Practice Test Questions Flashcards
Which key is used to sign a message or a message digest?
Senders Private Key
What needs to be installed on end users computers to allow them to trust applications that have been digitally signed by the developer?
Senders Public Key
Which Key does the CA use to digitally sign keys that it issues
Servers Private Key
What does an end user need to verify a RSA digitally signed message?
Sender’s Public Key
What is used when creating a digital signature, using PKI
The private key of the person creating the message.
Which extension designates a file containing a password-protected private key?
.P12
Which part of the PKI defines how a credential is used?
Certificate Policy
Which feature in WEP provides integrity control when sending packets overt a wireless network?
Cyclic redundancy check
choose 2
Which two concerns does the use of Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) address?
Confidentiality
Integrity
Which network-based Virtual private network prevents unauthorized logins by preventing packet retransmissions?
IPSec
Which Port does secure socket tunneling protocol (SSTP) use?
443
What is an attribute of the Rivset Cipher 4 algorithm?
Requires a unique Nonce
Which mode is a stream algorithm that concatenates an incrementing value with a nonce?
Output Feedback(OFB)
Which mode produces the same ciphertext from two identical plaintext blocks?
Electronic Codebook (ECB)
What Encryption mode is least secure?
Electronic Codebook(ECB)
Which encryption process minimizes known plaintext attacks against AES?
Randomizing the initializing vector
Which factor increases the required number of attempts in a brute-force-attack?
Larger Key Size
Which Block size does AES use?
128
What is the mathematical formula used for symmetric decryption?
P=E(K,C)
Which cryptographic algorithm has a 128-bit hash size?
MD5
Which hashing function produces a 160-bit output value?
SHA-1
What is the result of A|B and B|C?
A|C
How is X mod N if N = PQ represented in number theory?
( X mod P, X mod Q)
Which type of cipher converts a letter to a number passes it through a mathematical function and then converts it back?
Affine
Which technique solves polyalphabetic substitution ciphers by deducing the key length?
Kasiki’s Method
Which technique does related-key cryptanalysis use to decipher a message?
Messages are encrypted using different secrets and the analyst compares the messages to figure out how the algorithm works.