SEC+ Revision Questions Introduction to Cryptography Flashcards
A network technician notices TCP port 80 traffic when users authenticate to their mail server. What should the technician configure to protect the confidentiality of these transmissions?
A. MD5
B. SHA-256
C. SHA-512
D. HTTPS
D. HTTPS
Which of the following allows secured remote access to a UNIX host?
A. SSH
B. SSL
C. SSO
D. SHA
A. SSH
An IT manager asks you to recommend a LAN encryption solution. The solution must support current and future software that does not have encryption of its own. What should you recommend?
A. SSL
B. SSH
C. IPSec
D. VPN
C. IPSec
Which protocol supersedes SSL?
A. TLS
B. SSO
C. TKIP
D. VPN
A. TLS
Which TCP port would a firewall administrator allow so that users can access SSL-enabled web sites?
A. 443
B. 80
C. 3389
D. 69
A. 443
Data integrity is provided by which of the following?
A. 3DES
B. RC4
C. AES
D. MD5
D. MD5
You are configuring a network encryption device and must account for other devices that may not support newer and stronger algorithms. Which of the following lists encryption standards from weakest to strongest?
A. DES, 3DES, RSA
B. 3DES, DES, AES
C. RSA, DES, Blowfish
D. RSA, 3DES, DES
A. DES, 3DES, RSA
Which of the following uses two mathematically related keys to secure data transmissions?
A. AES
B. RSA
C. 3DES
D. Blowfish
B. RSA
Your company has implemented a PKI. You would like to encrypt e-mail messages you send to another employee, Amy. What do you require to encrypt messages to Amy?
A. Amy’s private key
B. Amy’s public key
C. Your private key
D. Your public key
B. Amy’s public key
You decide that your LAN computers will use asymmetric encryption with IPSec to secure LAN traffic. While evaluating how this can be done, you are presented with an array of encryption choices. Select the correct classification of cryptography standards.
A. Asymmetric RSA, AES
Symmetric DES, 3DES
B. Symmetric 3DES, DES
Asymmetric Blowfish, RSA
C. Symmetric 3DES, DES
Asymmetric RC4, RSA
D. Symmetric AES, 3DES
Asymmetric RSA
D. Symmetric AES, 3DES
Asymmetric RSA
Data is provided confidentially by which of the following?
A. MD5
B. Disk encryption
C. E-mail digital signatures
D. SHA
B. Disk encryption
Which symmetric block cipher supersedes Blowfish?
A. TwoFish
B. FourFish
C. RSA
D. PKI
A. TwoFish
A user connects to a secured online banking web site. Which of the following statements is incorrect?
A. The workstation public key is used to encrypt data transmitted to the web server. The web server private key performs the decryption.
B. The workstation session key is encrypted with the server public key and transmitted to the web server. The web server private key performs the decryption.
C. The workstation-generated session key is used to encrypt data sent to the web server.
D. The workstation-generated session key is used to decrypt data received by the web server.
A. The workstation public key is used to encrypt data transmitted to the web server. The web server private key performs the decryption.
Which term describes the process of concealing messages within a file?
A. Trojan
B. Steganography
C. Encryption
D. Digital signature
B. Steganography
Which term best describes the assurance that a message is authentic and neither party can dispute its transmission or receipt?
A. Digital signature
B. Encryption
C. PKI
D. Nonrepudiation
D. Nonrepudiation