Cryptography and PKI (1) Flashcards
Which of the following would a public key be used for?
To decrypt a hash of a digital signature
To encrypt TLS traffic
To digitally sign messages
To decrypt a hash of a digital signature
A digital signature is a one-way hash and encrypted with the private key. The public key is used to decrypt the hash and validate the integrity of the digital signature. Digital signatures supports non-repudiation; where the sender can not refute sending the message
Your company’s web server certificate has been revoked and external customers are receiving errors when they connect to the website. Which of following actions must you take?
Create and use a self-signed certificate.
Request a certificate from the key escrow.
Generate a new key pair and new certificate.
Generate a new key pair and new certificate.
A revoked certificate is no longer valid for the intended purpose, and a new key pair and certificate will need to be generated
Mary is concerned about the validity of an email because a coworker denies sending it. How can Mary prove the authenticity of the email?
Symmetric algorithm
Digital signature
CRL
Digital signature
Digital signatures are created by using the user’s or computer’s private key that is accessible only to that user or computer. Nonrepudiation is the assurance that someone cannot deny something
Wi-Fi Alliance recommends that a passphrase be how many characters in length for WPA2-Personal security?
6 characters
8 characters
12 characters
8 characters
WiFi Alliance, a nonprofit organization that promotes WiFi technology, recommends a passphrase be at least eight characters long and include a mixture of upper- and lowercase letters and symbols
Which of the following digital certificate management practices will ensure that a lost certificate is not compromised?
CRL
Key escrow
Nonrepudiation
CRL
A CRL (certificate revocation list) is a list of digital certificates that have been revoked by the issuing certificate authority (CA) before their scheduled expiration date and should not be trusted
Which of the following are restricted to 64-bit block sizes? (Choose two.)
DES
SHA
MD5
3DES
DES
3DES
DES and 3DES are symmetric-key block ciphers using a 64-bit block size
Your company has implemented a RADIUS server and has clients that are capable of using multiple EAP types, including one configured for use on the RADIUS server. Your security manager wants to implement a WPA2-Enterprise system. Since you have the RADIUS server and clients, what piece of the network would you need?
Network access control
Authenticator
Supplicant
Supplicant
You would need the supplicant. The authenticator, an AP or wireless controller, sends authentication messages between the supplicant and authentication server
You are given the task of selecting an asymmetric encryption type that has an appropriate level of encryption strength but uses a smaller key length than is typically required. Which of the following encryption methods will accomplish your requirement?
RSA
DHE
ECC
ECC
ECC (elliptic curve cryptography) is an asymmetric algorithm that uses smaller keys and has the same level of strength compared to longer key length asymmetric algorithm
Matt has been told that successful attacks have been taking place and data that has been encrypted by his company’s software system has leaked to the company’s competitors. Matt, through investigation, has discovered patterns due to the lack of randomness in the seeding values used by the encryption algorithm in the company’s software. This discovery has led to successful reverse engineering. What can the company use to ensure patterns are not created during the encryption process?
One-time pad
Initialization vector
Stream cipher
Initialization vector
Initialization vectors (IVs) are random values that are used with algorithms to ensure patterns are not created during the encryption process. IVs are used with keys and are not encrypted when being sent to the destination
You are asked to configure a WLAN that does not require a user to provide any credentials to associate with a wireless AP and access a WLAN. What type of authentication is said to be in use?
IV
WEP
Open
Open
An open wireless network does not require a user to enter credentials for access
The CIO at your company no longer wants to use asymmetric algorithms because of the cost. Of the following algorithms, which should the CIO discontinue using?
AES
RC4
RSA
RSA
RSA is an asymmetric algorithm and should be discontinued
Which of the following would you use to verify certificate status by receiving a response of “good,” “revoked,” or “unknown”?
CRL
OSCP
RA
OSCP
OCSP (Online Certificate Status Protocol) is a protocol that can be used to query a certificate authority about the revocation status of a given certificate. It validates certificates by returning responses such as “good,” “revoked,” and “unknown”
Which of the following symmetric key algorithms are block ciphers? (Choose two.)
MD5
3DES
RC4
Blowfish
3DES
Blowfish
3DES and Blowfish are a symmetric-key block cipher. 3DES and Blowfish use a block size of 64 bits
Which of the following encryption algorithms is the weakest?
Blowfish
AES
DES
DES
DES (Data Encryption Standard) is a 56-bit key and is superseded by 3DES. DES is considered to be insurance for many applications
What encryption protocol does WEP improperly use?
RC6
RC4
AES
RC4
WEP uses the encryption protocol RC4 and is considered insecure