Module 6 Flashcards

1
Q

Deo has been asked to explain RSA to his colleague. After his explanation, Deo is asked what, if any, weaknesses RSA has. How would Deo respond?

a) As computers become more powerful, the ability to compute factoring has increased.
b) RSA weaknesses are based on ECC.
c) RSA has no known weaknesses.
d) The digest produced by the RSA algorithm is too short to be secure.

A

As computers become more powerful, the ability to compute factoring has increased.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a collision?

a) Two algorithms have the same key.
b) Two keys are the same length.
c) Two files produce the same digest.
d) Two ciphertexts have the same length.

A

Two files produce the same digest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is NOT a characteristic of the Trusted Platform Module (TPM)?
A) It includes a pseudorandom number generator (PRNG).
B) It can generate asymmetric cryptographic public and private keys.
C) It can easily be transported to another computer.
D) It provides cryptographic services in hardware instead of software.

A

D) It provides cryptographic services in hardware instead of software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is NOT a symmetric cryptographic algorithm?

  • SHA
  • DES
  • 3DES
  • Blowfish
A

SHA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is FALSE about “security through obscurity”?

  • It is essentially impossible.
  • It can only provide limited security.
  • It attempts to hide the existence from outsiders.
  • Proprietary cryptographic algorithms are an example.
A

-It can only provide limited security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A manager working in ABC Consulting shared a list of employees from his team who were eligible for an extra week off. Later, he claimed that he has never shared this list. Which principle or functionality of a secured communication can be used to substantiate or verify the manager’s claim?

  • Obfuscation
  • Steganography
  • Hashing
  • Nonrepudiation
A

Nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is used to create a sequence of numbers whose output is close to a random number?

  • PRNG
  • GnuPG
  • DSA
  • RSA
A

PRNG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ABC Enterprise is a global operation. As such, it needs to send regular, confidential messages and data between offices to communicate important market information, employee decisions, financial decisions, etc., for management consideration and senior-level decision making. Since these decisions impact the local employees and global businesses, they suspect that these data may be prone to attacks from threat actors internally and externally. While one of the senior systems administrators suggested implementing steganography to achieve this objective, the IT Department head at another branch suggested implementing cryptography. The management team has now called you for expert advice to select the best method to implement in the enterprise.

What should your advice be, and why?

  • Cryptography should be implemented because it allows information to be viewed only by authorized users and checks whether the information has been altered or changed by anybody. It also makes the information unclear, even if other users see it. Cryptography is a more advanced technology than steganography. These features make cryptography the right choice for the enterprise to implement.
  • Steganography should be implemented because it allows information to be viewed only by authorized users and checks whether information has been altered or changed by anybody. It also makes the information unclear so that even if other users see the information, they will not understand it. Steganography is a more advanced technology than cryptography. These features make steganography the right choice for the enterprise to implement.
  • Cryptography should be implemented because it embeds the actual message in a different message before transmission. This makes the information difficult to identify and helps identify the sender, making it very secure and the right choice to implement for the enterprise.
  • Steganography should be implemented because it provides functionality to verify and ensure that the message is from an authentic sender. It also makes the message unclear, even if the message is intercepted by a threat actor and identified from the file where steganography is implemented, making it very secure.
A

Cryptography should be implemented because it allows information to be viewed only by authorized users and checks whether the information has been altered or changed by anybody. It also makes the information unclear, even if other users see it. Cryptography is a more advanced technology than steganography. These features make cryptography the right choice for the enterprise to implement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ABC Enterprises plans to upgrade its internal confidential communication channel for the senior management team, which is geographically spread out, to enhance communication speed and security. They have decided to use cryptography to achieve this but can’t decide on which model. The CEO has come to you for your suggestion on whether to use RSA or ECC.

What should you recommend to the CEO, and why?

  • ECC, as it uses three rounds of encryption. It employs 48 iterations in its encryptions, using different keys each for each round. This makes the message extremely secure while making the communication exchange extremely fast.
  • ECC, as it uses sloping curves to generate keys. This makes it very secure for smaller key sizes making it secure and the communication exchange extremely fast.
  • RSA, as it uses sloping curves to generate keys. This makes it very secure for smaller key sizes, making it secure and the communication exchange extremely fast.
  • RSA, as it uses three rounds of encryption. It employs 48 iterations in its encryptions, using different keys each for each round. This makes the message extremely secure while making the communication exchange extremely fast.
A

ECC, as it uses sloping curves to generate keys. This makes it very secure for smaller key sizes making it secure and the communication exchange extremely fast.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

John receives an encrypted document using asymmetric cryptography from Alex. Which process should Alex use along with asymmetric cryptography so that John can be sure that the received document is real, from Alex, and unaltered?

  • Rivest-Shamir-Alderman
  • Digital signature algorithm
  • Elliptic curve cryptography
  • Symmetric cryptography
A

Digital signature algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

John needs to add an algorithm for his company communication process, in which encryption uses two keys. One is the public key, and the other one is a private key. Which algorithm will be suitable to achieve this?
-Symmetric cryptographic

  • Lightweight cryptographic
  • Asymmetric cryptographic
  • Private key cryptographic
A

Asymmetric cryptographic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which algorithm encrypts and decrypts data using the same key?

  • Symmetric cryptographic algorithm
  • Rivest-Shamir-Adleman algorithm
  • Asymmetric cryptographic algorithm
  • Hash algorithm
A

Symmetric cryptographic algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following devices can perform cryptographic erase?

  • USB device encryption
  • HSM
  • SED
  • TPM
A

Self-encrypting drives (SEDs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following statements describe a quantum computer?

  • A quantum computer is a computer that relies on qubits that can be both 0 and 1 at the same time.
  • A quantum computer is a computer that uses the structure of physical gadgets with sensors, software, and other technologies to connect and swap data with other devices and systems over the internet.
  • A quantum computer is a computer with a chip on its motherboard that provides cryptographic services, includes a true random number generator, and supports fully asymmetric encryption.
  • A quantum computer uses encrypted hardware until the correct password is provided and all data copied to the computer is automatically encrypted.
A

A quantum computer is a computer that relies on qubits that can be both 0 and 1 at the same time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Harry works at an automobile parts manufacturer. They sell these parts to retailers and deposit the proceeds in their bank. Using these funds, Harry pays the suppliers and employees. The Accounts Department maintains a ledger of all transactions of materials bought and sold. Similarly, the quality department and operations department also maintain a ledger of all transactions. Over the years, this process has become quite cumbersome, as growing data create confusion. Harry is looking at simplifying the process and has contacted you for a solution.

Using which technology can this process be simplified and confusions avoided?

  • Blockchain
  • TPM
  • SED
  • HSM
A

Blockchain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following hides the existence of information?

  • Encryption
  • Decryption
  • Steganography
  • Ciphering
A

-Steganography

17
Q

What is low latency?

a. A low-power source requirement of a sensor.
b. The time between when a byte is input into a cryptographic cipher and when the output is obtained.
c. The requirements for an IoT device that is using a specific network.
d. The delay between when a substitution cipher decrypts the first block and when it finishes with the last block.

A

b. The time between when a byte is input into a cryptographic cipher and when the output is obtained.

18
Q

Egor wanted to use a digital signature. Which of the following benefits will the digital signature NOT provide?

a. Verify the sender
b. Verify the receiver
c. Prove the integrity of the message
d. Enforce nonrepudiation

A

b. Verify the receiver

19
Q

What are public key systems that generate different random public keys for each session?

a. Public Key Exchange (PKE)
b. perfect forward secrecy
c. Elliptic Curve Diffie-Hellman (ECDH)
d. Diffie-Hellman (DH)

A

b. perfect forward secrecy

20
Q

Brielle is researching substitution ciphers. She came across a cipher in which the entire alphabet was rotated 13 steps. What type of cipher is this?

a. XOR
b. XAND13
c. ROT13
d. Alphabetic

A

c. ROT13

21
Q

What is data called that is to be encrypted by inputting it into a cryptographic algorithm?

a. Plaintext
b. Byte-text
c. Cleartext
d. Ciphertext

A

a. Plaintext

22
Q

Which of these is NOT a basic security protection for information that cryptography can provide?

a. Integrity
b. Authenticity
c. Risk
d. Confidentiality

A

c. Risk

23
Q

Cicero is researching hash algorithms. Which algorithm would produce the longest and most secure digest?

a. SHA-256
b. MD5
c. SHA3-512
d. SHA6-6

A

c. SHA3-512

24
Q

Which of these is the strongest symmetric cryptographic algorithm?

a. Data Encryption Standard
b. Advanced Encryption Standard
c. Triple Data Encryption Standard
d. RC 1

A

b. Advanced Encryption Standard

25
Q

If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message?

a. Alice’s private key
b. Alice’s public key
c. Bob’s public key
d. Bob’s private key

A

b. Alice’s public key

26
Q

Basil was reading about a new attack that forces the system to abandon a higher cryptographic security mode of operation and instead fall back to an older and less secure mode. What type of attack is this?

a. Deprecation attack
b. Pullback attack
c. Downgrade attack
d. Obfuscation attack

A

c. Downgrade attack

27
Q

Which of the following is not to be decrypted but is only used for comparison purposes?

a. Digest
b. Key
c. Stream
d. Algorithm

A

a. Digest

28
Q

Which of these is NOT a characteristic of a secure hash algorithm?

a. The results of a hash function should not be reversed.
b. Collisions should occur no more than 15 percent of the time.
c. A message cannot be produced from a predefined hash.
d. The hash should always be the same fixed size.

A

b. Collisions should occur no more than 15 percent of the time.

29
Q

Which of these provides cryptographic services and is external to the device?

a. Trusted Platform Module (TPM)
b. Hardware Security Module (HSM)
c. Self-encrypting hard disk drives (SED)
d. Encrypted hardware-based USB devices

A

b. Hardware Security Module (HSM)