Domain 6.0 Cryptography Flashcards

0
Q

In order for an asymmetric system to maintain the protection it affords encrypted items, which of the following must be true?

A. Keys are selected based on the longest bit supported by the systems’s algorithms
B. Public keys are exchanged only with trusted communication partners
C. Private keys are accessible only to the user to which they were assigned
D. Private keys must be used only once before being replaced

A

C. Private keys are accessible only to the user to which they were assigned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

What is a distinction or difference between a block cipher and a stream cipher?

A. Only one uses a symmetric key
B. One uses a key pair set
C. One uses a mechanism which produces a bit string the same length as the message
D. Only one provides a digital envelope

A

C. One uses a mechanism which produces a bit string the same length as the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When a digital signature is used, what is proven to the recipient along with message integrity?

A. confidentiality
B. non-repudiation
C. speed of transmission
D. non-duplication of message packets

A

B. non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is the definition of steganography?

A. The art and science of hiding one communication within another communication
B. The art and science of hiding communications from unauthorized third parties
C. Crafting a check value in order to prove or verify integrity
D. A key-pair based system where digital envelopes and digital signatures are possible

A

A. The art and science of hiding one communication within another communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What form of authentication certificates are used by PGP?

A. Bridged trees of trust
B. Web of trust
C. Hierarchical trust
D. Third party trust

A

B. Web of trust

PGP - Pretty Good Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What encryption algorithm is used by the Advanced Encryption Standard? (AES)

A. Rijndael block cipher
B. RC4 stream cipher
C. Data encryption algorithm
D. Blowfish algorithm

A

A. Rijndael block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the encryption algorithm used by WEP?

A. DES
B. IDEA
C. RC4
D. CAST

A

C. RC4

WEP - Wire Equivalent Privacy
DES - Digital Encryption Standard
IDEA - International Data Encryption Algorithm
RC4 - a popular stream cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How many bits is the hash value produced by SHA-1?

A. 128
B. 160
C. 192
D. 256

A

B. 160

SHA - Secure Hashing Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What authentication protocol provides native protection against session hijacking?

A. Kerberos
B. CHAP
C. PPP
D. SLIP

A

B. CHAP

CHAP - Challenge Handshake Authentication Protocol
PPP - Point-to-Point Protocol
SLIP - Serial Line IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What mechanism of IPSec allows for multiple simultaneous tunnels to be open on a single host?

A. HMAC
B. SKEME
C. ISAKMP
D. Oakley

A

C. ISAKMP

ISAKMP - Internet Security Association and Key Management Protocol
HMAC - Hashed Message Authentication Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following provides for the longest encryption key?

A. 3DES
B. IDEA
C. CAST
D. AES

A

D. AES

AES - Advances Encryption Standard
3DES - Triple Digital Encryption Standard
IDEA - International Data Encryption Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When a certificate has moved past its expiration date, which of the following can be performed?

A. Reissue
B. Renewal
C. Revocation
D. Expiration date extension

A

A. Reissue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

External customer report the e-mails sent from the technical support are digitally signed but the signatures cannot be validated. Some customers claim that their e-mail client does not display messages that are signed but which they are unable to validate. What is a solution to this problem that does not reduce the security of your environment?

A. Disable digital signatures on all outbound e-mails
B. Deploy an external CA
C. Issue a digital certificate to all customers
D. Require customers to use IMAP4 instead of POP3

A

A. Disable digital signatures on all outbound e-mails

CA - Certificate Authority
IMAP4 - Internet Message Access Protocol v4
POP3 - Post Office Protocol v3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What technology can be used to inform visitors that a Web site’s certificate has been revoked?

A. SSL
B. VLAN
C. X.509 v3
D. OCSP

A

D. OCSP

OCSP - Online Certificate Status Protocol
SSL - Secure Socket Layer
VLAN - Virtual Local Area Network
X.509 v3 - standard for defining Public Key Infrastructure certificate formats and fields

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is not likely to trigger a public CA revocation of an issued certificate?

A. Use within an extranet instead of a DMZ
B. Change of contact details
C. Use of certificate in a crime
D. Violation of the CPS and/or AUP

A

A. Use within an extranet instead of a DMZ

DMZ - Demilitarized Zone
CA - Certificate Authority
CPS - Certificate Practice Statements
AUP - Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly