Introduction to Cryptography Flashcards
Which cryptographic operations use an asymmetric private key? (Choose two.)
Creating a digital signature
Verifying a digital signature
Encrypting a message
Decrypting messages
Creating a digital signature
Decrypting messages
Digital signatures assure the recipient of a message that it is authentic and has not been modified. The message sender’s private key is used to create a digital signature thus constituting nonrepudiation; the sender cannot deny having sent and signed the message because only the sender has access to their private key. Private keys are also used to decrypt messages, such as e-mail messages
Which cryptographic operation does not use a cryptographic key?
Encrypting
Hashing
Decrypting
Hashing
Hashing is used to verify that a file or message has not changed. The origin data is fed into a one-way cryptographic algorithm resulting in a unique value called a hash; a cryptographic key is not used. One-way algorithms are easy to compute given input, but it is very difficult to take a hash and determine the original value
Which type of key is used by an IPSec VPN configured with a pre-shared key (PSK)?
Private
Asymmetric
Symmetric
Symmetric
With symmetric encryption, the same key is used for encryption and decryption. The IPSec VPN PSK must be configured on both ends of the VPN tunnel
You are evaluating a secure network management solution that will be used to monitor and configure network infrastructure devices remotely. Which of the following is the best choice?
SFTP
FTPS
SNMPv3
SNMPv3
The Simple Network Management Protocol (SNMP) version 3 supports authenticated and encrypted messages when remotely monitoring and managing devices running an SNMP agent such as routers, switches, and server operating systems. SNMP normally uses UDP port 161
Your company provides remote word processing and spreadsheet file access using FTP. After a security audit, the findings suggest employing TLS to harden FTP access. Which protocol should you configure to address this concern?
SFTP
FTPS
SNMPv3
FTPS
FTPS uses TLS to enable the secure transfer of files between FTP hosts over TCP port 21 (explicit FTPS) or 990 (implicit FTPS); traditional FTP passes credentials and data over the network in clear text
You are reviewing network perimeter firewall rules for the firewall public interface and notice allowances for incoming UDP port 161 and TCP port 443 traffic. What type of traffic will be allowed through the firewall public interface, assuming default ports are being used? (Choose two.)
SFTP
SNMPv3
FTPS
HTTPS
SNMPv3
HTTPS
SNMP uses UDP port 161 and HTTPS uses TCP 443
Which encryption algorithms can SNMPv3 use?
AES, MD5
SHA-256, 3DES
3DES, AES
3DES, AES
SNMPv3 can use Triple Digital Encryption Standard (3DES) or the newer Advanced Encryption Standard (AES) algorithm to encrypt SNMP data sent over the network
You are configuring SNMPv3 authentication. Which of the following hashing algorithms are available?
MD5, RSA
MD5, SHA
SHA, AES
MD5, SHA
MD5 and SHA are hashing algorithms that are used to verify the integrity of data and can be used for authentication SNMPv3 connections over the network
You have configured LDAP over SSL (LDAPS) with default settings to secure directory service queries across subnets. Which port must be open on the subnet firewall?
TCP 389
TCP 22
TCP 636
TCP 636
Lightweight Directory Access Protocol Secure (LDAPS) uses a PKI certificate to secure LDAP connections over the network and uses TCP port 636. LDAP is used to connect to and query a centralized network directory service database such as Microsoft Active Directory
Secure POP mail transmissions use which standard port number?
995
110
993
995
The Post Office Protocol (POP) is a client mail retrieval standard and can be secured using a PKI certificate. Secure POP uses a standard port number of TCP 995
Which IPSec configuration mode encapsulates origin IP packets?
ESP
AH
Tunnel
Tunnel
IPSec tunnel mode can place an entire IP packet within another IP packet (encapsulation) and encrypt that payload
You are planning your SMTP mail system so that mail transfers are encrypted. Which protocol should you use?
NTS
SRTP
S/MIME
S/MIME
Mail traffic can be encrypted and digitally signed through the Secure/Multipurpose Internet Mail Extensions (S/MIME) protocol, which requires SMTP hosts to be configured with a PKI certificate
Which term refers to providing random data as additional input to a hashing algorithm?
Key stretching
Salting
Perfect forward secrecy
Salting
Salting enhances hashing security using random bits in addition to origin data, such as a passphrase that is fed into a one-way hashing algorithm. To calculate the original passphrase value, the salt value must be known. Salting makes dictionary attacks much less likely to succeed
Which cryptographic operations use a public key? (Choose two.)
Verifying digital signatures
Encrypting messages
Creating digital signatures
Decrypting messages
Verifying digital signatures
Encrypting messages
Private keys create a digital signature and the related public key is used to verify the signature. The sender of an encrypted message must have access to the public key of message recipients to encrypt the message for them
Which technology is described as “a secure distributed public ledger of transactions”?
Quantum computing
Steganography
Blockchain
Blockchain
Blockchain provides a distributed public ledger of transactions that cannot be modified. Because the blockchain of transactions is managed by thousands of computers, it is not controlled by a single central organization or government. Bitcoin digital currency transactions are one example of how blockchain can be used. Bitcoin transactions are considered anonymous, since the transactions are linked to a digital identity