Cryptography and PKI (4) Flashcards
Zack, an administrator, needs to renew a certificate for the company’s web server. Which of the following would you recommend Zack submit to the CA?
CSR
Key escrow
CRL
CSR
A CSR (certificate signing request) is a request an applicant sends to a CA for the purpose of applying for a digital identity certificate
Which of the following types of encryption offers easy key exchange and key management?
Obfuscation
Asymmetric
Symmetric
Asymmetric
Asymmetric encryption is also known as public key cryptography and uses public and private keys to exchange a session key between two parties. It offers key management by administering the life cycle of cryptographic keys and protecting them from loss or misuse
Which of the following is used to exchange cryptographic keys?
Diffie-Hellman
HMAC
ROT13
Diffie-Hellman
Diffie-Hellman is used to establish a shared secret between two users and is primarily used as a method of exchanging cryptography keys
Which of the following encryption algorithms is used to encrypt and decrypt data?
MD5
HMAC
RC4
RC4
RC4 is a stream cipher used for encrypting and decrypting data, but there are known weaknesses and using it is not recommended
Which of the following provides additional encryption strength by repeating the encryption process with additional keys?
3DES
AES
Twofish
3DES
3DES is a symmetric algorithm used to encrypt data by applying the DES cipher algorithm three times to the data
Which of the following security mechanisms can be used for the purpose of nonrepudiation?
Encryption
Digital signature
Collision
Digital signature
Digital signatures are created by using the user’s or computer’s private key that is accessible only to that user or computer. Nonrepudiation is the assurance that someone cannot deny something
You are a network administrator for your company, and the single AP that allows clients to connect to the wireless LAN is configured with a WPA-PSK preshared key of the company name followed by the number 1. Which of the following statements is correct regarding this implementation?
It is secure because the preshared key is at least five characters long.
It is not secure because the preshared key includes only one number and the company name so it can be easily guessed.
It is not secure because WPA-PSK is as insecure as WEP and should never be used.
It is not secure because the preshared key includes only one number and the company name so it can be easily guessed.
With a single number appended to the company name, the preshared key can be easily guessed. A secure preshared key is at least eight ASCII characters in length and follows the complexity rule
You are a security technician and have been given the task to implement a PKI on the company’s network. When verifying the validity of a certificate, you want to ensure bandwidth isn’t consumed. Which of the following can you implement?
CRL
OCSP
Key escrow
CRL
A CRL (certificate revocation list) is a list of digital certificates that have been revoked by the issuing certificate authority (CA) before their scheduled expiration date and should not be trusted
Which of the following types of device are found in a network that supports Wi-Fi Protected Setup (WPS) protocol? (Choose three.)
Registrar
Supplicant
Enrollee
Access Point
Registrar
Enrollee
Access Point
The WiFi Protected Setup protocols define the following devices in a network. A registrar is the device with the authority to issue or revoke access to the network. The enrollee is a client device that is seeking to join the wireless network. The AP (access point) functions as a proxy between the registrar and the enrollee
You are a network administrator for a distribution company and the manager wants to implement a secure wireless LAN for a BYOD policy. Through research, you determine that the company should implement AES encryption and the 802.1x authentication protocol. You also determine that too many APs and clients will be installed and you will need to configure each one with a preshared key passphrase. Which of the following will meet your needs?
WEP
WPA2-Personal
WPA2-Enterprise
WPA2-Enterprise
WPA2-Enterprise will implement AES and require an authentication infrastructure with an authentication server (RADIUS) and an authenticator. WPA2-Enterprise provides better protection of critically important information with BYOD (Bring Your Own Device)
The process of deleting data by sending a single erase or clear instruction to an address of the nonvolatile memory is an example of securing which of the following?
Data-in-transit
Data-in-use
Data-at-rest
Data-at-rest
Data-at-rest is all data that is inactive and physically stored in a physical digital form such as nonvolatile memory
Which of the following is an authentication service and uses UDP as a transport medium?
TACACS+
RADIUS
LDAP
RADIUS
RADIUS is a client-server protocol that enables remote access servers to communicate with a central server to authenticate users. RADIUS uses symmetric encryption for security, and messages are sent as UDP
Which of the following is true regarding the importance of encryption of data-at-rest for sensitive information?
It renders the recovery of data more difficult should the user lose their password.
It allows the user to verify the integrity of the data on the stored device.
It prevents the sensitive data from being accessed after a theft of the physical equipment.
It prevents the sensitive data from being accessed after a theft of the physical equipment.
Should a hard drive be stolen, the data will not be able to be read as the data is scrambled, or encrypted, and can be read only by the corresponding key
You are a network administrator and your manager has asked you to enable WPA2 CCMP for wireless clients, along with an encryption to protect the data transmitting across the network. Which of the following encryption methods would you use along with WPA2 CCMP?
RC4
DES
AES
AES
Using AES with CCMP incorporates two cryptographic techniques that provide a more secure protocol between a mobile client and the access point
Which of the following is the least secure hashing algorithm?
MD5
SHA-1
AES
MD5
MD5 produces a 128-bit message digest regardless of the length of the input text