Practice Test Questions Flashcards

1
Q

Which key is used to sign a message or a message digest?

A

Senders Private Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What needs to be installed on end users computers to allow them to trust applications that have been digitally signed by the developer?

A

Senders Public Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which Key does the CA use to digitally sign keys that it issues

A

Servers Private Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does an end user need to verify a RSA digitally signed message?

A

Sender’s Public Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is used when creating a digital signature, using PKI

A

The private key of the person creating the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which extension designates a file containing a password-protected private key?

A

.P12

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which part of the PKI defines how a credential is used?

A

Certificate Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which feature in WEP provides integrity control when sending packets overt a wireless network?

A

Cyclic redundancy check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

choose 2

Which two concerns does the use of Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) address?

A

Confidentiality

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which network-based Virtual private network prevents unauthorized logins by preventing packet retransmissions?

A

IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which Port does secure socket tunneling protocol (SSTP) use?

A

443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an attribute of the Rivset Cipher 4 algorithm?

A

Requires a unique Nonce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which mode is a stream algorithm that concatenates an incrementing value with a nonce?

A

Output Feedback(OFB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which mode produces the same ciphertext from two identical plaintext blocks?

A

Electronic Codebook (ECB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What Encryption mode is least secure?

A

Electronic Codebook(ECB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which encryption process minimizes known plaintext attacks against AES?

A

Randomizing the initializing vector

17
Q

Which factor increases the required number of attempts in a brute-force-attack?

A

Larger Key Size

18
Q

Which Block size does AES use?

A

128

19
Q

What is the mathematical formula used for symmetric decryption?

A

P=E(K,C)

20
Q

Which cryptographic algorithm has a 128-bit hash size?

A

MD5

21
Q

Which hashing function produces a 160-bit output value?

A

SHA-1

22
Q

What is the result of A|B and B|C?

A

A|C

23
Q

How is X mod N if N = PQ represented in number theory?

A

( X mod P, X mod Q)

24
Q

Which type of cipher converts a letter to a number passes it through a mathematical function and then converts it back?

A

Affine

25
Q

Which technique solves polyalphabetic substitution ciphers by deducing the key length?

A

Kasiki’s Method

26
Q

Which technique does related-key cryptanalysis use to decipher a message?

A

Messages are encrypted using different secrets and the analyst compares the messages to figure out how the algorithm works.