Cryptography and PKI (2) Flashcards
Which of the following EAP types use a three-phase operation?
EAP-FAST
EAP-TLS
EAP-TTLS
EAP-FAST
EAP-FAST is for situations where strong password policy cannot be enforced and certificates are not used. EAP-FAST consists of three phases: EAP-FAST authentication, establishment of a secure tunnel, and client authentication
Which of the following is an encryption standard that uses a single 56-bit symmetric key?
DES
3DES
AES
DES
DES is a symmetric encryption standard that uses a key length of 56 bits
Which of the following cryptography concepts converts output data into a fixed-length value and cannot be reversed?
Steganography
Hashing
Collision
Hashing
Hashing is a one-way encryption that transforms a string of characters into a fixed-length value or key, also known as a hash value. Hashes ensure the integrity of data or messages
SSL is a protocol used for securing transactions transmitting over an untrusted network such as the Internet. Which of the following best describes the action that occurs during the SSL connection setup process?
The client creates a session key and encrypts it with the server’s private key.
The client creates a session key and encrypts it with the server’s public key.
The server creates a session key and encrypts it with the client’s private key.
The client creates a session key and encrypts it with the server’s public key.
SSL (Secure Socket Layer) uses public key encryption. When a client accesses a secured website, it will generate a session key and encrypt it with the server’s public key. The session key is decrypted with the server’s private key, and the session key is used to encrypt and decrypt data sent back and forth
Which of the following EAP types requires both server and client certificates?
EAP-FAST
PEAP
EAP-TLS
EAP-TLS
EAP-TLS requires both client and server to have certificates. The authentication is mutual where the server authenticates to the client and the client authenticates to the server
You are the network administrator for a small office of 35 users and need to utilize mail encryption that will allow specific users to encrypt outgoing email messages. You are looking for an inexpensive onsite encryption server. Which of the following would you implement?
PGP/GPG
WPA2
CRL
PGP/GPG
PGP (Pretty Good Privacy) or GPG (GNU Privacy Guard) provides a low-cost or open source alternative solution that allows users to encrypt their outgoing emails
You have been promoted to security administrator for your company and you need to be aware of all types of hashing algorithms for integrity checks. Which algorithm offers a 160-bit digest?
MD5
RC4
SHA-1
SHA-1
SHA-1 is a hashing algorithm that produces a 160-bit digest
You are the security manager for your company, and a system administrator wants to know if there is a way to reduce the cost of certificates by purchasing a certificate to cover all domains and subdomains for the company. Which of the following solutions would you offer?
Wildcards
Object identifiers
Key escrow
Wildcards
Wildcard certificates allow the company to secure an unlimited number of subdomain certificates on a domain name from a third party
Which of the following are authentication protocols? (Choose two.)
WPS
EAP
IPSec
IEEE 802.1x
EAP
IEEE 802.1x
EAP and IEEE 802.1x are authentication protocols that transfer authentication data between two devices
Your company is looking to accept electronic orders from a vendor and wants to ensure nonauthorized people cannot send orders. Your manager wants a solution that provides nonrepudiation. Which of the following options would meet the requirements?
Digital signatures
Hashes
Steganography
Digital signatures
Digital signatures are created by using the user’s or computer’s private key that is accessible only to that user or computer. Nonrepudiation is the assurance that someone cannot deny something
You are tasked to implement a solution to ensure data that are stored on a removable USB drive hasn’t been tampered with. Which of the following would you implement?
File backup
File encryption
File hashing
File hashing
Hashing is a one-way encryption that transforms a string of characters into a fixed-length value or key, also known as a hash value. Hashes ensure the integrity of data or messages
Which of the following is mainly used for remote access into a network?
XTACACS
Kerberos
RADIUS
RADIUS
RADIUS is a client-server protocol that enables remote access servers to communicate with a central server to authenticate users. RADIUS uses symmetric encryption for security
A security manager has asked you to explain why encryption is important and what symmetric encryption offers. Which of the following is the best explanation?
Confidentiality
Nonrepudiation
Steganography
Confidentiality
Encryption provides confidentiality because the data is scrambled and cannot be read by an unauthorized user. Symmetric encryption uses one key to encrypt, and decrypting data with one key is considered fast
You are a security administrator and have discovered one of the employees has been encoding confidential information into graphic files. Your employee is sharing these pictures on their social media account. What concept was the employee using?
Hashing
Steganography
Symmetric algorithm
Steganography
Steganography is a process of hiding data within data. This technique can be applied to images, video files, or audio files
Your company’s branch offices connect to the main office through a VPN. You recently discovered the key used on the VPN has been compromised. What should you do to ensure the key isn’t compromised in the future?
Enable perfect forward secrecy at the main office and branch office ends of the VPN.
Enable perfect forward secrecy at the branch office end of the VPN.
Disable perfect forward secrecy at the main office and branch office ends of the VPN.
Enable perfect forward secrecy at the main office and branch office ends of the VPN.
Enable perfect forward secrecy (PFS) at the main office and branch office end of the VPN. Perfect forward secrecy is a way to ensure the safety of session keys from future abuse by threat actors