Cryptography and PKI (3) Flashcards
Which of the following statements is true regarding symmetric key systems?
They use different keys on each end of the transported data.
They use multiple keys for creating digital signatures.
They use the same key on each end of the transported data.
They use the same key on each end of the transported data.
A symmetric key system uses the same key to encrypt and decrypt data during the transport
Which of the following ciphers was created from the foundation of the Rijndael algorithm?
TKIP
AES
DES
AES
AES is a subset of the Rijndael cipher developed by Vincent Rijmen and Joan Daemen. Rijndael is a family of ciphers with different key and block sizes
Katelyn is sending an important email to Zackary, the manager of human resources. Company policy states messages to human resources must be digitally signed. Which of the following statements is correct?
Katelyn’s public key is used to verify the digital signature.
Katelyn’s private key is used to verify the digital signature.
Zackary’s public key is used to verify the digital signature.
Katelyn’s public key is used to verify the digital signature.
Digital signatures are created with the sender’s private key and verified by the sender’s public key
Data integrity is provided by which of the following?
3DES
MD5
AES
MD5
MD5 is a hashing algorithm that transforms a string of characters into a fixed-length value or key, also known as a hash value. Hashes ensure the integrity of data or messages
Which of the following is a symmetric encryption algorithm that is available in 128-bit, 192-bit, and 256-bit key versions?
AES
DES
RSA
AES
AES is a symmetric encryption that supports key sizes of 128, 192, and 256 bits
Which of the following items are found within a digital certificate? (Choose two.)
Serial number
Default gateway
Public key
Session key
Serial number
Public key
The structure of an X.509 digital signature includes a serial number and public key of the user or device
In an 802.1x implementation, which of the following devices mutually authenticate with each other? (Choose two.)
Authentication server
Certificate authority
Domain controller
Supplicant
Authentication server
Supplicant
The authentication server and supplicant mutually authenticate with each other. This helps prevent rogue devices from connecting to the network
Which of the following statements is true regarding the confusion encryption method?
It puts one item in the place of another; for example, one letter for another or one letter for a number.
It scrambles data by reordering the plain text in a certain way.
It uses a relationship between the plain text and the key that is so complicated the plain text can’t be altered and the key can’t be determined.
It uses a relationship between the plain text and the key that is so complicated the plain text can’t be altered and the key can’t be determined.
Confusion encryption is a method that uses a relationship between the plain text and the key that is so complicated the plain text can’t be altered and the key can’t be determined by a threat actor
Which of the following is required when employing PKI and preserving data is important?
CA
CRL
Key escrow
Key escrow
Key escrow is a database of stored keys that can be retrieved should the original user’s key be lost or compromised. The stored key can be used to decrypt encrypted material, allowing restoration of the original material to its unencrypted state
You need to encrypt the signature of an email within a PKI system. Which of the following would you use?
Public key
Shared key
Private key
Private key
The private key is used to encrypt the signature of an email, and the sender’s public key is used to decrypt the signature and verify the hash value
Which of the following standards was developed by the Wi-Fi Alliance and implements the requirements of IEEE 802.11i?
NIC
WPA
WPA2
WPA2
802.11i is an amendment to the original IEEE 802.11 and is implemented as WPA2. The amendment deprecated WEP
You are asked to create a wireless network for your company that implements a wireless protocol that provides maximum security while providing support for older wireless devices. Which protocol should you use?
WPA
WPA2
WEP
WPA
WPA (WiFi Protected Access) is a security standard that replaced and improved on WEP and is designed to work with older wireless clients
Bob is a security administrator and needs to encrypt and authenticate messages that are sent and received between two systems. Which of the following would Bob choose to accomplish his task?
MD5
SHA-256
RSA
RSA
RSA is a public key encryption algorithm that can both encrypt and authenticate messages
Which of the following algorithms is generally used in mobile devices?
3DES
DES
ECC
ECC
ECC (elliptical curve cryptography) uses less processing power and works best in devices such as wireless devices and cellular phones. ECC generates keys faster than other asymmetric algorithms. Determining the correct set of security and resource constraints is an important beginning step when planning a cryptographic implementation
Which of the following statements best describes the difference between public key cryptography and public key infrastructure?
Public key cryptography is another name for an asymmetric algorithm, whereas public key infrastructure is another name for a symmetric algorithm.
Public key cryptography uses one key to encrypt and decrypt the data, and public key infrastructure uses two keys to encrypt and decrypt the data.
Public key cryptography is another name for asymmetric cryptography, whereas public key infrastructure contains the public key cryptographic mechanisms.
Public key cryptography is another name for asymmetric cryptography, whereas public key infrastructure contains the public key cryptographic mechanisms.
Public key cryptography is also known as asymmetric cryptography. Public key cryptography is one piece of the PKI (public key infrastructure)