The server’s public key is distributed to the client for encryption purposes.
C. The server distributes its private key to the client for decryption.
D. The client generates both the public and private keys for encryption and decryption.
Answer: B. The server’s public key is distributed to the client for encryption purposes.
Explanation:
Correct: In RSA key exchange, the server’s public key is used by the client to encrypt messages. The server can then use its private key to decrypt the message.
Incorrect Options:
A: The private keys are not exchanged in RSA key exchange; only the public key is shared.
C: The server’s private key is never distributed; it is kept secret.
D: The client only uses the server’s public key for encryption, not both public and private keys.
During a TLS handshake, the server presents a certificate to the client. What is the primary purpose of this certificate?
A. To share the server’s private key with the client
B. To verify the server’s identity to the client
C. To distribute the session key used for encryption
D. To generate the premaster key for the session
Correct Answer:
B. To verify the server’s identity to the client
Explanation:
Correct:
The server’s certificate contains its public key and other details (such as the domain name and the issuing CA). The certificate is used to verify the server’s identity by validating the signature of the issuing CA against the trusted root certificate store in the client’s browser or OS.
Incorrect Options:
A: The server’s private key is never shared during the TLS handshake. Sharing the private key would compromise the server’s security.
C: The session key is not distributed in the server’s certificate. Instead, it is derived later in the handshake process using the premaster key and random values.
D: The premaster key is generated by the client (in RSA-based TLS) or through Diffie-Hellman/ECDH methods. It is not directly related to the server’s certificate.
What role does the trusted root certificate store play during a TLS handshake?
A. It generates the premaster key for the handshake.
B. It verifies the server’s certificate is issued by a trusted CA.
C. It contains all certificates issued to websites worldwide.
D. It establishes the session key used for encryption.
Correct Answer:
B. It verifies the server’s certificate is issued by a trusted CA.
Explanation:
Correct:
The trusted root certificate store contains root certificates of trusted Certificate Authorities (CAs). During a TLS handshake, the browser checks the server’s certificate to ensure that it was issued by one of these trusted CAs.
Incorrect Options:
A: The premaster key is generated as part of the handshake process, not by the trusted root certificate store.
C: The trusted root certificate store does not contain certificates for all websites. It only stores public keys of trusted root CAs.
D: The session key is derived from the premaster key, not the trusted root certificate store.
Which of the following describes the process of generating the session key during the TLS handshake?
A. The client and server exchange random values, which are combined with the premaster key to derive the session key.
B. The session key is transmitted to the server in the server’s digital certificate.
C. The CA generates the session key and distributes it to both the client and the server.
D. The session key is pre-configured on the server and shared with the client.
Correct Answer:
A. The client and server exchange random values, which are combined with the premaster key to derive the session key.
Explanation:
Correct:
In the TLS handshake, both the client and server contribute random values. These random values, combined with the premaster key, are used in a key derivation function (KDF) to generate the session key. The session key is symmetric and is used to encrypt the actual data.
Incorrect Options:
B: The server’s certificate does not contain the session key. It only contains the server’s public key and identification details.
C: The CA does not generate or distribute session keys. Its role is to sign certificates to ensure trust.
D: The session key is dynamically generated during the handshake, not pre-configured.
Which of the following protocols is responsible for securely exchanging the premaster key during a TLS handshake?
A. Diffie-Hellman or Elliptic Curve Diffie-Hellman (ECDH)
B. RSA Digital Signature Algorithm
C. Advanced Encryption Standard (AES)
D. Public Key Infrastructure (PKI)
Correct Answer:
A. Diffie-Hellman or Elliptic Curve Diffie-Hellman (ECDH)
Explanation:
Correct:
Diffie-Hellman (DH) and its variant Elliptic Curve Diffie-Hellman (ECDH) are key exchange algorithms used to securely establish a shared premaster key between the client and server during a TLS handshake. They ensure confidentiality even if someone intercepts the exchange.
Incorrect Options:
B: RSA Digital Signature Algorithm is used for authentication and signing, not for key exchange.
C: AES is a symmetric encryption algorithm, used for encrypting the data after the handshake, not for key exchange.
D: PKI is a framework for managing digital certificates and public/private keys. It is not a specific protocol for key exchange.
During a TLS handshake, how does the client verify that the server’s certificate is trustworthy?
A. By contacting the CA directly to validate the certificate.
B. By checking the CA’s signature on the server’s certificate using the CA’s public key from the trusted root certificate store.
C. By decrypting the server’s certificate with the server’s private key.
D. By generating a session key and embedding it in the certificate.
Correct Answer:
B. By checking the CA’s signature on the server’s certificate using the CA’s public key from the trusted root certificate store.
Explanation:
Correct:
The client validates the server’s certificate by verifying the CA’s digital signature on the certificate. It uses the CA’s public key, stored in the trusted root certificate store, to perform this verification. If the signature matches, the certificate is trustworthy.
Incorrect Options:
A: The client does not directly contact the CA during the handshake. The validation is done locally using the trusted root certificate store.
C: The server’s private key is never used for decrypting its certificate. The private key is used for encryption or signing.
D: The session key is not embedded in the certificate. It is generated during the handshake process.
Why can’t a regular encryption algorithm like Diffie-Hellman or ECC be used for signing during the TLS handshake?
A. Because these algorithms are not designed for signing.
B. Because signing requires symmetric encryption, and these algorithms are asymmetric.
C. Because signing is performed only by CAs, not by servers.
D. Because they don’t support the generation of digital certificates.
Correct Answer:
A. Because these algorithms are not designed for signing.
Explanation:
Correct:
Diffie-Hellman and ECC are key exchange and encryption algorithms, not digital signature algorithms. Signing requires specific algorithms like RSA, DSA, or ECDSA, which are designed to produce and verify digital signatures.
Incorrect Options:
B: Signing does not require symmetric encryption; it uses asymmetric key pairs.
C: Signing is not limited to CAs. Servers can also sign data (e.g., hash digests) using their private keys.
D: Diffie-Hellman and ECC are unrelated to generating digital certificates.
Which of the following are key characteristics of asymmetric algorithms? (Choose Two)
A. Uses a shared secret key
B. Provides confidentiality, integrity, authentication, and non-repudiation
C. Requires only one key for encryption and decryption
D. Uses a key pair (public and private keys)
Answer:
B. Provides confidentiality, integrity, authentication, and non-repudiation
D. Uses a key pair (public and private keys)
Explanation:
Correct Answers:
B: Asymmetric algorithms provide confidentiality (encrypting with the receiver’s public key), integrity (using digital signatures), authentication (verifying the sender’s identity), and non-repudiation (ensuring the sender cannot deny sending the message).
D: Asymmetric algorithms use a key pair: a public key for encryption and a private key for decryption.
Incorrect Answers:
A: This describes symmetric algorithms, which use a shared secret key for both encryption and decryption.
C: Asymmetric algorithms require two keys: a public key for encryption and a private key for decryption.
Which of the following is true about non-repudiation in asymmetric cryptography?
A. It ensures the message cannot be read by unauthorized parties.
B. It is achieved by encrypting the message with the sender’s private key.
C. It is achieved by encrypting the message with the receiver’s public key.
D. It ensures the message has not been altered in transit.
Answer:
B. It is achieved by encrypting the message with the sender’s private key.
Explanation:
Correct Answer:
B: Non-repudiation ensures the sender cannot deny sending the message. This is achieved by encrypting the message (or its hash) with the sender’s private key, which can be verified using their public key.
Incorrect Answers:
A: This describes confidentiality, which is achieved by encrypting the message with the receiver’s public key.
C: Encrypting with the receiver’s public key ensures confidentiality, not non-repudiation.
D: This describes integrity, which is achieved using a digital signature (hashing the message and encrypting the hash with the sender’s private key).
Which of the following asymmetric algorithms is primarily used for key exchange and is vulnerable to man-in-the-middle attacks?
A. RSA
B. ECC
C. Diffie-Hellman
D. ECDSA
Answer:
C. Diffie-Hellman
Explanation:
Correct Answer:
C: Diffie-Hellman is used for secure key exchange, particularly in VPN tunnel establishment (IPSec). However, it is vulnerable to man-in-the-middle attacks unless additional authentication (e.g., passwords or digital certificates) is used.
Incorrect Answers:
A: RSA is used for key exchange, encryption, and digital signatures, but it is not primarily known for being vulnerable to man-in-the-middle attacks.
B: ECC (Elliptic Curve Cryptography) is used for encryption in low-power devices and is not primarily associated with key exchange vulnerabilities.
D: ECDSA (Elliptic Curve Digital Signature Algorithm) is used for digital signatures, not key exchange.
Which of the following are true about RSA? (Choose Three)
A. It relies on the difficulty of factoring large prime numbers.
B. It is widely used for digital signatures and key exchange.
C. It is more efficient than ECC for equivalent security.
D. It supports key sizes ranging from 1024 to 4096 bits.
Answer:
A. It relies on the difficulty of factoring large prime numbers.
B. It is widely used for digital signatures and key exchange.
D. It supports key sizes ranging from 1024 to 4096 bits.
Explanation:
Correct Answers:
A: RSA’s security is based on the mathematical difficulty of factoring large prime numbers.
B: RSA is widely used for digital signatures, key exchange, and encryption.
D: RSA supports key sizes from 1024 bits to 4096 bits.
Incorrect Answer:
C: ECC is six times more efficient than RSA for equivalent security, not the other way around.
Which of the following are variants of Elliptic Curve Cryptography (ECC)? (Choose Three)
A. ECDH
B. ECDHE
C. RSA
D. ECDSA
Answer:
A. ECDH
B. ECDHE
D. ECDSA
Explanation:
Correct Answers:
A: ECDH (Elliptic Curve Diffie-Hellman) is a variant of ECC used for key exchange.
B: ECDHE (Elliptic Curve Diffie-Hellman Ephemeral) is a variant that uses different keys for each portion of the key exchange process.
D: ECDSA (Elliptic Curve Digital Signature Algorithm) is used for digital signatures.
Incorrect Answer:
C: RSA is a separate asymmetric algorithm, not a variant of ECC.
What is the primary purpose of a digital signature in asymmetric cryptography?
A. To ensure the message is confidential
B. To verify the sender’s identity and ensure message integrity
C. To encrypt the message using the receiver’s public key
D. To prevent man-in-the-middle attacks
Answer:
B. To verify the sender’s identity and ensure message integrity
Explanation:
Correct Answer:
B: A digital signature is created by encrypting a hash of the message with the sender’s private key. This ensures the sender’s identity (non-repudiation) and that the message has not been altered (integrity).
Incorrect Answers:
A: Confidentiality is achieved by encrypting the message with the receiver’s public key.
C: This describes the process of ensuring confidentiality, not digital signatures.
D: Preventing man-in-the-middle attacks requires additional authentication mechanisms, not just digital signatures.
Which of the following best describes a hashing function?
A. A two-way cryptographic function that encrypts and decrypts data
B. A one-way cryptographic function that produces a unique message digest
C. A symmetric encryption algorithm that uses a shared secret key
D. A method for securely exchanging keys over a network
Answer:
B. A one-way cryptographic function that produces a unique message digest
Explanation:
Correct Answer:
B: Hashing is a one-way cryptographic function that takes an input and produces a unique message digest (hash). It cannot be reversed to retrieve the original input.
Incorrect Answers:
A: Hashing is not a two-way function; it cannot decrypt data.
C: Hashing is not a symmetric encryption algorithm, which uses a shared secret key.
D: Key exchange is handled by algorithms like Diffie-Hellman, not hashing.
Which of the following are true about hash digests? (Choose Two)
A. The length of the hash digest varies based on the input size.
B. Hash digests act like digital fingerprints for the original data.
C. Hash digests are always the same length for a given hashing algorithm.
D. Hash digests can be reversed to retrieve the original input.
Answer:
B. Hash digests act like digital fingerprints for the original data
C. Hash digests are always the same length for a given hashing algorithm
Explanation:
Correct Answers:
B: Hash digests uniquely represent the original data, acting like digital fingerprints.
C: The length of a hash digest is fixed for a given hashing algorithm (e.g., MD5 produces 128-bit hashes, SHA-256 produces 256-bit hashes).
Incorrect Answers:
A: Hash digests are always the same length, regardless of the input size.
D: Hashing is a one-way function; the original input cannot be retrieved from the hash digest.
Which of the following hashing algorithms is considered the least secure due to its vulnerability to collisions?
A. SHA-256
B. MD5
C. SHA-3
D. RIPEMD-160
Answer:
B. MD5
Explanation:
Correct Answer:
B: MD5 produces a 128-bit hash, which is prone to collisions (two different inputs producing the same hash). It is no longer recommended for security-critical applications.
Incorrect Answers:
A: SHA-256 is more secure than MD5 and produces a 256-bit hash.
C: SHA-3 is a secure hashing algorithm with 224-bit to 512-bit hash digests.
D: RIPEMD-160 is less popular but more secure than MD5.
Which of the following are members of the SHA family of hashing algorithms? (Choose Three)
A. SHA-1
B. SHA-224
C. MD5
D. SHA-512
Answer:
A. SHA-1
B. SHA-224
D. SHA-512
Explanation:
Correct Answers:
A: SHA-1 produces a 160-bit hash digest.
B: SHA-224 is part of the SHA-2 family and produces a 224-bit hash digest.
D: SHA-512 is part of the SHA-2 family and produces a 512-bit hash digest.
Incorrect Answer:
C: MD5 is not part of the SHA family; it is a separate hashing algorithm.
What is the primary purpose of HMAC (Hash-based Message Authentication Code)?
A. To encrypt data for confidentiality
B. To verify the integrity and authenticity of a message
C. To generate digital signatures for non-repudiation
D. To exchange keys securely over a network
Answer:
B. To verify the integrity and authenticity of a message
Explanation:
Correct Answer:
B: HMAC is used to verify the integrity of a message and ensure its authenticity by combining a hash function with a secret key.
Incorrect Answers:
A: HMAC does not encrypt data for confidentiality; it ensures integrity and authenticity.
C: Digital signatures are created by encrypting a hash digest with a private key, not HMAC.
D: Key exchange is handled by algorithms like Diffie-Hellman, not HMAC.
Which of the following is true about digital signatures? (Choose Two)
A. They are created by encrypting a hash digest with the sender’s private key.
B. They ensure confidentiality by encrypting the entire message.
C. They provide non-repudiation, proving the sender’s identity.
D. They are used to securely exchange keys over a network.
Answer:
A. They are created by encrypting a hash digest with the sender’s private key
C. They provide non-repudiation, proving the sender’s identity
Explanation:
Correct Answers:
A: Digital signatures are created by hashing the message and encrypting the hash digest with the sender’s private key.
C: Digital signatures provide non-repudiation, ensuring the sender cannot deny sending the message.
Incorrect Answers:
B: Confidentiality is achieved by encrypting the message with the receiver’s public key, not through digital signatures.
D: Key exchange is handled by algorithms like Diffie-Hellman, not digital signatures.
Which of the following algorithms is commonly used for digital signatures? (Choose Two)
A. RSA
B. MD5
C. DSA
D. HMAC
Answer:
A. RSA
C. DSA
Explanation:
Correct Answers:
A: RSA is widely used for digital signatures, encryption, and key distribution.
C: DSA (Digital Signature Algorithm) is specifically designed for digital signatures.
Incorrect Answers:
B: MD5 is a hashing algorithm, not used for digital signatures.
D: HMAC is used for message integrity and authenticity, not digital signatures.
What happens to the hash digest if even a single character in the input is changed?
A. The hash digest remains the same.
B. The hash digest changes slightly.
C. The hash digest changes drastically.
D. The hash digest becomes unreadable.
Answer:
C. The hash digest changes drastically
Explanation:
Correct Answer:
C: Even a minor change in the input (e.g., one character) results in a completely different hash digest due to the avalanche effect in hashing algorithms.
Incorrect Answers:
A: The hash digest will not remain the same if the input changes.
B: The hash digest does not change slightly; it changes entirely.
D: The hash digest remains readable but is entirely different.
Which of the following is a key difference between SHA-2 and SHA-3?
A. SHA-2 uses 64-80 rounds of computations, while SHA-3 uses 120 rounds.
B. SHA-2 is less secure than SHA-3.
C. SHA-2 produces shorter hash digests than SHA-3.
D. SHA-2 is used for digital signatures, while SHA-3 is used for encryption.
Answer:
A. SHA-2 uses 64-80 rounds of computations, while SHA-3 uses 120 rounds
Explanation:
Correct Answer:
A: SHA-2 uses 64-80 rounds of computations, while SHA-3 uses 120 rounds, making it more secure.
Incorrect Answers:
B: SHA-2 is secure, but SHA-3 is more secure due to its increased rounds of computation.
C: Both SHA-2 and SHA-3 can produce hash digests of similar lengths (e.g., 256-bit, 512-bit).
D: Both SHA-2 and SHA-3 are used for hashing, not encryption.
What is the primary goal of a Pass-the-Hash attack?
A. To crack a password by brute-forcing its hash
B. To authenticate to a remote system using a stolen hash instead of a plaintext password
C. To create collisions in a hashing algorithm
D. To bypass multi-factor authentication
Answer:
B. To authenticate to a remote system using a stolen hash instead of a plaintext password
Explanation:
Correct Answer:
B: In a Pass-the-Hash attack, the attacker uses a stolen hash to authenticate to a remote system without needing the plaintext password.
Incorrect Answers:
A: The attacker does not need to crack the hash; they use the hash directly for authentication.
C: Creating collisions is associated with Birthday Attacks, not Pass-the-Hash attacks.
D: Pass-the-Hash attacks do not directly bypass multi-factor authentication; they exploit stolen hashes.
Which of the following tools is commonly used to automate Pass-the-Hash attacks?
A. Wireshark
B. Mimikatz
C. Nmap
D. Metasploit
Answer:
B. Mimikatz
Explanation:
Correct Answer:
B: Mimikatz is a penetration tool used to automate the harvesting of hashes and executing Pass-the-Hash attacks.
Incorrect Answers:
A: Wireshark is a network protocol analyzer, not used for Pass-the-Hash attacks.
C: Nmap is a network scanning tool, not used for Pass-the-Hash attacks.
D: Metasploit is a penetration testing framework but is not specifically known for Pass-the-Hash attacks.
What is the primary defense against Pass-the-Hash attacks? (Choose Two)
A. Using multi-factor authentication
B. Implementing key stretching
C. Ensuring all systems are patched and updated
D. Using shorter hash digests
Answer:
A. Using multi-factor authentication
C. Ensuring all systems are patched and updated
Explanation:
Correct Answers:
A: Multi-factor authentication adds an additional layer of security, making it harder for attackers to exploit stolen hashes.
C: Patching and updating systems reduces vulnerabilities that attackers could exploit to harvest hashes.
Incorrect Answers:
B: Key stretching is used to strengthen passwords, not directly defend against Pass-the-Hash attacks.
D: Shorter hash digests increase the risk of collisions and do not defend against Pass-the-Hash attacks.