Encryption PEs Flashcards

1
Q

Which of the following is the closest example of a cipher text?

A

bWFuIGJlYXIgcGln

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data fed into an encryption fucnction will administer a series of steps called an algorithm on the data to produce a file in plaintext that relies on a key to reverse it.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What algorithm is a block cypher that encrypts data in 64 bit blocks, and utilizes a key size that varies in length?

A

Blowfish Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What algorithm is the most widely used encryption standard in use today?

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This CIA Triad pillar is what prevents the sender from denying they sent an encrypted message.

A

Non-Repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The science of encrypting and decrypting information is called_________.

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In order for encryption to actually work it has to contain a variable, which in encryption is the key and a set of actions (Algorithm) to manipulate the data.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

__________ is how information is concealed into a code so that the data is visible and the true meaning of the information cannot be determined unless you have access to or are familiar with what the key is.

A

UNKNOWN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This is used to prove the contents of a message have not been changed since it was sent.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of encryption uses both a private and a public key?

A

Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This principle is ensuring sensitive information remains private unless given to another with explicit consent.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When using Stream Algorithms, set lengths of bits are encrypted in blocks of electronic data with the use of a specific secret key. As the data is being encrypted, the system holds the data in its memory as it waits for complete blocks.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Whenever trying to verify the user who wants to get access to a system

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The cryptographic hash function is a 2-way function.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Encryption is only able to protect data at rest or stored data. It cannot protect data while in transit.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The Blowfish Encryption Algorithm was developed as an alternative for DES. Being asymmetric, it uses a separate key for both encryption and decryption.

A

False

17
Q

SSL and TLS utilize what type/s of encryption?

A

A combination of asymmetric and symmetric encryption

18
Q

Symmetric encryption consists of _______ key/s for encryption and decryption.

A

1

19
Q

Which encryption method does NOT use a symmetric key?

A

RSA

20
Q

What are the two different types of encryption?

A

Asymmetric, Symmetric

21
Q

MD5 hashes are _____ bits in length and show their _____ digit hexadecimal value equivalent.

A

128, 32

22
Q

While MD5 is useful, it is not extremely robust or secure making it good for file verification but not good for things that need to be highly secured.

A

False

23
Q

Before the DES process even starts, every 6th bit of the key is discarded to produce a 56-bit key.

A

False, It discards every 8th bit

24
Q

What are the two main types of Symmetric algorithms?

A

Block Algorithms, Streams Algorithms

25
Q

When visiting an HTTPS website, your browser establishes an ____________ encrypted connection.

A

Asymmetric.
Keep in mind

26
Q

A message digest is encrypted with the sender’s private key, this digest is referred to as a digital signature. The receiver of this message can decrypt it using the receiver’s private key.

A

False. Message Digest is hashing not encryption

27
Q

You (A forensicator) was assigned to analyze a file “bugs_bunny.jpg” containing an image. Upon further inspection you found social security numbers in its contents. You immediately write a report documenting everything you found and the technical steps necessary to repeat your findings. You take the file including the operation notes into a single directory and encrypt its contents with the chosen passphrase “AppleBeesKnees”. You send the file to the commander through covert channels so he can make a decision.
What is the data format before encrypting?

A

Plaintext

28
Q

You (A forensicator) was assigned to analyze a file “bugs_bunny.jpg” containing an image. Upon further inspection you found social security numbers in its contents. You immediately write a report documenting everything you found and the technical steps necessary to repeat your findings. You take the file as well as the operation notes into a single directory and encrypt its contents with the chosen passphrase “AppleBeesKnees”. You send the file to the commander through covert channels so he can make a decision. Which of the following is MOST true and would apply from the scenario?

  • The digital signature was embeded into the passphrase.
  • Based on the scenario the commander alone cannot decrypt the file(s) recieved.
  • The forensicator would have sent two encrypted files (the writeup & the image)
  • The commander will require his personal public key to decrypt the message.
  • The senders private key will be necessary for the commander to decrypt the message
A

The answer is NOT “The commander will require his personal public key to decrypt the message.”

29
Q

An individual with an extensive understanding of information technologies is taking data at the bit and hex level rearanging their order in a sequence of calculated steps. The user takes every fourth bit and swaps it with the next following fourth bit. when observing files after the change as a general user; the files can no longer be interpreted.

Based on the scenario, Which is being utilized

A

Encryption

30
Q

You are on a mission and arrive at your designated host nations base, You are inbriefed on majority of the assets currently on the host nations network. Unfortunately, after trying to get more information about the network; administrators are lacking an up to date network map detailing their network. The mission support NCO has instructed you to scan the network and assertain as much information remotely as possible. You decide to run nmap to collect and compile what you believe is the latest information on their systems in a text file. This isnt the first time nmap’s utilized; another team member has a premade script from a previous mission that will extrapolate nmap scan results and process the information into a detailed graphic file. The script will only read in CSV and XML files.

Based on the scenario, Which is necessary for the nmap text file to be utilized by the script?

A

Encoding

31
Q

Lets have fun, what is the message?

3NCryPT10N 12 4 P41N

A

Encryption is a pain

32
Q

Lets have fun, what is the message?

I2 3L0n mu5k r3alLy 8uYin’ 7wI773r?

A

Is Elon musk really buying twitter?

33
Q

Stegonagraphy can hide a message in which of the following file types?

  • Video
  • Audio
  • text
  • Images
  • All of the above
  • None of the above
A

All of the above

34
Q

Our informant who goes under the codename Butters transfered via the darkweb a zipped file containing multiple messages each with the name of shanties. Only one is digitally signed by him the rest are insignificant noise. Weve already included his public key to asist in finding the real message. Input the Shanty as the flag.

A

How I solved this was using gpg commands.

  1. Download the zip file and unzip it
  2. type “gpg –import Butters.asc “ This is obvious, you import the key so that you can verify the signature later”
  3. then type “gpg –show-keys Butters.asc” this will you you the rsa key hash.
  4. Then run
    Then “gpg –verify Message1.txt.gpg” this will run it with your currently installed keys.
  5. Then run “gpg –decrypt Message5.txt” at the top it will show you the answer.
35
Q

Our informant who goes under the codename Butters transfered via the darkweb a zipped file containing multiple messages each with the name of shanties. Only one is digitally signed by him the rest are insignificant. Weve already included his public key to asist in finding the real message.

What time was the file signed? (YYYYMMDD)

A

Then run “gpg –decrypt Message5.txt” at the top it will show you the answer.

36
Q

Identify the files with the same md5 hash and input the names with extenstion as the flag.

A
  1. Download the zip file. Unzip
  2. Run md5sum on every file until you have 2 that are the same.
  3. Answer is pediatrics.pdf,posions.pdf
37
Q

Identify the file with the md5 hash ending in “cdd7” and input its name with extenstion as the flag.

A

I copied all of the file names into a bash script with the md5sum before the file names.

Then I ran the shell script and output it into a txt.

Then i ran cat and grepped the last 4 that they gave me.

Coming out with the answer “Port.jpg”

38
Q

Identify the file with an md5hash containing “99af7” anywhere in its hash. Based on the files provided what is the file plus extention?

A

I copied all of the file names into a bash script with the md5sum before the file names.

Then I ran the shell script and output it into a txt.

Then i ran cat and grepped the last 4 that they gave me.

Coming out with the answer “Port.jpg”I copied all of the file names into a bash script with the md5sum before the file names.

Then I ran the shell script and output it into a txt.

Then i ran cat and grepped the last 4 that they gave me.

Coming out with the answer “City.jpg”

39
Q

Based on the following what is the possible hash algorithm utilized? “dfa84e02930528d6b595a975c78f290e75bcb9483db96372b90f5efad1cec020”

A

SHA256