Cryptology Flashcards
You have encrypted an e-mail message that is only meant to be seen by the recipient. A hacker has intercepted the message. When he views the message, what does he see?
A. The plain text of the e-mail
B. One-way hash of the message
C. The recipient’s certificate information
D. Ciphertext
D. Clear text is transformed into ciphertext after being put through some type of cipher or encryption algorithm system. The ciphertext is unreadable unless it is decrypted back into clear-text form.
You have been tasked to implement information assurance principles within your organization’s security and encryption functions. Which of the following isn’t a function of information assurance within encryption systems?
A. Efficiency
B. Confidentiality
C. Integrity
D. Nonrepudiation
A. Efficiency is not a function of information assurance within encryption systems. The four basic functions pertaining to information assurance are confidentiality, integrity, authentication, and nonrepudiation.
You have sent your friend a secret, encrypted message. The key you used to encrypt the message is the same key with which your friend will decrypt the message. What type of encryption scheme is used?
A. Asymmetric
B. Symmetric
C. RSA
D. Diffie-Hellman
B. In a symmetric encryption scheme, both parties use the same key for encryption and decryption purposes. Both users must possess the same key to send encrypted messages to each other.
Which of the following encryption schemes would you use if your company wants to create an invisible watermark hidden within the images on their web site to identify the images if they are used by another company?
A. One-time pad
B. Elliptical curve
C. One-way hash
D.Steganography
D. Steganography hides data in another type of media that effectively conceals the existence of the data.
Your organization wants you to implement an encryption system that ensures the sender and receiver of the encrypted message use different keys for encryption and decryption. Which type of encryption scheme would you use?
A. Elliptical curve
B. Non-symmetric
C. Asymmetric
D. Symmetric
C. An asymmetric encryption scheme relies on the sender and receiver of a message to use different keys for encryption and decryption. The keys are mathematically related but can’t be derived from each other.
Which of the following protocols would you use for message authentication and integrity in your encryption systems?
A. Steganography
B. Elliptical curve
C. HMAC
D. One-time pad
C. HMAC (Hash-based Message Authentication Code) is used to authentic a message and provide data integrity. The Message Authentication Code (MAC) is sent along with
the message itself so that the receiver can authenticate the sender of the message and verify the integrity of the message contents.
You have been asked to implement hashing protocols that have a low possibility of a hashing collision. Which of the following describes a hashing collision?
A. The greater probability that two or more people in a group of 23 share the same birthday
B. That the hash values of two different messages result in the same value
C. An invalid digital signature
D. When a 128-bit message digest is mixed
with a 256-bit message digest
B. A collision occurs within a hashing algorithm when the hashed values of two different messages result in the same value. Collisions can be used to aid in cracking a hacking algorithm.
When you connect to a secure web site, you are asked to accept the server certificate. What is the function of the digital certificate?
A. Securely validates the identity of the server and its public key
B. Identifies you to a certificate authority
C. Provides your ID required by the government to request a public key
D. Allows you to encrypt your web sessions
A. A digital certificate is a credential required by PKI systems that can securely identify an organization’s server, as well as create an association between the server’s authenticated identity and its public keys.
You want to start a secure web session to your banking web site to prevent your credentials and financial information from passing as clear text. Which of the following protocols do you use?
A. SSL
B. SSH
C. HTTPS
D. HTTP
C. HTTP communications send all data in clear-text form. For secure web communications, HTTPS is a secure means of communicating HTTP data between a web browser and a web server. HTTPS protects the communication channel by using SSL to provide encrypted and protected communications.
When you connect to a secure HTTPS web page, which of the following actions is performed
first?
A. The username and password are sent for authentication.
B. A digital certificate establishes the web site identity to the browser.
C. The web page is displayed, and then authentication is performed.
D. The client establishes its identity to the web server.
B. When a client connects to the secure HTTPS site, the web server sends a certificate to the web browser to establish its identity. If the browser accepts the certificate and finds no validation issues with the certificate, SSL is activated between the server and client. No other communication can occur between the server and client until the certificate is validated and accepted.
Which of the following is a cipher that is used to encrypt a data stream? A. One-Time Pad B. PGP C. GPG D. HMAC
A. One-Time Pad
Which of the following is used to add a secret key as input to a hash function? A. DES B. SHA-1 C. HMAC D. Twofish
C. HMAC
What will always create a fixed size string of bits regardless of the size of the original data? I. MD5 II. SHA III. One-time pad IV. CRL
I,ii
Message Digest 5 (MD5) and Secure Hash Algorithm (SHA) are both hashing algorithm that create hashes of a fixed length. MD5 creates a 128-bit hash and SHA-256 creates a 256-bit hash.
What are two basic components of encryption? (A) Algorithms and keys (B) CAs and CRLs (C) Certificates and private keys (D) Public keys and session keys
A
A system encrypts data prior to transmitting it over a network, and the system on the other end of the transmission media decrypts it. If the systems are using a symmetric encryption algorithm for encryption and decryption, which of the following statements are true?
(A) A symmetric encryption algorithm uses the same key to encrypt and decrypt data at both ends of the transmission media.
(B) A symmetric encryption algorithm uses different keys to encrypt and decrypt data at both ends of the transmission media.
(C) A symmetric encryption algorithm does not use keys to encrypt and decrypt data at both ends of the transmission media.
(D) A symmetric encryption algorithm is an insecure method used to encrypt data transmitted over transmission media.
A
Of the following choices, what is an encryption algorithm that is commonly used in small portable devices such as mobile phones? (A) Steganography (B) 3DES (C) PGP (D) Elliptic curve
D Elliptic curve cryptography is an encryption technology commonly used with small mobile devices and it provides strong confidentiality using the least amount of computing resources.
A web site includes graphic files. A security professional is comparing the hash of a graphic file captured last week, with the hash of what appears to be the same graphic file today. What is the security professional looking for? (A) CRL (B) Steganography (C) Key (D) Digital signature
B
Which of the following protocols requires a CA for authentication? (A) FTP (B) PEAP-TLS (C) AES (D) PKI
B Protected Extensible Authentication Protocol Transport Layer Security (PEAP-TLS) uses TLS for the authentication process and TLS requires a certificate provided by a certification authority (CA).
An organization wants to verify the identity of anyone sending emails. The solution should also verify integrity of the emails. What can they use? (A) AES (B) Encryption (C) CRL (D) Digital signatures
D
Sally is sending an email and she encrypted a portion of the email with her private key. What can this provide? (A) Confidentiality (B) Validation of her certificate (C) Non-repudiation (D) One-time pad
C
Sally sent an encrypted email with a digital signature to Joe. Joe wants to verify the email came from Sally. How can this be achieved?
(A) Use Sally’s private key to verify the digital signature
(B) Use Sally’s private key to decrypt the email
(C) Use Sally’s public key to verify the digital signature
(D) Use Sally’s public key to decrypt the email
C
What type of key is used to sign an email message? (A) Senders public key (B) Senders private key (C) Recipients public key (D) Recipients private key
B
A system administrator wants to create a unique identifier for an executable file. Of the following choices, what can be used? (A) RC4 (B) Public key (C) Private key (D) SHA
D Secure Hash Algorithm (SHA) is a hashing algorithm that can ensure the integrity of data including executable files.
Of the following choices, what can ensure the integrity of email messages? (A) MD5 (B) AES (C) TwoFish (D) RSA
A Message Digest 5 (MD5) is a hashing algorithm that can ensure the integrity of data including email messages
Which of the following is an encryption algorithm that uses 128-bit keys? (A) DES (B) AES (C) 3DES (D) MD5
B Advanced Encryption Standard (AES) uses 128, 192, or 256-bit keys.
How many bits does DES use?
Data Encryption Standard (DES) uses 56-bit keys
How many bits does 3 DES use?
3DES uses 56, 112, or 168-bit keys