Introduction to Cryptography D334 Flashcards
A business wants to use keys issued by a trusted third party to demonstrate to potential customers that it is a legitimate organization. Which key is used to sign the certificate issued to the business?
Private key of the root CA
A business wants to use keys issued by a trusted third party to demonstrate it is legitimate organization to potential customers. Which key should the business send to potential customers to prove its identity?
Public key of the company
What should an administrator use to import and export all items written using X.509 that are part of a chain of trust?
Public Key Cryptography Standard (PKCS) #12
Which field displays the hash, or digest, of the certificate in an X.509 certificate?
Thumbprint
Which certificate management process involves key recovery?
Issued
Which task does a root CA perform before publishing its own certificate?
Signing it with its private key
Which algorithm is used to generate the thumbprint of a certificate?
SHA-1
Large volumes of plaintext need to be encrypted, and the encryption keys need to be securely distributed. Which approach should be used for encryption and distribution?
Encryption by using symmetric keys and distribute by using asymmetric keys
What is the role of a key in asymmetric encryption and decryption?
A public key is used for encryption, and a private key is used for decryption.
A security analyst is validating the integrity and authenticity of a date transaction. Which PKI component is being used?
Digital signature
Which PKI component generates digital certificates?
Certificate authority (CA)
What is the maximum length (in bits) of encryption keys used by the WEP protocol?
40
What is a difference between WPA-Enterprise and WPA-Personal?
Support for an authentication server
Which cipher is used with WEP?
RC4
How does TKIP improve WPA over WEP?
Hashes the initialization vector and secret key
An administrator has configured a virtual private network (VPN) connection utilizing IPsec tunnel mode with Encapsulating Security Payload (ESP) between the corporate office and a remote office. Where can the packets be inspected by intrusion detection systems (IDSs) and virus scanners?
At the headquarters and the offsite location
Which default port must be open for the IPsec key exchange to be successful?
UDP 500
Which protocol indicates the virtual private network (VPN) is using Authentication Header (AH)?
51
Which cipher uses a grid to map letters into numeric values?
Bifid
Which cipher uses a five-by-five matrix with nonrepeating characters?
Playfair
What does a frequency analysis attack to break encryption involve?
Analyzing ciphertext to identify text variation and comparing the text to standard English characters.
Which technique should a security analyst use to determine the key length in a Vigenere cipher?
Kasiski examination
What defines a prime number?
Only has factors of itself and 1
What is 29 and 12?
5