SEC+ Revision Questions Introduction to Cryptography Flashcards

1
Q

A network technician notices TCP port 80 traffic when users authenticate to their mail server. What should the technician configure to protect the confidentiality of these transmissions?
A. MD5
B. SHA-256
C. SHA-512
D. HTTPS

A

D. HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following allows secured remote access to a UNIX host?
A. SSH
B. SSL
C. SSO
D. SHA

A

A. SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An IT manager asks you to recommend a LAN encryption solution. The solution must support current and future software that does not have encryption of its own. What should you recommend?
A. SSL
B. SSH
C. IPSec
D. VPN

A

C. IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which protocol supersedes SSL?
A. TLS
B. SSO
C. TKIP
D. VPN

A

A. TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which TCP port would a firewall administrator allow so that users can access SSL-enabled web sites?
A. 443
B. 80
C. 3389
D. 69

A

A. 443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data integrity is provided by which of the following?
A. 3DES
B. RC4
C. AES
D. MD5

A

D. MD5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You are configuring a network encryption device and must account for other devices that may not support newer and stronger algorithms. Which of the following lists encryption standards from weakest to strongest?
A. DES, 3DES, RSA
B. 3DES, DES, AES
C. RSA, DES, Blowfish
D. RSA, 3DES, DES

A

A. DES, 3DES, RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following uses two mathematically related keys to secure data transmissions?
A. AES
B. RSA
C. 3DES
D. Blowfish

A

B. RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Your company has implemented a PKI. You would like to encrypt e-mail messages you send to another employee, Amy. What do you require to encrypt messages to Amy?
A. Amy’s private key
B. Amy’s public key
C. Your private key
D. Your public key

A

B. Amy’s public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You decide that your LAN computers will use asymmetric encryption with IPSec to secure LAN traffic. While evaluating how this can be done, you are presented with an array of encryption choices. Select the correct classification of cryptography standards.
A. Asymmetric RSA, AES
Symmetric DES, 3DES
B. Symmetric 3DES, DES
Asymmetric Blowfish, RSA
C. Symmetric 3DES, DES
Asymmetric RC4, RSA
D. Symmetric AES, 3DES
Asymmetric RSA

A

D. Symmetric AES, 3DES
Asymmetric RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data is provided confidentially by which of the following?
A. MD5
B. Disk encryption
C. E-mail digital signatures
D. SHA

A

B. Disk encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which symmetric block cipher supersedes Blowfish?
A. TwoFish
B. FourFish
C. RSA
D. PKI

A

A. TwoFish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A user connects to a secured online banking web site. Which of the following statements is incorrect?
A. The workstation public key is used to encrypt data transmitted to the web server. The web server private key performs the decryption.
B. The workstation session key is encrypted with the server public key and transmitted to the web server. The web server private key performs the decryption.
C. The workstation-generated session key is used to encrypt data sent to the web server.
D. The workstation-generated session key is used to decrypt data received by the web server.

A

A. The workstation public key is used to encrypt data transmitted to the web server. The web server private key performs the decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which term describes the process of concealing messages within a file?
A. Trojan
B. Steganography
C. Encryption
D. Digital signature

A

B. Steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which term best describes the assurance that a message is authentic and neither party can dispute its transmission or receipt?
A. Digital signature
B. Encryption
C. PKI
D. Nonrepudiation

A

D. Nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You are a developer at a software development firm. Your latest software build must be made available on the corporate web site. Internet users require a method of ensuring they have downloaded an authentic version of the software. What should you do?
A. Generate a file hash for the download file and make it available on the web site.
B. Make sure Internet users have antivirus software installed.
C. Configure the web site to use TLS.
D. Make sure the web server has antivirus software installed.

A

A. Generate a file hash for the download file and make it available on the web site.

17
Q

Which cryptographic approach uses points on a curve to define public and private key pairs?
A. RSA
B. DES
C. ECC
D. PKI

A

C. ECC

18
Q

Your company currently uses an FTP server, and you have been asked to make FTP traffic secure using SSL. What should you configure?
A. FTPS
B. SFTP
C. IPSec
D. TLS

A

A. FTPS

19
Q

On which protocol is SCP built?
A. FTP
B. SSL
C. SSH
D. ICMP

A

C. SSH

20
Q

Which of the following are true regarding ciphers? (Choose two.)
A. Block ciphers analyze data patterns and block malicious data from being encrypted.
B. Stream ciphers encrypt data one byte at a time.
C. Block ciphers encrypt chunks of data.
D. Stream ciphers encrypt streaming media traffic.

A

B. Stream ciphers encrypt data one byte at a time.
&
C. Block ciphers encrypt chunks of data.

21
Q

Which of the following are block ciphers? (Choose two.)
A. DES
B. RSA
C. RC4
D. AES

A

A. DES
&
D. AES

22
Q

Which of the following are message digest algorithms? (Choose two.)
A. 3DES
B. RIPEMD
C. Blowfish
D. HMAC

A

B. RIPEMD
&
D. HMAC

23
Q

A military institution requires the utmost in security for transmitting messages during wartime. What provides the best security?
A. AES
B. 3DES
C. One-time pad
D. RSA

A

C. One-time pad

24
Q

When hardening a VPN, what should you consider? (Choose two.)
A. Enabling PAP
B. Disabling PAP
C. Disabling EAP-TLS
D. Enabling EAP-TLS

A

B. Disabling PAP
&
D. Enabling EAP-TLS

25
Q

Encrypting and digitally signing e-mail with public and private keys can be done with which technology?
A. 3DES
B. DES
C. Blowfish
D. PGP

A

D. PGP

26
Q

Which of the following is considered the least secure?
A. MS-CHAP v2
B. NTLM v2
C. EAP-TLS
D. PAP

A

D. PAP

27
Q

A user digitally signs a sent e-mail message. What security principle does this apply to?
A. Least privilege
B. Integrity
C. Confidentiality
D. Authorization

A

B. Integrity

28
Q

Which of the following are true regarding user private keys? (Choose two.)
A. It is used to encrypt sent messages.
B. It is used to decrypt received messages.
C. It is used to create digital signatures.
D. It is used to verify digital signatures.

A

B. It is used to decrypt received messages.
&
C. It is used to create digital signatures.

29
Q

You are the IT directory for a company with military contracts. An employee, Sandra, leaves the company, and her user account is removed. A few weeks later somebody requires access to Sandra’s old files but is denied access. After investigating the issue, you determine that Sandra’s files are encrypted with a key generated from a passphrase. What type of encryption is this?
A. WEP
B. Asymmetric
C. Symmetric
D. RSA

A

C. Symmetric

30
Q

Which of the following best describes the Diffie-Hellman protocol?
A. It is a key exchange protocol for asymmetric encryption.
B. It is a symmetric encryption algorithm.
C. It is a key exchange protocol for symmetric encryption.
D. It is a hashing algorithm.

A

A. It is a key exchange protocol for asymmetric encryption.

31
Q

Which of the following apply to symmetrical keys? (Choose two.)
A. The public key is used for encryption.
B. The private key is used for decryption.
C. The same key is used for encryption and decryption.
D. They are exchanged out-of-band.

A

C. The same key is used for encryption and decryption.
&
D. They are exchanged out-of-band.

32
Q

Which of the following are two common negotiation protocols used by TLS? (Choose two.)
A. Quantum cryptography
B. DHE
C. RSA
D. ECDHE

A

B. DHE
&
D. ECDHE

33
Q

What is another name for an ephemeral key?
A. PKI private key
B. SHA
C. Session key
D. PKI public key

A

C. Session key

34
Q

During the monthly IT meeting in your office, your IT manager, Julia, expresses concern about weak user passwords on corporate servers and how they might be susceptible to brute-force password attacks. When allaying Julia about her concerns, which term might you use?
A. Key forging
B. Key escrow
C. Key stretching
D. Key forwarding

A

C. Key stretching