Domain 6.0 Cryptography Flashcards
In order for an asymmetric system to maintain the protection it affords encrypted items, which of the following must be true?
A. Keys are selected based on the longest bit supported by the systems’s algorithms
B. Public keys are exchanged only with trusted communication partners
C. Private keys are accessible only to the user to which they were assigned
D. Private keys must be used only once before being replaced
C. Private keys are accessible only to the user to which they were assigned
What is a distinction or difference between a block cipher and a stream cipher?
A. Only one uses a symmetric key
B. One uses a key pair set
C. One uses a mechanism which produces a bit string the same length as the message
D. Only one provides a digital envelope
C. One uses a mechanism which produces a bit string the same length as the message
When a digital signature is used, what is proven to the recipient along with message integrity?
A. confidentiality
B. non-repudiation
C. speed of transmission
D. non-duplication of message packets
B. non-repudiation
Which of the following is the definition of steganography?
A. The art and science of hiding one communication within another communication
B. The art and science of hiding communications from unauthorized third parties
C. Crafting a check value in order to prove or verify integrity
D. A key-pair based system where digital envelopes and digital signatures are possible
A. The art and science of hiding one communication within another communication
What form of authentication certificates are used by PGP?
A. Bridged trees of trust
B. Web of trust
C. Hierarchical trust
D. Third party trust
B. Web of trust
PGP - Pretty Good Privacy
What encryption algorithm is used by the Advanced Encryption Standard? (AES)
A. Rijndael block cipher
B. RC4 stream cipher
C. Data encryption algorithm
D. Blowfish algorithm
A. Rijndael block cipher
What is the encryption algorithm used by WEP?
A. DES
B. IDEA
C. RC4
D. CAST
C. RC4
WEP - Wire Equivalent Privacy
DES - Digital Encryption Standard
IDEA - International Data Encryption Algorithm
RC4 - a popular stream cipher
How many bits is the hash value produced by SHA-1?
A. 128
B. 160
C. 192
D. 256
B. 160
SHA - Secure Hashing Algorithm
What authentication protocol provides native protection against session hijacking?
A. Kerberos
B. CHAP
C. PPP
D. SLIP
B. CHAP
CHAP - Challenge Handshake Authentication Protocol
PPP - Point-to-Point Protocol
SLIP - Serial Line IP
What mechanism of IPSec allows for multiple simultaneous tunnels to be open on a single host?
A. HMAC
B. SKEME
C. ISAKMP
D. Oakley
C. ISAKMP
ISAKMP - Internet Security Association and Key Management Protocol
HMAC - Hashed Message Authentication Code
Which of the following provides for the longest encryption key?
A. 3DES
B. IDEA
C. CAST
D. AES
D. AES
AES - Advances Encryption Standard
3DES - Triple Digital Encryption Standard
IDEA - International Data Encryption Algorithm
When a certificate has moved past its expiration date, which of the following can be performed?
A. Reissue
B. Renewal
C. Revocation
D. Expiration date extension
A. Reissue
External customer report the e-mails sent from the technical support are digitally signed but the signatures cannot be validated. Some customers claim that their e-mail client does not display messages that are signed but which they are unable to validate. What is a solution to this problem that does not reduce the security of your environment?
A. Disable digital signatures on all outbound e-mails
B. Deploy an external CA
C. Issue a digital certificate to all customers
D. Require customers to use IMAP4 instead of POP3
A. Disable digital signatures on all outbound e-mails
CA - Certificate Authority
IMAP4 - Internet Message Access Protocol v4
POP3 - Post Office Protocol v3
What technology can be used to inform visitors that a Web site’s certificate has been revoked?
A. SSL
B. VLAN
C. X.509 v3
D. OCSP
D. OCSP
OCSP - Online Certificate Status Protocol
SSL - Secure Socket Layer
VLAN - Virtual Local Area Network
X.509 v3 - standard for defining Public Key Infrastructure certificate formats and fields
Which of the following is not likely to trigger a public CA revocation of an issued certificate?
A. Use within an extranet instead of a DMZ
B. Change of contact details
C. Use of certificate in a crime
D. Violation of the CPS and/or AUP
A. Use within an extranet instead of a DMZ
DMZ - Demilitarized Zone
CA - Certificate Authority
CPS - Certificate Practice Statements
AUP - Acceptable Use Policy