Cryptography and PKI (2) Flashcards

1
Q

Which of the following EAP types use a three-phase operation?

EAP-FAST

EAP-TLS

EAP-TTLS

A

EAP-FAST

EAP-FAST is for situations where strong password policy cannot be enforced and certificates are not used. EAP-FAST consists of three phases: EAP-FAST authentication, establishment of a secure tunnel, and client authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is an encryption standard that uses a single 56-bit symmetric key?

DES

3DES

AES

A

DES

DES is a symmetric encryption standard that uses a key length of 56 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following cryptography concepts converts output data into a fixed-length value and cannot be reversed?

Steganography

Hashing

Collision

A

Hashing

Hashing is a one-way encryption that transforms a string of characters into a fixed-length value or key, also known as a hash value. Hashes ensure the integrity of data or messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SSL is a protocol used for securing transactions transmitting over an untrusted network such as the Internet. Which of the following best describes the action that occurs during the SSL connection setup process?

The client creates a session key and encrypts it with the server’s private key.

The client creates a session key and encrypts it with the server’s public key.

The server creates a session key and encrypts it with the client’s private key.

A

The client creates a session key and encrypts it with the server’s public key.

SSL (Secure Socket Layer) uses public key encryption. When a client accesses a secured website, it will generate a session key and encrypt it with the server’s public key. The session key is decrypted with the server’s private key, and the session key is used to encrypt and decrypt data sent back and forth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following EAP types requires both server and client certificates?

EAP-FAST

PEAP

EAP-TLS

A

EAP-TLS

EAP-TLS requires both client and server to have certificates. The authentication is mutual where the server authenticates to the client and the client authenticates to the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You are the network administrator for a small office of 35 users and need to utilize mail encryption that will allow specific users to encrypt outgoing email messages. You are looking for an inexpensive onsite encryption server. Which of the following would you implement?

PGP/GPG

WPA2

CRL

A

PGP/GPG

PGP (Pretty Good Privacy) or GPG (GNU Privacy Guard) provides a low-cost or open source alternative solution that allows users to encrypt their outgoing emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You have been promoted to security administrator for your company and you need to be aware of all types of hashing algorithms for integrity checks. Which algorithm offers a 160-bit digest?

MD5

RC4

SHA-1

A

SHA-1

SHA-1 is a hashing algorithm that produces a 160-bit digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You are the security manager for your company, and a system administrator wants to know if there is a way to reduce the cost of certificates by purchasing a certificate to cover all domains and subdomains for the company. Which of the following solutions would you offer?

Wildcards

Object identifiers

Key escrow

A

Wildcards

Wildcard certificates allow the company to secure an unlimited number of subdomain certificates on a domain name from a third party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following are authentication protocols? (Choose two.)

WPS

EAP

IPSec

IEEE 802.1x

A

EAP

IEEE 802.1x

EAP and IEEE 802.1x are authentication protocols that transfer authentication data between two devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Your company is looking to accept electronic orders from a vendor and wants to ensure nonauthorized people cannot send orders. Your manager wants a solution that provides nonrepudiation. Which of the following options would meet the requirements?

Digital signatures

Hashes

Steganography

A

Digital signatures

Digital signatures are created by using the user’s or computer’s private key that is accessible only to that user or computer. Nonrepudiation is the assurance that someone cannot deny something

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You are tasked to implement a solution to ensure data that are stored on a removable USB drive hasn’t been tampered with. Which of the following would you implement?

File backup

File encryption

File hashing

A

File hashing

Hashing is a one-way encryption that transforms a string of characters into a fixed-length value or key, also known as a hash value. Hashes ensure the integrity of data or messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is mainly used for remote access into a network?

XTACACS

Kerberos

RADIUS

A

RADIUS

RADIUS is a client-server protocol that enables remote access servers to communicate with a central server to authenticate users. RADIUS uses symmetric encryption for security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A security manager has asked you to explain why encryption is important and what symmetric encryption offers. Which of the following is the best explanation?

Confidentiality

Nonrepudiation

Steganography

A

Confidentiality

Encryption provides confidentiality because the data is scrambled and cannot be read by an unauthorized user. Symmetric encryption uses one key to encrypt, and decrypting data with one key is considered fast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You are a security administrator and have discovered one of the employees has been encoding confidential information into graphic files. Your employee is sharing these pictures on their social media account. What concept was the employee using?

Hashing

Steganography

Symmetric algorithm

A

Steganography

Steganography is a process of hiding data within data. This technique can be applied to images, video files, or audio files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Your company’s branch offices connect to the main office through a VPN. You recently discovered the key used on the VPN has been compromised. What should you do to ensure the key isn’t compromised in the future?

Enable perfect forward secrecy at the main office and branch office ends of the VPN.

Enable perfect forward secrecy at the branch office end of the VPN.

Disable perfect forward secrecy at the main office and branch office ends of the VPN.

A

Enable perfect forward secrecy at the main office and branch office ends of the VPN.

Enable perfect forward secrecy (PFS) at the main office and branch office end of the VPN. Perfect forward secrecy is a way to ensure the safety of session keys from future abuse by threat actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You are configuring your friend’s new wireless SOHO router and discover a PIN on the back of the router. Which of the following best describes the purpose of the PIN?

This is a WEP PIN.

This is a WPS PIN.

This is a WPA PIN.

A

This is a WPS PIN.

WPS is a network security standard that allows home users to easily add new devices to an existing wireless network without entering long passphrases. Users enter a PIN to allow the device to connect after pressing the WPS button on the SOHO router

17
Q

Which of the following benefits do digital signatures provide? (Choose two.)

Nonrepudiation

Authentication

Encryption

Key exchange

A

Nonrepudiation

Authentication

Digital signatures provide three core benefits: authentication, integrity, and nonrepudiation

18
Q

Your company has asked you to recommend a secure method for password storage. Which of the following would provide the best protection against brute-force attacks? (Choose two.)

ROT13

MD5

PBKDF2

BCRYPT

A

PBKDF2

BCRYPT

PBKDF2 applies a pseudo-random function such as a HMAC to the password along with a salt value and produces a derived key. PBKDF2 is designed to protect against brute-force attacks. BCRYPT is a password-hashing function derived from the Blowfish cipher. It adds a salt value to protect against rainbow table attacks

19
Q

Your IT support center is receiving a high number of calls stating that users trying to access the company’s website are receiving certificate errors within their browsers. Which of the following statements best describes what the issue is?

The website certificate has expired.

Users have forgotten their usernames or passwords.

The domain name has expired.

A

The website certificate has expired.

Users are receiving the error because the website certificate has expired. The user can continue accessing the website, but the error will state the user could be accessing an untrusted site

20
Q

In asymmetric encryption, what is used to decrypt an encrypted file?

Private key

Public key

Message digest

A

Private key

In asymmetric encryption, sometimes referred to as public key encryption, the private key is used to decrypt an encrypted file

21
Q

You are performing a vulnerability assessment on a company’s LAN and determine they are using 802.1x for secure access. Which of the following attacks can a threat actor use to bypass the network security?

MAC spoofing

ARP poisoning

Ping of death

A

MAC spoofing

A threat actor can spoof a device’s MAC address and bypass 802.1x authentication. Using 802.1x with client certificates or tunneled authentication can help prevent this attack

22
Q

Your security manager is looking to implement a one-time pad scheme for the company’s salespeople to use when traveling. Which of the following best describes a requirement for this implementation? (Choose three.)

The pad must be distributed securely and protected at its destination.

The pad must always be the same length.

The pad must be used only one time.

The pad must be made up of truly random values.

A

The pad must be distributed securely and protected at its destination.

The pad must be used only one time.

The pad must be made up of truly random values.

A one-time pad must be delivered by a secure method and properly guarded at each destination. The pad must be used one time only to avoid introducing patterns, and it must be made up of truly random values. Today’s computer systems have pseudo-random-number generators, which are seeded by an initial value from some component within the computer system

23
Q

A threat actor has created a man-in-the-middle attack and captured encrypted communication between two users. The threat actor was unable to decrypt the messages. Which of the following is the reason the threat actor is unable to decrypt the messages?

Hashing

Symmetric encryption

Asymmetric encryption

A

Asymmetric encryption

In asymmetric encryption, sometimes referred to as public key encryption, the private key is used to decrypt an encrypted file

24
Q

You have implemented a PKI to send signed and encrypted data. The user sending data must have which of the following? (Choose two.)

The receiver’s private key

The sender’s private key

The sender’s public key

The receiver’s public key

A

The sender’s private key

The receiver’s public key

To sign the data for nonrepudiation purposes, the sender uses their private key and when encrypting the data, the sender uses the receiver’s public key

25
Q

Which of the following best describes the drawback of symmetric key systems?

You must use different keys for encryption and decryption.

The algorithm is more complex.

The key must be delivered in a secure manner.

A

The key must be delivered in a secure manner.

Symmetric encryption uses the same key to encrypt and decrypt data, so the key must be sent to the receiver in a secure manner. If a person were to get the key somewhere in the middle, they would be able to decrypt the information and read the data or inject it with malware

26
Q

Your company is looking for a secure backup mechanism for key storage in a PKI. Which of the following would you recommend?

CSR

Key escrow

CA

A

Key escrow

Key escrow is a security measure where cryptographic keys are held in escrow by a third party and under normal circumstances, the key should not be released to someone other than the sender or receiver without proper authorization

27
Q

Which cryptography concept uses points on a curve to define public and private key pairs?

Obfuscation

ECC

Stream cipher

A

ECC

ECC (elliptical curve cryptography) is based on elliptic curve theory that uses points on a curve to define more efficient public and private keys

28
Q

You are a security administrator and have been given instructions to update the access points to provide a more secure connection. The access points are currently set to use WPA TKIP for encryption. Which of the following would you configure to accomplish the task of providing a more secure connection?

WEP

WPA2 CCMP

Enable MAC filtering

A

WPA2 CCMP

WPA2 CCMP replaced TKIP and is a more advanced encryption standard. CCMP provides data confidentiality and authentication

29
Q

Which of the following is an example of a stream cipher?

AES

3DES

RC4

A

RC4

RC4 is an example of a stream cipher that encrypts data one bit at a time

30
Q

Which of the following are negotiation protocols commonly used by TLS? (Choose two.)

DHE

ECDHE

RSA

SHA

A

DHE

ECDHE

DHE (Diffie-Hellman Ephemeral) and ECDHE (Elliptic Curve Diffie-Hellman Ephemeral) are commonly used with TLS to provide perfect forward secrecy