Domain 3: Review Questions Flashcards
Which of the following is most correct?
A. Asymmetric crypto has a larger key space.
B. A cryptogram is a segment of cipher text transmitted over the internet, but not over a VPN.
C. TLS and SSL use symmetric crypto
D. The key schedule is determined by the programmer when writing the software but can be changed by the device’s system admin.
A. Asymmetric crypto has a larger key space.
Asymmetric cryptography (e.g., RSA, ECC) typically uses much larger key sizes than symmetric cryptography to achieve equivalent security. For example:
A 2048-bit RSA key provides security comparable to a 128-bit AES key.
The larger key space increases the complexity of brute-force attacks in asymmetric encryption.
Which of the following is NOT correct?
A. When using PKI, the sender can use their own private key or the public key of the receiver.
B. When electing to use their private key, the sender provides proof of origin
C. A strength of Asymmetric cryptography is that is scales well in a mesh network
D. One strength of symmetric crypto is key distribution
D. One strength of symmetric crypto is key distribution.
D is Incorrect.
Key distribution is a major weakness of symmetric cryptography because the secret key must be securely shared between parties before communication can occur. This requires secure channels or additional mechanisms, making symmetric cryptography less scalable.
Which of the following is provided if data cannot be read?
A. Integrity
B. Confidentiality
C. Availability
D. Defense in depth
B. Confidentiality is provided if the data cannot be read. It can be provided either through access controls and encryption for data as it exists on a hard drive or through encryption as the data is in transit.
In a distributed environment, which of the following is software that ties the client and server software together?
A. Embedded system
B. Mobile code
C. Virtual computing
D. Middleware
D. In a distributed environment, middleware is software that ties the client and server software together. It is neither a part of the operating system nor a part of the server software. It is the code that lies between the operating system and applications on each side of a distributed computing system in a network.
Which of the following is composed of the components (hardware, firmware, and/or software) that are expected to enforce the security policy of the system?
A. Security perimeter
B. Reference monitor
C. Trusted Computer Base (TCB)
D. Security kernel
C. The Trusted Computer Base (TCB) is composed of the components (hardware, firmware, and/or software) that are trusted to enforce the security policy of the system and that if compromised jeopardize the security properties of the entire system.
Which process converts plaintext into ciphertext?
A. Hashing
B. Decryption
C. Encryption
D. Digital signature
C. Encryption converts plaintext into ciphertext. Hashing reduces a message to a hash value. Decryption converts ciphertext into plaintext. A digital signature is an object that provides sender authentication and message integrity by including a digital signature with the original message.
Which type of cipher is the Caesar cipher
A. Polyalphabetic substitution
B. Mono-alphabetic substitution
C. Polyalphabetic transposition
D. Mono-alphabetic transposition
B. The Caesar cipher is a mono-alphabetic substitution cipher. The Vigenere substitution is a polyalphabetic substitution.
Which of the following is the most secure encryption scheme?
A. Concealment cipher
B. Symmetric algorithm
C. One-time pad
D. Asymmetric algorithm
C. A one-time pad is the most secure encryption scheme because it is used only once.
Which 3DES implementation encrypts each block of data three times, each time with a different key?
A. 3DES-EDE3
B. 3DES-EEE3
C. 3DES-EDE2
D. 3DES-EEE2
B. The 3DES-EEE3 implementation encrypts each block of data three times, each time with a different key.
The 3DES-EDE3 implementation encrypts each block of data with the first key, decrypts each block with the second key, and encrypts each block with the third key. The 3DES-EDE2 implementation encrypts each block of data with the first key, decrypts each block with the second key, and then encrypts each block with the first key. The 3DES-EEE2 implementation encrypts each block of data with the first key, encrypts each block with the second key, and then encrypts each block with the first key.
Which of the following is NOT a hash function?
A. ECC
B. MD6
C. SHA-2
D. RIPEMD-160
A. Elliptic Curve Cryptosystem (ECC) is NOT a hash function. It is an asymmetric algorithm. All the other options are hash functions.
Which of the following is an example of a preventive control?
A. A door lock system on a server room
B. An electric fence surrounding a facility
C. Armed guards outside a facility
D. Parking lot cameras
A.
An electric fence surrounding a facility is designed to deter access to the building by those who should not have any access (an external threat), whereas a door lock system on the server room that requires a swipe of the employee card is designed to prevent access by those who are already in the building (an internal threat).
Which of the following is NOT one of the three main strategies that guide CPTED?
A. Natural access control
B. Natural surveillance reinforcement
C. Natural territorials reinforcement
D. Natural surveillance
B. The three strategies are natural access control, natural territorials reinforcement, and natural surveillance.
What occurs when different encryption keys generate the same ciphertext from the same plaintext message?
A. Key clustering
B. Cryptanalysis
C. Keyspace
D. Confusion
A. Key clustering occurs when different encryption keys generate the same ciphertext from the same plaintext message.
Cryptanalysis is the science of decrypting ciphertext without prior knowledge of the key or cryptosystem used. A keyspace is all the possible key values when using a particular algorithm or other security measure. Confusion is the process of changing a key value during each round of encryption.
Which encryption system uses a private or secret key that must remain secret between the two parties?
A. Running key cipher
B. Concealment cipher
C. Asymmetric algorithm
D. Symmetric algorithm
D. A symmetric algorithm uses a private or secret key that must remain secret between the two parties.
A running key cipher uses a physical component, usually a book, to provide the polyalphabetic characters. A concealment cipher occurs when plaintext is interspersed somewhere within other written material. An asymmetric algorithm uses both a public key and a private or secret key.
Which of the following is an asymmetric algorithm?
A. IDEA
B. Twofish
C. RC6
D. RSA
D. RSA is an asymmetric algorithm. All the other algorithms are symmetric algorithms.
Symmetric Algorithm include Digital Encryption Standard and Triple Data Encryption Standard, Advanced Encryption Standard, IDEA, Skipjack, Blowfish, Twofish, RC4/RC5/RC6/RC7, and CAST
Asymmetric Algorithms include Diffie-Hellman, RSA, El Gamal, ECC, Knapsack, and zero-knowledge proof.
Which PKI component contains a list of all the certificates that have been revoked?
A. CA
B. RA
C. CRL
D. OCSP
C. A certificate revocation list (CRL) contains a list of all the certificates that have been revoked.
A certificate authority (CA) is the entity that creates and signs digital certificates, maintains the certificates, and revokes them when necessary. A registration authority (RA) verifies the requestor’s identity, registers the requestor, and passes the request to the CA. Online Certificate Status Protocol (OCSP) is an Internet protocol that obtains the revocation status of an X.509 digital certificate.
Which attack executed against a cryptographic algorithm uses all possible keys until a key is discovered that successfully decrypts the ciphertext?
A. Frequency analysis
B. Reverse engineering
C. Ciphertext-only attack
D. Brute force
D. A brute-force attack executed against a cryptographic algorithm uses all possible keys until a key is discovered that successfully decrypts the ciphertext.
A frequency analysis attack relies on the fact that substitution and transposition ciphers will result in repeated patterns in ciphertext. A reverse engineering attack occurs when an attacker purchases a particular cryptographic product to attempt to reverse engineer the product to discover confidential information about the cryptographic algorithm used. A ciphertext-only attack uses several encrypted messages (ciphertext) to figure out the key used in the encryption process.
In ISO/IEC 15288:2015, which process category includes acquisition and supply?
A. Technical management processes
B. Technical processes
C. Agreement processes
D. Organizational project-enabling processes
C. ISO/IEC 15288:2015 establishes four categories of processes:
- Agreement processes, including acquisition and supply
- Organizational project-enabling processes, including infrastructure management, quality management, and knowledge management
- Technical management processes, including project planning, risk management, configuration management, and quality assurance
- Technical processes, including system requirements definition, system analysis, implementation, integration, operation, maintenance, and disposal
Which statement is true of dedicated security mode?
A. It employs a single classification level.
B. All users have the same security clearance, but they do not all possess a need-to-know clearance for all the information in the system.
C. All users must possess the highest security clearance, but they must also have valid need-to-know clearance, a signed NDA, and formal approval for all information to which they have access.
D. Systems allow two or more classification levels of information to be processed at the same time.
A. Dedicated security mode employs a single classification level.
What is the first step in ISO/IEC 27001:2013?
A. Identify the requirements.
B. Perform risk assessment and risk treatment.
C. Maintain and monitor the ISMS.
D. Obtain management support.
D. The first step in ISO/IEC 27001:2013 is to obtain management support.
Which two states are supported by most processors in a computer system?
A. Supervisor state and problem state
B. Supervisor state and kernel state
C. Problem state and user state
D. Supervisor state and elevated state
A. Two processor states are supported by most processors: supervisor state (or kernel mode) and problem state (or user mode).
When supporting a BYOD initiative, from which group do you probably have most to fear?
A. Hacktivists
B. Careless users
C. Software vendors
D. Mobile device vendors
B. As a security professional, when supporting a BYOD initiative, you should take into consideration that you probably have more to fear from the carelessness of the users than you do from hackers.
Which term applies to embedded devices that bring with them security concerns because engineers that design these devices do not always worry about security?
A. BYOD
B. NDA
C. IoT
D. ITSEC
C. Internet of Things (IoT) is the term used for embedded devices and their security concerns because engineers that design these devices do not always worry about security.
Which option best describes the primary concern of NIST SP 800-57?
A. Asymmetric encryption
B. Symmetric encryption
C. Message integrity
D. Key management
D. Key management is the primary concern of NIST SP 800-57.
Which of the following key types requires only integrity security protection?
A. Public signature verification key
B. Private signature key
C. Symmetric authentication key
D. Private authentication key
A. Public signature verification keys require only integrity security protection.
What is the final phase of the cryptographic key management life cycle, according to NIST SP 800-57?
A. Operational phase
B. Destroyed phase
C. Pre-operational phase
D. Post-operational phase
B. The destroyed phase is the final phase of the cryptographic key management life cycle, according to NIST SP 800-57.
Which of the following are examples of symmetric algorithm?
A. Triple Data Encryption Standard,
B. RC4/RC5/RC6/RC7
C. El Gamal
D. Advanced Encryption Standard
E. ECC
A, B, D
Symmetric Algorithms include Digital Encryption Standard and Triple Data Encryption Standard, Advanced Encryption Standard, IDEA, Skipjack, Blowfish, Twofish, RC4/RC5/RC6/RC7, and CAST.
Asymmetric Algorithms include Diffie-Hellman, RSA, El Gamal, ECC, Knapsack, and zero-knowledge proof.
Matthew is the security administrator for a consulting firm and must enforce access controls that restrict users’ access based upon their previous activity. For example, once a consultant accesses data belonging to Acme Cola, a consulting client, they may no longer access data belonging to any of Acme’s competitors. What security model best fits Matthew’s needs?
A. Clark-Wilson
B. Biba
C. Bell-LaPadula
D. Brewer-Nash
D.
The Brewer-Nash model allows access controls to change dynamically based upon a user’s actions. It is often used in environments like Matthew’s to implement a “Chinese wall” between data belonging to different clients.
Referring to the figure shown here, what is the earliest stage of a fire where it is possible to use detection technology to identify it?
A. Incipient
B. Smoke
C. Flame
D. Heat
A.
Fires may be detected as early as the incipient stage. During this stage, air ionization takes place, and specialized incipient fire detection systems can identify these changes to provide early warning of a fire.
Ralph is designing a physical security infrastructure for a new computing facility that will remain largely unstaffed. He plans to implement motion detectors in the facility but would also like to include a secondary verification control for physical presence. Which one of the following would best meet his needs?
A. CCTV
B. IPS
C. Turnstiles
D. Faraday cages
A.
Closed-circuit television (CCTV) systems act as a secondary verification mechanism for physical presence because they allow security officials to view the interior of the facility when a motion alarm sounds to determine the current occupants and their activities.
Harry would like to retrieve a lost encryption key from a database that uses m of n control, with m = 4 and n = 8. What is the minimum number of escrow agents required to retrieve the key?
A. 2
B. 4
C. 8
D. 12
B.
In an m of n control system, at least m of n possible escrow agents must collaborate to retrieve an encryption key from the escrow database.
Fran’s company is considering purchasing a web-based email service from a vendor and eliminating its own email server environment as a cost-saving measure. What type of cloud computing environment is Fran’s company considering?
A. SaaS
B. IaaS
C. CaaS
D. PaaS
A.
This is an example of a vendor offering a fully functional application as a web-based service. Therefore, it fits under the definition of software as a service (SaaS). In infrastructure as a service (IaaS), compute as a service (CaaS), and platform as a service (PaaS), the customer provides their own software. In this example, the vendor is providing the email software, so none of those choices is appropriate.
Bob is a security administrator with the U.S. federal government and wants to choose a digital signature approach that is an approved part of the federal Digital Signature Standard under FIPS 186-5. Which one of the following encryption algorithms is not an acceptable choice for use in digital signatures?
A. EdDSA
B. HAVAL
C. RSA
D. ECDSA
B.
The Digital Signature Standard approves three encryption algorithms for use in digital signatures: the Rivest, Shamir, Adleman (RSA) algorithm; the Elliptic Curve DSA (ECDSA) algorithm, and the Edwards Curve Digital Signature Algorithm (EdDSA). HAVAL is a hash function, not an encryption algorithm. While hash functions are used as part of the digital signature process, they do not provide encryption.
Harry would like to access a document owned by Sally and stored on a file server. Applying the subject/object model to this scenario, who or what is the subject of the resource request?
A. Harry
B. Sally
C. Server
D. Document
A.
In the subject/object model of access control, the user or process making the request for a resource is the subject of that request. In this example, Harry is requesting resource access and is, therefore, the subject.
Michael is responsible for forensic investigations and is investigating a medium-severity security incident that involved the defacement of a corporate website. The web server in question ran on a virtualization platform, and the marketing team would like to get the website up and running as quickly as possible. What would be the most reasonable next step for Michael to take?
A. Keep the website offline until the investigation is complete.
B. Take the virtualization platform offline as evidence.
C. Take a snapshot of the compromised system and use that for the investigation.
D. Ignore the incident and focus on quickly restoring the website.
C.
Michael should conduct his investigation, but there is a pressing business need to bring the website back online. The most reasonable course of action would be to take a snapshot of the compromised system and use the snapshot for the investigation, restoring the website to operation as quickly as possible while using the results of the investigation to improve the security of the site.
Helen is a software engineer and is developing code that she would like to restrict to running within an isolated sandbox for security purposes. What software development technique is Helen using?
A. Bounds
B. Input validation
C. Confinement
D. TCB
C.
Using a sandbox is an example of confinement, where the system restricts the access of a particular process to limit its ability to affect other processes running on the same system.
What concept describes the degree of confidence that an organization has that its controls satisfy security requirements?
A. Trust
B. Credentialing
C. Verification
D. Assurance
D.
Assurance is the degree of confidence that an organization has that its security controls are correctly implemented. It must be continually monitored and reverified.
What type of security vulnerability are developers most likely to introduce into code when they seek to facilitate their own access, for testing purposes, to software they developed?
A. Maintenance hook
B. Cross-site scripting
C. SQL injection
D. Buffer overflow
A.
Maintenance hooks, otherwise known as backdoors, provide developers with easy access to a system, bypassing normal security controls. If not removed prior to finalizing code, they pose a significant security vulnerability if an attacker discovers the maintenance hook.
In the figure shown here, Sally is blocked from reading the file due to the Biba integrity model. Sally has a Secret security clearance, and the file has a Confidential classification. What principle of the Biba model is being enforced?
A. Simple Security Property
B. Simple Integrity Property
C. *-Security Property
D. *-Integrity Property
B.
The Simple Integrity Property states that an individual may not read a file classified at a lower security level than the individual’s security clearance.
Tom is responsible for maintaining the security of systems used to control industrial processes located within a power plant. What term is used to describe these systems?
A. POWER
B. SCADA
C. HAVAL
D. COBOL
B.
Supervisory control and data acquisition (SCADA) systems are used to control and gather data from industrial processes. They are commonly found in power plants and other industrial environments.
Sonia recently removed an encrypted hard drive from a laptop and moved it to a new device because of a hardware failure. She is having difficulty accessing encrypted content on the drive despite that she knows the user’s password. What hardware security feature is likely causing this problem?
A. TCB
B. TPM
C. NIACAP
D. RSA
B.
The Trusted Platform Module (TPM) is a hardware security technique that stores an encryption key on a chip on the motherboard and prevents someone from accessing an encrypted drive by installing it in another computer.
Chris wants to verify that a software package that he downloaded matches the original version. What hashing tool should he use if he believes that technically sophisticated attackers may have replaced the software package with a version containing a backdoor?
A. MD5
B. 3DES
C. SHA1
D. SHA 256
D.
Intentional collisions have been created with MD5, and a real-world collision attack against SHA 1was announced in early 2017. 3DES is not a hashing tool, leaving SHA 256 (sometimes called SHA 2) as the only real choice that Chris has in this list.
Alice and Bob would like to use an asymmetric cryptosystem to communicate with each other. They are located in different parts of the country but have exchanged encryption keys by using digital certificates signed by a mutually trusted certificate authority.
If Alice wants to send Bob a message that is encrypted for confidentiality, what key does she use to encrypt the message?
A. Alice’s public key
B. Alice’s private key
C. Bob’s public key
D. Bob’s private key
C
In an asymmetric cryptosystem, the sender of a message encrypts the message using the recipient’s public key. The recipient may then decrypt that message using their own private key, which only they should possess.