Quiz3_Answers Flashcards
For a given desired strength of a cryptographic system, which one of the following will provide it with the smallest key?
A. ECC
B. RSA
A. ECC (Elliptic curve)- 160 bits
Size comparable with others with equal protection: RSA is 1088bits DSA is 1025 bits
Which of the following functions provides an output which cannot be reversed and converts data into a string of characters?
A. Stream ciphers
B. Hashing
C. Steganography
D. Block ciphers
B. Hashing
A software developer wants to prevent stored passwords from being easily decrypted. When the password is stored by the application, additional text is added to each password before the password is hashed. This technique is known as:
A. Symmetric cryptography
B. Salting
C. Private key cryptography
D. Sessionizing
B. Salting
An achievement in providing worldwide Internet security was the signing of certificates associated with which of the following protocols?
A. TCP/IP
B. SET
C. SSL
D. SSH
C. SSL
Which of the following provides the strongest authentication security on a wireless network?
A. WPA2
B. HMAC
C. Disable SSID broadcast
D. WEP
A. WPA2
Which of the following is used to verify data integrity?
A. RSA
B. AES
C. RC4
D. SHA
D. SHA
Which of the following can be implemented with multiple bit strength?
A. MD4
B. AES
C. DES
D. SHA1
B. AES
AES uses key lengths and block sizes of 128, 192, and 256 bits
Which of the following would provide the STRONGEST encryption?
A. ECC
B. RSA
C. One Time Pad
D. AES
C. One Time Pad
Which of the following components MUST be trusted by all parties in PKI?
A. CA
B. Key escrow
C. Private key
D. Recovery key
A. CA
Pete, an employee, needs a certificate to encrypt data. Which of the following would issue Pete a certificate?
A. Certificate Authority
B. Registration Authority
C. Certificate Revocation List
D. Key Escrow
A. Certificate Authority
Which of the following MUST be updated immediately when an employee is terminated to prevent unauthorized access?
A. CA
B. RA
C. CRL
D. Private key
C. CRL
Certificate Revocation List
Which of the following malware types may require user interaction, does not hide itself, and is commonly identied by marketing pop-ups based on browsing habits?
A. Virus
B. Adware
C. Rootkit
D. Botnet
B. Adware
A program has been discovered that infects a critical Windows system executable and stays dormant in memory. When a Windows mobile phone is connected to the host, the program infects the phone’s boot loader and continues to target additional Windows PCs or phones. Which of the following malware categories BEST describes this program?
A. Trojan
B. Virus
C. Rootkit
D. Zero-Day
B. Virus
A user casually browsing the Internet is redirected to a warez site where a number of pop-ups appear. After clicking on a pop-up to complete a survey, a drive-by download occurs. Which of the following is MOST likely to be contained in the download?
A. Smurf
B. Backdoor
C. Logic Bomb
D. Spyware
D. Spyware
During a server audit, a security administrator does not notice abnormal activity. However, a network security analyst notices connections to unauthorized ports from outside the corporate network. Using specialized tools, the network security analyst also notices hidden processes running. Which of the following has MOST likely been installed on the server?
A. Logic bomb
B. Rootkit
C. Backdoor
D. SPIM
B. Rootkit