Domain 3: Review Questions Flashcards
Which of the following is most correct?
A. Asymmetric crypto has a larger key space.
B. A cryptogram is a segment of cipher text transmitted over the internet, but not over a VPN.
C. TLS and SSL use symmetric crypto
D. The key schedule is determined by the programmer when writing the software but can be changed by the device’s system admin.
A. Asymmetric crypto has a larger key space.
Asymmetric cryptography (e.g., RSA, ECC) typically uses much larger key sizes than symmetric cryptography to achieve equivalent security. For example:
A 2048-bit RSA key provides security comparable to a 128-bit AES key.
The larger key space increases the complexity of brute-force attacks in asymmetric encryption.
Which of the following is NOT correct?
A. When using PKI, the sender can use their own private key or the public key of the receiver.
B. When electing to use their private key, the sender provides proof of origin
C. A strength of Asymmetric cryptography is that is scales well in a mesh network
D. One strength of symmetric crypto is key distribution
D. One strength of symmetric crypto is key distribution.
D is Incorrect.
Key distribution is a major weakness of symmetric cryptography because the secret key must be securely shared between parties before communication can occur. This requires secure channels or additional mechanisms, making symmetric cryptography less scalable.
Which of the following is provided if data cannot be read?
A. Integrity
B. Confidentiality
C. Availability
D. Defense in depth
B. Confidentiality is provided if the data cannot be read. It can be provided either through access controls and encryption for data as it exists on a hard drive or through encryption as the data is in transit.
In a distributed environment, which of the following is software that ties the client and server software together?
A. Embedded system
B. Mobile code
C. Virtual computing
D. Middleware
D. In a distributed environment, middleware is software that ties the client and server software together. It is neither a part of the operating system nor a part of the server software. It is the code that lies between the operating system and applications on each side of a distributed computing system in a network.
Which of the following is composed of the components (hardware, firmware, and/or software) that are expected to enforce the security policy of the system?
A. Security perimeter
B. Reference monitor
C. Trusted Computer Base (TCB)
D. Security kernel
C. The Trusted Computer Base (TCB) is composed of the components (hardware, firmware, and/or software) that are trusted to enforce the security policy of the system and that if compromised jeopardize the security properties of the entire system.
Which process converts plaintext into ciphertext?
A. Hashing
B. Decryption
C. Encryption
D. Digital signature
C. Encryption converts plaintext into ciphertext. Hashing reduces a message to a hash value. Decryption converts ciphertext into plaintext. A digital signature is an object that provides sender authentication and message integrity by including a digital signature with the original message.
Which type of cipher is the Caesar cipher
A. Polyalphabetic substitution
B. Mono-alphabetic substitution
C. Polyalphabetic transposition
D. Mono-alphabetic transposition
B. The Caesar cipher is a mono-alphabetic substitution cipher. The Vigenere substitution is a polyalphabetic substitution.
Which of the following is the most secure encryption scheme?
A. Concealment cipher
B. Symmetric algorithm
C. One-time pad
D. Asymmetric algorithm
C. A one-time pad is the most secure encryption scheme because it is used only once.
Which 3DES implementation encrypts each block of data three times, each time with a different key?
A. 3DES-EDE3
B. 3DES-EEE3
C. 3DES-EDE2
D. 3DES-EEE2
B. The 3DES-EEE3 implementation encrypts each block of data three times, each time with a different key.
The 3DES-EDE3 implementation encrypts each block of data with the first key, decrypts each block with the second key, and encrypts each block with the third key. The 3DES-EDE2 implementation encrypts each block of data with the first key, decrypts each block with the second key, and then encrypts each block with the first key. The 3DES-EEE2 implementation encrypts each block of data with the first key, encrypts each block with the second key, and then encrypts each block with the third key.
Which of the following is NOT a hash function?
A. ECC
B. MD6
C. SHA-2
D. RIPEMD-160
A. Elliptic Curve Cryptosystem (ECC) is NOT a hash function. It is an asymmetric algorithm. All the other options are hash functions.
Which of the following is an example of a preventive control?
A. A door lock system on a server room
B. An electric fence surrounding a facility
C. Armed guards outside a facility
D. Parking lot cameras
A. An electric fence surrounding a facility is designed to prevent access to the building by those who should not have any access (an external threat), whereas a door lock system on the server room that requires a swipe of the employee card is designed to prevent access by those who are already in the building (an internal threat).
Which of the following is NOT one of the three main strategies that guide CPTED?
A. Natural access control
B. Natural surveillance reinforcement
C. Natural territorials reinforcement
D. Natural surveillance
B. The three strategies are natural access control, natural territorials reinforcement, and natural surveillance.
What occurs when different encryption keys generate the same ciphertext from the same plaintext message?
A. Key clustering
B. Cryptanalysis
C. Keyspace
D. Confusion
A. Key clustering occurs when different encryption keys generate the same ciphertext from the same plaintext message.
Cryptanalysis is the science of decrypting ciphertext without prior knowledge of the key or cryptosystem used. A keyspace is all the possible key values when using a particular algorithm or other security measure. Confusion is the process of changing a key value during each round of encryption.
Which encryption system uses a private or secret key that must remain secret between the two parties?
A. Running key cipher
B. Concealment cipher
C. Asymmetric algorithm
D. Symmetric algorithm
D. A symmetric algorithm uses a private or secret key that must remain secret between the two parties.
A running key cipher uses a physical component, usually a book, to provide the polyalphabetic characters. A concealment cipher occurs when plaintext is interspersed somewhere within other written material. An asymmetric algorithm uses both a public key and a private or secret key.
Which of the following is an asymmetric algorithm?
A. IDEA
B. Twofish
C. RC6
D. RSA
D. RSA is an asymmetric algorithm. All the other algorithms are symmetric algorithms.