Cryptography Flashcards

1
Q

Which PowerShell cmdlet is used to generate file hashes?
A. Get-FileHash
B. New-MD5Hash
C. New-SHA256Hash
D. New-CryptHash

A

A. Get-FileHash
This cmdlet is specifically designed to calculate and display the hash of a file, using various algorithms like MD5, SHA-1, SHA-256, and more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Hashing applies to which aspect of the CIA security triad?
A. Integrity
B. Confidentiality
C. Availability
D. Authentication

A

A. Integrity
Hashing is a cryptographic technique that generates a fixed-size string of characters, known as a hash value, from an input data. This hash value acts as a digital fingerprint of the data. If the data is altered in any way, even slightly, the resulting hash value will be different.
Therefore, hashing is primarily used to ensure data integrity. By comparing the hash value of a file or message with its original hash, we can verify if the data has been modified or corrupted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You would like to securely generate and store keys for Microsoft Azure storage account encryption. Which time of Azure resource stores cryptographic items?
A. Virtual machine
B. Storage account
C. Key vault
D. Resource group

A

C. Key Vault
A Key Vault is a secure and highly available service that stores cryptographic keys, secrets, and certificates. It’s specifically designed to manage and protect sensitive information, making it the ideal choice for storing encryption keys for Azure Storage accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which command line tool can be used to manage EFS?
A. cipher
B. certutil
C. sudo
D. chmod

A

A. cipher
The cipher command-line tool is specifically designed for managing EFS (Encrypting File System) on Windows systems. It allows you to encrypt and decrypt files and folders, as well as manage EFS certificates and recovery agents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which term identifies encrypted data?
A. Hash value
B. Plain text
C. Algorithm
D. Ciphertext

A

Ciphertext refers to data that has been encrypted and is unreadable in its current form. It’s the result of applying an encryption algorithm to plaintext, making it secure and inaccessible to unauthorized individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which Linux commands can be used to generate file hashes? Choose more than one option.
A. md256sum
B. sha5sum
C. md5sum
D. sha256sum

A

C. md5sum
D. sha256sum
These commands are commonly used on Linux systems to calculate the MD5 and SHA-256 hashes of files, respectively. These hash values can be used to verify file integrity and authenticity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which Microsoft PowerShell cmdlet is used to generate a file hash?
A. Add-FileHash
B. Get-FileHash
C. New-FileHash
D. Set-FileHash

A

B. Get-FileHash
This cmdlet is specifically designed to calculate and display the hash of a file, using various algorithms like MD5, SHA-1, SHA-256, and more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You need to order an HSM solution for your data center. Which options are available? Choose more than one option.
A. Network-attached appliance
B. PCIe card
C. Firmware chip added to server motherboard
D. Cloud-based virtual machine

A

A. Network-attached appliance
B. PCIe card
These are the two primary ways to deploy HSM solutions in a data center:
Network-attached appliance: A standalone device that connects to the network and provides HSM services.
PCIe card: A card that plugs into a server’s PCIe slot, providing direct access to the HSM’s capabilities.
While cloud-based HSMs are a viable option, they are not typically deployed within a physical data center. Firmware chips and virtual machines are not suitable for HSM functionality due to their lack of dedicated security features.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

BitLocker is designed to encrypt which types of objects?
A. Cloud resources
B. File systems
C. Folders
D. Files

A

B. File systems
BitLocker is a full disk encryption tool designed to encrypt entire drives or partitions, effectively protecting the data stored on them. This includes the file systems and all the files and folders within them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the default listening port number for HTTPS?
A. 25
B. 80
C. 443
D. 22

A

C. 443
HTTPS, or Hypertext Transfer Protocol Secure, uses port 443 for encrypted communication over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly