PART 3 EXAM (Modules 6-7) Flashcards

1
Q

Which encryption device you can use that has the following features?

  1. It should allow administrators to remotely prohibit accessing the data on a device until it can verify the user status.
  2. It can lock user access completely or even instruct the drive to initiate a self-destruct sequence to destroy all data.
  • AES
  • TPM
  • HSM
  • USB device encryption
A

USB device encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Alex needs to find a method that can change a single character of plaintext into multiple characters of ciphertext.

Which method should Alex use?

  • Steganography
  • Diffusion
  • Obfuscation
  • Confusion
A

Diffusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which unit is used by quantum computers, making them faster and more efficient than normal computers?

  • Candela
  • Ampere
  • Qubit
  • Mole
A

Correct. A qubit is the basic unit of quantum information. It can be both 0 and 1 simultaneously, meaning it can carry out two separate streams of calculations simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Sigma Technology is a company based in Singapore, with branches in 24 countries. It needs multiple CAs in different locations to verify and sign digital certificates for the company. They are looking for an option where, even in the absence of a CA, other CAs can issue the certificates. Additionally, they are also looking for CAs who will overlook other CAs in different locations. In such a scenario, which PKI trust model should they use?

  • Bridge trust model
  • Hierarchical trust model
  • Distributed trust model
  • Web of trust model
A

Bridge trust model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Star Technology is working on a project that needs a communication mode specializing in encryption, where only authorized parties should understand the information. The company also requires accuracy, completeness, and reliability of data throughout the project. The company has contacted you for an ideal cipher mode solution without using a counter. Which mode should you suggest?

  • HTTPS
  • GCM
  • CBC
  • CTR
A

CBC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

XYZ University wants to set up a VPN network to connect to the internet and ensure that all their data is safe. They have asked you to recommend the correct communication protocol to use. Which of the following protocols should you recommend and why?

  • SSH, because it is used to secure communications between a browser and a web server. This ensures data is safe in communications across the network.
  • HTTPS, because it authenticates that the packets received were sent from the source and ensures that no other party can view the contents. It manages the keys to ensure that they are not intercepted or used by unauthorized parties.
  • IPsec, because it authenticates that the packets received were sent from the source and ensures that no other party can view the contents. It manages the keys to ensure that they are not intercepted or used by unauthorized parties.
  • TLS, because it is used to secure communications between a browser and a web server. This ensures data is safe in communications across the network.
A

IPsec authenticates the packets and ensures that no specific attacks took place to alter the packet’s contents. Additionally, it maintains confidentiality and manages the keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is a standard format for digital certificates?

  • MPEG-4 Part 14
  • .cer
  • JPG
  • X.509
A

The X.509 is the standard format for digital certificates introduced more than 20 years ago and was adapted for internet use. The current version is version 3.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A company has multiple CAs and intermediate CAs issuing digital certificates in different departments, with no one cross-checking their work. Which PKI trust model should the company use?

  • Hierarchical trust model
  • Bridge trust model
  • Web of trust model
  • Distributed trust model
A

Bridge trust model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly