Module 6 Flashcards
Deo has been asked to explain RSA to his colleague. After his explanation, Deo is asked what, if any, weaknesses RSA has. How would Deo respond?
a) As computers become more powerful, the ability to compute factoring has increased.
b) RSA weaknesses are based on ECC.
c) RSA has no known weaknesses.
d) The digest produced by the RSA algorithm is too short to be secure.
As computers become more powerful, the ability to compute factoring has increased.
What is a collision?
a) Two algorithms have the same key.
b) Two keys are the same length.
c) Two files produce the same digest.
d) Two ciphertexts have the same length.
Two files produce the same digest.
Which of the following is NOT a characteristic of the Trusted Platform Module (TPM)?
A) It includes a pseudorandom number generator (PRNG).
B) It can generate asymmetric cryptographic public and private keys.
C) It can easily be transported to another computer.
D) It provides cryptographic services in hardware instead of software.
D) It provides cryptographic services in hardware instead of software.
Which of the following is NOT a symmetric cryptographic algorithm?
- SHA
- DES
- 3DES
- Blowfish
SHA
Which of the following is FALSE about “security through obscurity”?
- It is essentially impossible.
- It can only provide limited security.
- It attempts to hide the existence from outsiders.
- Proprietary cryptographic algorithms are an example.
-It can only provide limited security.
A manager working in ABC Consulting shared a list of employees from his team who were eligible for an extra week off. Later, he claimed that he has never shared this list. Which principle or functionality of a secured communication can be used to substantiate or verify the manager’s claim?
- Obfuscation
- Steganography
- Hashing
- Nonrepudiation
Nonrepudiation
Which of the following is used to create a sequence of numbers whose output is close to a random number?
- PRNG
- GnuPG
- DSA
- RSA
PRNG
ABC Enterprise is a global operation. As such, it needs to send regular, confidential messages and data between offices to communicate important market information, employee decisions, financial decisions, etc., for management consideration and senior-level decision making. Since these decisions impact the local employees and global businesses, they suspect that these data may be prone to attacks from threat actors internally and externally. While one of the senior systems administrators suggested implementing steganography to achieve this objective, the IT Department head at another branch suggested implementing cryptography. The management team has now called you for expert advice to select the best method to implement in the enterprise.
What should your advice be, and why?
- Cryptography should be implemented because it allows information to be viewed only by authorized users and checks whether the information has been altered or changed by anybody. It also makes the information unclear, even if other users see it. Cryptography is a more advanced technology than steganography. These features make cryptography the right choice for the enterprise to implement.
- Steganography should be implemented because it allows information to be viewed only by authorized users and checks whether information has been altered or changed by anybody. It also makes the information unclear so that even if other users see the information, they will not understand it. Steganography is a more advanced technology than cryptography. These features make steganography the right choice for the enterprise to implement.
- Cryptography should be implemented because it embeds the actual message in a different message before transmission. This makes the information difficult to identify and helps identify the sender, making it very secure and the right choice to implement for the enterprise.
- Steganography should be implemented because it provides functionality to verify and ensure that the message is from an authentic sender. It also makes the message unclear, even if the message is intercepted by a threat actor and identified from the file where steganography is implemented, making it very secure.
Cryptography should be implemented because it allows information to be viewed only by authorized users and checks whether the information has been altered or changed by anybody. It also makes the information unclear, even if other users see it. Cryptography is a more advanced technology than steganography. These features make cryptography the right choice for the enterprise to implement.
ABC Enterprises plans to upgrade its internal confidential communication channel for the senior management team, which is geographically spread out, to enhance communication speed and security. They have decided to use cryptography to achieve this but can’t decide on which model. The CEO has come to you for your suggestion on whether to use RSA or ECC.
What should you recommend to the CEO, and why?
- ECC, as it uses three rounds of encryption. It employs 48 iterations in its encryptions, using different keys each for each round. This makes the message extremely secure while making the communication exchange extremely fast.
- ECC, as it uses sloping curves to generate keys. This makes it very secure for smaller key sizes making it secure and the communication exchange extremely fast.
- RSA, as it uses sloping curves to generate keys. This makes it very secure for smaller key sizes, making it secure and the communication exchange extremely fast.
- RSA, as it uses three rounds of encryption. It employs 48 iterations in its encryptions, using different keys each for each round. This makes the message extremely secure while making the communication exchange extremely fast.
ECC, as it uses sloping curves to generate keys. This makes it very secure for smaller key sizes making it secure and the communication exchange extremely fast.
John receives an encrypted document using asymmetric cryptography from Alex. Which process should Alex use along with asymmetric cryptography so that John can be sure that the received document is real, from Alex, and unaltered?
- Rivest-Shamir-Alderman
- Digital signature algorithm
- Elliptic curve cryptography
- Symmetric cryptography
Digital signature algorithm
John needs to add an algorithm for his company communication process, in which encryption uses two keys. One is the public key, and the other one is a private key. Which algorithm will be suitable to achieve this?
-Symmetric cryptographic
- Lightweight cryptographic
- Asymmetric cryptographic
- Private key cryptographic
Asymmetric cryptographic
Which algorithm encrypts and decrypts data using the same key?
- Symmetric cryptographic algorithm
- Rivest-Shamir-Adleman algorithm
- Asymmetric cryptographic algorithm
- Hash algorithm
Symmetric cryptographic algorithm
Which of the following devices can perform cryptographic erase?
- USB device encryption
- HSM
- SED
- TPM
Self-encrypting drives (SEDs)
Which of the following statements describe a quantum computer?
- A quantum computer is a computer that relies on qubits that can be both 0 and 1 at the same time.
- A quantum computer is a computer that uses the structure of physical gadgets with sensors, software, and other technologies to connect and swap data with other devices and systems over the internet.
- A quantum computer is a computer with a chip on its motherboard that provides cryptographic services, includes a true random number generator, and supports fully asymmetric encryption.
- A quantum computer uses encrypted hardware until the correct password is provided and all data copied to the computer is automatically encrypted.
A quantum computer is a computer that relies on qubits that can be both 0 and 1 at the same time.
Harry works at an automobile parts manufacturer. They sell these parts to retailers and deposit the proceeds in their bank. Using these funds, Harry pays the suppliers and employees. The Accounts Department maintains a ledger of all transactions of materials bought and sold. Similarly, the quality department and operations department also maintain a ledger of all transactions. Over the years, this process has become quite cumbersome, as growing data create confusion. Harry is looking at simplifying the process and has contacted you for a solution.
Using which technology can this process be simplified and confusions avoided?
- Blockchain
- TPM
- SED
- HSM
Blockchain