Quiz 3 Flashcards

1
Q
3DES is \_\_\_\_\_\_\_\_.
strong enough for communication in corporations
very slow
expensive in terms of processing cost
All of the above
A

All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A DES key is 40 bits long. (True False)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
An attack where an adversary intercepts an encrypted message and transmits it again later is called a \_\_\_\_\_\_\_\_.
replay attack
reex attack
resend attack
reection attack
A

replay attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DES uses block encryption.

True False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
HMACs provide the cryptographic protection of \_\_\_\_\_\_\_\_.
message integrity
message authentication
Both A and B
Neither A nor B
A

Both A and B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Hashing is \_\_\_\_\_\_\_\_.
repeatable
reversible
Both A and B
Neither A nor B
A

repeatable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Julia encrypts a message to David using public key encryption for condentiality. After encrypting the message, can Julia
decrypt it?
(True / False)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In public key encryption, “signing” is the act of ________.
adding the password to the challenge message and hashing the two
hashing the plain text message
encrypting the message digest with its own private key
encrypting the message digest with its own public key

A

encrypting the message digest with its own private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In public key encryption for authentication, the verifier decrypts the ciphertext with the verifier’s public key.
(True False)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
If a key is 43 bits long, how much longer will it take to crack it by exhaustive search if it is extended to 50 bits?
14 times as long
7 times as long
256 times as long
128 times as long
A

128 times as long

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
The best way to thwart exhaustive searches by cryptanalysts is \_\_\_\_\_\_\_\_.
to make the key very long
to use codes
randomize the key thoroughly
All of the above
A

to make the key very long

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Symmetric session key exchange can be done with public key encryption.
(True / False)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
When two parties communicate with each other using symmetric key encryption, how many keys are used in total to
encrypt and decrypt?
8
1
4
2
A

1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When a hashing algorithm is applied, the hash will ALWAYS have a fixed length (True / False)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
When Carol sends a message to Bob, Bob will use \_\_\_\_\_\_\_\_ to decrypt the message.
Carol's public key
Bob's private key
Carol's private key
the private key
A

Bob’s private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
What is the hash size of SHA-256?
112 bits
128 bits
160 bits
256 bits
A

256 bits

17
Q

Using new and proprietary encryption ciphers is a good idea because cryptanalysts will not know them.
(True / False)

A

False

18
Q
To ensure that a digital certicate is valid, the receiver of the certicate must check \_\_\_\_\_\_\_\_.
whether the certicate has been revoked
the digital signature
the valid period
All of the above.
A

All of the above.

19
Q

The most popular public key cipher is RSA (True / False)

A

True

20
Q
\_\_\_\_\_\_\_\_ occurs when companies believe they have good security because they are using proprietary ciphers that
hackers do not know.
Reasonable protection
Security through obscurity
Weakest link ignorance
A

Security through obscurity

21
Q
\_\_\_\_\_\_\_\_ is the use of mathematical operations to protect messages travelling between parties or stored on a computer.
Confidentiality
Cryptography
Encryption
Authentication
A

Cryptography

22
Q
Which of the following measures do HMACs use?
Public key encryption
Symmetric key encryption
Hashing
All of the above
A

Hashing

23
Q
Which of the following is one of the effective key lengths in 3DES?
110 bits
40 bits
Both A and B
Neither A nor B
A

Neither A nor B

24
Q

Programmers frequently create entry points into a program for debugging purposes and/or insertion of new program
codes at a later date. What are these entry points called?
Backdoors
Logic Bombs
Trojan Horses
Worms

A

Backdoors

25
Q
Which of the following infects both boot-sectors and le-infectors?
Worm
Link Virus 
Macro
Multi-partite
A

Multi-partite

26
Q
A polymorphic virus uses which of the following?
Heuristic engine 
Search engine 
Mutation engine 
Inference engine
A

Mutation engine

27
Q
What is the name of the malicious act of a computer program looking normal but containing harmful code?
Trapdoor 
Trojan Horse 
Worm
Logic Bomb
A

Trojan Horse

28
Q
.........................................works by creating an artificial TCP segment that has the SYN flag set
land DoS
TearDrop
Smurf
Sning
A

land DoS

29
Q
TearDrop is a fragmentation attack on the ........................ protocol stack. 
TCP/IP
UDP
ICMP
TOC/TOU
A

TCP/IP

30
Q

Which of the following script is example of SQL injection attack?
var Shipcity; ShipCity = Request.form (“ShipCity”);

var Shipcity; ShipCity = Request.form (“ShipCity”); var SQL = “select * from OrdersTable where ShipCity = ‘” + ShipCity + “’”;

var Shipcity; var SQL = “select * from OrdersTable where ShipCity = ‘” + ShipCity + “’”;

All of options

A

var Shipcity; ShipCity = Request.form (“ShipCity”); var SQL = “select * from OrdersTable where ShipCity = ‘” + ShipCity + “’”;

31
Q
Which term best describes the act of actively searching for a computer's ports through the use of
specialized software
port searching 
port vulnerabilities 
sning 
port scanning
A

port scanning

32
Q

What typically happens when a buffer is overflowed?
The memory space that comes after the buffer holds the extra data as well as keeping the data that it contained
before
Whatever is in the memory space that comes after the buer is overwritten
The memory chip in the computer gets too big and explodes
Electrons fall out of the memory chip and start a re

A

Whatever is in the memory space that comes after the buffer is overwritten

33
Q
which option is wrong?
The smurf attack is a distributed reflective denial-of-service (DRDoS) attack
DNS amplification causes flooding.
Ping of death attack uses ICMP packet.
DNS poisoning is not a DoS attack.
A

DNS poisoning is not a DoS attack.

34
Q
which method is not a reconnaissance attack?
IP probe 
Dumpster diving 
Port scan 
Buffer overflow
A

Buffer overflow

35
Q

In a replay attack, the attacker cannot read the contents of the replayed message.

A

True