Security Architecture Domain 3 Flashcards

1
Q

Functions such as MDS, SHA-256, and the new SHA-3 are used for

A

integrity to protect against unauthorised modification of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The four fundamental goals of cryptography

A

Confidentiality
Integrity
Authentication
Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ISO/IEC 18033-2:2006 specifies

A

encryption systems
(ciphers) for the purpose of data confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ISO/IEC 11770-1:2010 defines

A

a general model of key management that is independent of the use of any particular cryptographic algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ISO 11568 series specifies

A

the principles for the management of keys used in cryptosystems implemented within the retail-banking environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ISO/IEC 13888 is applicable when

A

non-repudiation is required for key management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Messaging security standards include:

A

Secure Multi-Purpose Internet Mail Extensions (S/MIME):
Privacy-Enhanced Mail (PEM) PEM was never widely used for securing e-mail
Only PEM’s definition of header field format (PEM format) has
found use as a common means of representing digital certificates
in ASCII form.
Pretty Good Privacy (PGP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Secure Multi-Purpose Internet Mail Extensions (S/MIME):

A

This extension of the MIME standards that specify e-mail formatting and encapsulation adds encryption of message content. S/MIME also uses a hashing algorithm for message integrity, public key certificates for message authentication, and digital signatures to
provide non-repudiation of origin”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

PGP provides message authentication
by binding a public key to an e-mail address where the public
key is

A

distributed to a community of users who trust each other, commonly known as a web of trust.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IPSec includes two protocols

A

Authentication Header (AH) and Encapsulating Security Protocol (ESP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AH: Authentication Header provides data origin authentication and data integrity but does not provide

A

confidentiality for the IP payload and header that it protects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ESP Encapsulating security policy, provides data origin authentication and data integrity, and it offers …

A

confidentiality for the payload it protects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Secure TCP/IP communication is not limited to IPSec. What else are additional cryptographic protocols that provide communications security for TCPIP

A

Transport Layer
Security (TLS) and its predecessor, Secure Sockets Layer (SSL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

VPNs are implemented in the following architectures:

A
  • Remote Access VPN
  • Site-to-Site VPN:
  • Extranet VPN: when one or more
    separate organizations are connecting to that organization over IP.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

By default, PPP does not provide any security or rely on any cryptographic controls. However, PPP does include

A

an optional authentication phase and an optional encryption feature, PPP Encryption Control Protocol (ECP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SSH operates at the _____ layer of the OSI model

A

application layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The most commonly used family of standards for Wireless Local Area
Networks (WLANs) is Institute of Electrical and Electronics Engineers (IEEE)
802.11’7. 802.11 originally relied on the ___________1________ security method to provide confidentiality and integrity. _____1_________
insecure due to the way it implements its ______2_________ algorithm

A

1 Wired Equivalent Privacy (WEP)
2 RC4 stream cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Prior to the introduction of
802.1li, the Wi-Fi Alliance, a global nonprofit industry association, created
a protocol and certification program for wireless network components known
as _____1________. WPA, based on ___________

A

Wi-Fi Protected Access (WPA)
a draft of IEEE 802.11i,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The biggest difference between WPA and the 802.11i draft is that

A

WPA does not require support for the Advanced Encryption Standard (AES)
strong encryption algorithm. WPA allows many existing IEEE 802.11 hardware components that cannot support the computationally intensive AES encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

WPA2 certification is based on
the mandatory elements of the IEEE 802.11i standard, but there are some
differences. WPA2 extends its certification program to include

A

interoperability with a set of common Extensible Authentication Protocol (EAP) methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Bluetooth optionally encrypts, but does not provide

A

integrity protection for the transmitted data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

True or false, it is easy to modify a transmitted bluetooth packet without being detected

A

True because only a simple CRC is added to each packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

In version 2.0 and earlier of
the Bluetooth specification, pairing is performed over a non-encrypted channel,
allowing

A

a passive eavesdropper to compute the link key used for encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Version 2.1 of bluetooth introduced the use of

A

Elliptic Curve Diffie-Hellman (ECDH) public
key cryptography, which can be utilized by Bluetooth device developers for
protection against a passive eavesdropping attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

The Bluetooth specification
defines its own stream cipher called

A

EO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the problem with the EO stream cipher

A

Several weaknesses have been identified
in Bluetooth’s EO stream cipher, which is not a Federal Information Processing
Standards (FIPS)-approved algorithm and can be considered nonstandard
[SP800-121720 21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Version 3.0 + High Speed (HS) of the Bluetooth Core Specification was
adopted by the Bluetooth SIG on

A

21 April 2009.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Bluetooth high speed is based on

A

Wi-Fi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A service provider hosting multiple clients in a data center may use encryptionfor privacy of data within a SAN. This can be done using Fibre Channel
Security Protocol (FC-SP), a security framework that includes protocols to

A

Fibre Channel Security Protocol (FC-SP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

An early use of cryptographic identification for distinguishing
friendly aircraft was developed during WWII with the Identification, Friend or Foe (IFF) system

A

using coded radar signals to trigger a transponder on the
aircraft. Modern military IFF transponders encrypt challenge and response messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Similar to IFF, RFID relies on

A

use of a transponder, or an RFID tag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

special-purpose interfaces such as the NSA-developed Crypto Ignition Key (CIK) used in the STU-III family of secure telephones [CIK] are examples of

A

Hardware-token-based technologies, and also include smart cards and USB tokens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Authentication protocols used by Point-to-Point Protocol (PPP) include

A

Password Authentication Protocol (PAP)
Challenge-Handshake Authentication Protocol (CHAP).
EAP Extensible Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Of the Authentication protocols used by Point-to-Point Protocol (PPP) which is considered a weak authentication method and why

A

PAP is a weak authentication method, transmitting a cleartext password and static identifier that does not protect against replay attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which is stronger out of PAP and CHAP and why

A

CHAP is stronger because it transmits a hash that is computed based on a random challenge value and shared secret, providing replay protection and a stronger level of authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which of the authentication protocols developed for PPP is actually a framework that supports a number of protocols

A

EAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

How are different authentication mechanisms implemented in EAP

A

In a variety of ways which are called EAP methods, eg. EAP-MD% and EAP-TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

The approved standard IEEE P1619 addresses ______1___
and the approved standard IEEE P1619.1 is for ______2____

A

data storage and encryption on disk drives,
data encryption on tape drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

One specification for protecting the decades old EDI transmitted over the Internet is

A

Applicability Statement 2 (AS2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

NSA Suite B is a subset of cryptographic algorithms approved
by NIST including those for

A

Encryption, hashing, digital signatures, and key exchange.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is Ek(M) = C

A

A simple way of representing the Encryption Functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Advanced Encryption Standard (AES)
Blowfish
Data Encryption Standard (DES)
IDEA
RC2, RC4, RCS, and RC6
Triple-DES (3DES)
Are examples of what

A

Symmetric algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Symmetric algorithms tall into two categories:

A

block ciphers and stream
ciphers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

In stream ciphers how is plaintext encrypted

A

one bit, byte or word at a time using a rotating stream of bits from the key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Symmetric key algorithms that operate as block ciphers are used in one or more
modes of operation. Each block cipher mode provides a different level of

A

security, efficiency, fault tolerance, or in some cases, provides a specific protection benefit such as confidentiality or authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Name some common block cipher modes of operation

A

Electronic Code Book (ECB) Mode:
Cipher Block Chaining (CBC) Mode:
Counter(CTR) Mode:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Which is the least complex of the common Block Cipher Modes of operation

A

Electronic Code Book Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Block ciphers typically include an __________________, a block of bits added to ensure that identical plaintext messages encrypt to different ciphertext messages.

A

Initialization vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Block Cipher Modes Electronic Code Book (ECB) Mode

A

each block is operated on independently, and an IV is not used.
Because identical plaintext blocks result in identical ciphertext,
this mode is not useful for providing message confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Block Cipher Modes Cipher Block Chaining (CBC) Mode

A

Adds an IV and uses a chaining method such that results of the encryption of previous blocks are fed back into the encryption of the current block. This makes CBC useful for message confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Which of the block cipher modes are not useful for confidentiality?

A

Electronic Code Book (ECB) mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Block Cipher Modes. Cipher Feedback (CFB), Output Feedback (OFB), and Counter (CTR) Mode .

A

These modes are capable of producing unique cipher text given identical plaintext blocks, and are useful for
message confidentiality.
they can operate as a stream cipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Because these modes employ a block cipher as a keystream generator, they can operate as a stream cipher.

A

Cipher Feedback (CFB),
Output Feedback (OFB) and
Counter (CTR) mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

When is the ability to operate as a stream cipher useful

A

In applications that require low latency between the arrival of plain text and the output of corresponding ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What do the following modes not offer
Electronic Code Book (ECB) Mode
Cipher Block Chaining (CBC) Mode
Cipher Feedback (CFB),
Output Feedback (OFB), and
Counter (CTR) Mode

A

Integrity protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Name the block cipher modes that include additional security eg. authenticity and integrity

A

Cipher-Based Message Authentication Code (CMAC) Mode
Counter with Cipher Block Chaining-Message Authentication
Code (CCM) Mode: This mode can provide assurance of both
Galois/Counter Mode (GCM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Who invented the RC algorithms

A

Ron Rivest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

RC2 was found vulnerable to a

A

related key attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Invented by NSA, the now-declassified _________
algorithm uses a 64-bit block size with 80-bit key
length.It was intended for implementation in tamperproof
hardware using the Clipper chip as part of a now-defunct key
escrow program that would allow U.S. government agency
decryption of telecommunications.

A

Skipjack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

_______1________ was one of the finalists that were not selected
for the AES standard. Cryptanalysis of _____1_____ continues to
reveal that it is _______2_______

A

Twofish
Secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

_____________ are generally less complex than block ciphers

A

stream ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Examples of synchronous stream ciphers are

A

RC4 and HC-128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Stream ciphers may be viewed as approximating the function of a one-time pad or Vernam cipher, which uses

A

a random keystream of the same length as the plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What makes a Vernam cipher cumbersome and impractical

A

The size of the keystream which is the same length as the plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Asynchronous stream ciphers are less susceptible to attack by

A

attempting to introduce predictable error.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Examples of asynchronous stream ciphers are

A

ciphertext autokey (СТАК)
and stream ciphers based on block ciphers in cipher feedback mode (CFB).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Asymmetric cryptosystems rely heavily on mathematical functions known as _______1_______

A

trapdoor functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Why are trapdoor functions so called

A

They are easy to apply in one direction but extremely difficult to apply in the reverse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

The idea that separate keys for encryption and decryption could be used was presented in 1976 by

A

Whitfield Diffie and Martin Hellman [DH].

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

The Diffie-Hellman (DH) key agreement protocol, also called the ______1_______
exponential key agreement, which is a ______2_______

A
  1. exponential key agreement,
  2. which is a method of exchanging secret keys over a nonsecure medium without exposing the keys.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

The DH protocol is based on the
difficulty of calculating

A

discrete logarithms in a finite field.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

While DH provides confidentiality for key distribution, the protocol does
not provide (1) this means that (2) is required

A
  1. authentication of the communicating parties.
  2. a means of authentication such as digital signatures must be used to protect against a man-in-the-middle attack.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

The idea of a public-key cryptosystem and its use in digital signing was
presented by

A

Ron Rivest, Adi Shamir, and Leonard Adleman in 1977 [RSA].

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Recovering the plaintext from RSA encryption without the key would require

A

factoring the product of two large primes, forming the basis for the security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

In RSA encryption the keys must be generated in such a way that it is computationally infeasible to

A

factor them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Cryptosystems employ ________1______, which are the basic mathematical operations on which the encryption procedure is built.

A

cryptographic primitives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Primitives by themselves do not provide security. A particular security goal is achieved by employing the cryptographic primitives in what is known as

A

a cryptographic scheme.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Cryptosystems built using RSA schemes may be used for

A

confidentiality,
signing to provide authenticity, or
key exchange.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Another popular approach to public-key cryptography, which is more computationally efficient than either RSA or DH, is

A

elliptic curve cryptography (ECC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Recommendations by the National Institute of Standards
and Technology (NIST) for protecting AES 128-bit private keys is to use
RSA and DH key sizes of 3072 bits, or elliptic curve key size of

A

256 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

ECC schemes are based on the mathematical problem of

A

computing discrete logarithms of elliptic curves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Because the algorithm is very efficient, ECC can be very useful in

A

applications requiring limited processing power such as in small wireless devices and mobile phones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Aside from RSA and ECC other asymmetric cryptosystems include.

A

El Gamal and Cramer-Shoup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Asymmetric cryptosystems that have been proved insecure and should not
be used are those based on the

A

knapsack algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Public key cryptosystems will continue to be necessary when secret key
exchange is required. Common software protocols and applications where they
are used include

A

IPSec, SSL/TLS, SSH, and PGP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Hash functions are cryptographic algorithms that provide message integrity by producing a condensed representation of a message, called a

A

message digest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

At a minimum, the following properties are present in a hash function:

A
  • Compression
  • Ease of computation
  • Preimage resistance
  • Second preimage resistance
  • Collision resistance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Explain the following minimum requirement of hash functions
* Compression

A

The hash function H transforms a variable-length input M to a fixed-length hash value h.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Explain the following minimum requirement of hash functions
* Ease of computation

A

Given a hash function H and an input M, the hash value h is easy to compute.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Explain the following minimum requirement of hash functions
Preimage resistance

A

Given a hash function h, it is computationally infeasible to compute what the input M was. This is known as the “one-way” property of hash functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Explain the following minimum requirement of hash functions
Second preimage resistance

A

For a given input M, is computationally
infeasible to find any second input which has the same hash value h.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Explain the following minimum requirement of hash functions
Collision resistance

A

For hash function h, it is computationally
infeasible to find any two distinct inputs that produce the same hash value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

One-way functions are limited in their ability to provide collision resistance, however. A popular means of constructing the hash function and strengthen its collision resistance
is

A

the Merkle-Damgärd technique, which involves breaking the message input into a series of smaller blocks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

_______________________________
designed by Ron Rivest in 1991, is
one such hash function based on a one-way algorithm and utilizing Merkle-
Damgärd construction.

A

MDS (Message Digest algorithm 5),

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

While MD5 has been widely used, it has been found to be prone to

A

collision weakness and is thus insecure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

A common replacement recommended for MDS, and which is also widely
used, is _________________ designed by the United States National
Security Agency (NSA).

A

SHA-1 (Secure Hash Algorithm),

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Which of MD5 and SHA1 uses a one way function and the Merkle-Damgärd technique to avoid collisions

A

They both do

98
Q

What is an alternative to SHA-1 that also produces a 160 bit digest

A

RIPEMD-160, designed by Hans Dobbertin,

99
Q

Aside from a one way function and the Merkle-Damgärd technique to avoid collisions what is another way of producing a hash

A

By using a block cipher algorithm

100
Q

How can a block cipher work as a hash function

A

Block ciphers operate by encrypting plaintext using a private key to produce ciphertext.
The ciphertext cannot be used by itself to recreate the plaintext,
This resembles the one-way property of a hash function. .

101
Q

Why is a block cipher not a complete hash function

A

The block cipher’s secret key and decryption algorithm would allow reconstruction of the plaintext,
Hashes need to be fixed length

102
Q

To make a block cipher into a secure cryptographic hash function …

A

some additional operations must be added to a block cipher

103
Q

Example of a block cipher hash functions are

A
  • MDC-2 (Modification Detection
    Code 2, sometimes called Meyer-Schilling), developed by IBM, which produces
    a 128-bit hash.
  • Whirlpool, which produces a 512-bit hash
104
Q

Which function was adopted by the International Organization for Standardization (ISO) in
the ISO/IEC 10118-3:2004

A

The Whirlpool hash

105
Q

Another use of a block cipher is in a _____, which is a key-dependent hash
function.

A

MAC (Message Authentication Code)

106
Q

Another use of a block cipher is in a MAC, which is a

A

key-dependent hash function

107
Q

A MAC adds to the input message the secret key used by the symmetric
block cipher, and the resulting output is a fixed-length string called the MAC.
Adding the secret key to the message produces ….

A

origin authentication

108
Q

A MAC may also be derived using a hash function, where the hash function
is modified to incorporate use of a secret key to provide origin authentication
and integrity. This is known as

A

an MDx-MAC scheme,

109
Q

What is an MDx-MAC scheme

A

where the hash function
is modified to incorporate use of a secret key to provide origin authentication
and integrity.

110
Q

The most common form of MAC
algorithm based on a block cipher employs cipher block chaining, and is known as .

A

a CBC-MAC Cipher Block Chaining

111
Q

Give an example of a MAC derived from a hash function

A

A Hashed Message Authentication Code (HMAC) is another case of a MAC
derived using a hash function.

112
Q

MACs can be derived using

A

Block Ciphers or Hash Functions

113
Q

How does HMAC work

A

In an HMAC, the underlying hash function is not modified, but is treated as a “black box.” HMAC uses any iterative hash
function and adds a secret key to the input message in order to obtain origin
authentication and integrity.

114
Q

A digital signature may be thought of as a MAC that uses asymmetric cryptography, because a digital signature uses

A

a private signing key and a public verification key.

115
Q

Why does a digital signature not provide confidentiality

A

Because the digest is signed (the hash) not the original record.

116
Q

What can a digital signature provide

A

Origin authentication, non-repudiation and integrity

117
Q

How does a digital signature provide non-repudiation

A

If the digest can be decrypted using the public key then it was signed using the private key

118
Q

A digital signature scheme contains the following elements

A

Cryptographic hash function
Key generation algorithm
Signing algorithm
Verification algorithm

119
Q

When it comes to the design and implementation of cryptographic systems, the main school of thought is that if the system is going to be designed for use commercially, then it cannot be a

A

proprietary system, as the ability to test it
and probe for weaknesses would be a problem.

120
Q

What is crypto-tax?

A

the computational overhead on a system that uses cryptography

121
Q

Why Was Kerberos v4 Deprecated?

A

Weaknesses in the Data Encryption Standard (DES)
Lack of forward secrecy
Vulnerability to replay attacks

122
Q

What were the problems with DES that resulted in the deprecation of Kerberos 4?

A
  • Kerberos v4 relied exclusively on DES (Data Encryption Standard) for encryption.
    • NIST (National Institute of Standards and Technology) deprecated DES in 2005 due to its small 56-bit key size, which was easily brute-forced.
    • Modern attacks (like rainbow tables and parallelized brute-force attacks) made DES insecure.
123
Q

What did Kerberos v5 do

A
  • Removing DES (which NIST deprecated in 2005).
  • Adding AES support for modern encryption.
  • Improving security against replay attacks, ticket forgery, and session key compromise.
124
Q

In the real world what is the biggest problem in cryptography

A

key management

125
Q

One of the principles of modern cryptography requires that keys not appear in

A

cleartext outside the crypto module

126
Q

One of the important characteristics of the keys is a crypto period. It is defined
[NISTSP800-57-1] as the time span during which

A

a specific key is authorized
for use by legitimate entities

127
Q

A successful brute force attack on a symmetric key algorithm, which in the
case of perfect key entropy essentially consists of an exhaustive search of all the
keys, would require

A

on 2 to the power of N, divided by 2, where N is a size of the key in bits
cycles

128
Q

What are the phases of a key life-cycle that should be considered

A

Preoperational phase
Operational phase
Postoperational phase
Key destruction

129
Q

In a key lifecycle what happens in the pre-operational phase

A

The key is not generated yet, but preactivation processes are taking place. It may include
- registering a user’s attributes with the key management system,
- installing the key policies, and
- selecting algorithms and key parameters, - initial installation or update of the software or hardware cryptographic
module with initial key material

130
Q

A seed key, in its turn, is defined as

A

“a secret value used to initialize a
cryptographic function or operation.”

131
Q

There are two basic classes of Random Number Generators in cryptography namely

A

Deterministic and non-deterministic

132
Q

A deterministic RNG consists of

A

an algorithm that produces a sequence of bits from an initial value called a seed.

133
Q

A nondeterministic RNG produces outout that is dependent on

A

unpredictable physical source that is outside human control.

134
Q

In encryption and decryption applications, the RSA private key is used to _________ data and the
RSA public key is used to ________ the data. As described in [FIPS

A

decrypt,
encrypt

135
Q

For symmetric cryptography, the keys may be generated from
a random number generation method or

A

regenerated from the previous key during a key update procedure.

136
Q

If symmetric cryptography is used for wrapping the keys, those key-wrapping keys should be distributed via

A

a separate channel of communication.

137
Q

One of the main advantages of using public and private key cryptography is

A

the easier distribution of keys

138
Q

Distributing static public keys does not require encrypted channels or split knowledge techniques, but it has its own specifics. A
relying party, who obtains the keys either for verifying an owner’s signature or for encrypting a message for the key owner, should have a high level of assurance that,
- The key really belongs to the subject.
- The key is associated with certain attributes belonging to the
subject.
- The key is valid.
- The key is allowed by its policy to be used for the intended purpose.
All of this is achieved through

A

PKI Public Key Infrastructure

139
Q

What does PKI do for public keys

A

Issues X509 certificates containing the subjects public keys and attributes

140
Q

The protection of keys in storage should provide

A
  • Integrity
  • Confidentiality
  • Association with application and objects
  • Assurance of domain parameters
  • Availability
141
Q

The protection of keys in storage should provide
Association with application and objects what does this mean

A

Making sure that the key belongs to a designated object; e. g., encapsulating public keys with the object DN in a signed certificate or storing private signing keys in the object’s protected key store.

142
Q

The protection of keys in storage should provide
Assurance of Domain Parameters what does this mean

A

Assurance of Domain Parameters (making sure that domain
parameters used in the PKI keys exchange are correct).

143
Q

________________is required when an attempt is made to
access the maintenance interface or tamper with a device meeting FIPS 140-2 level 3 requirements [FIPS 140-2].

A

Automatic zeroization

144
Q

If it is believed that an encryption key of data at rest was compromised, ________________________________. This whole process is called ________________

A

this data should be reencrypted with a new key
key rotation

145
Q

What is a way of changing keys without requiring new key distribution or exchange between parties

A

applying a non-reversable function to an existing key

146
Q

Generally, escrow is defined as

A

something delivered to a third person (usually
called an “escrow agent”) to keep, and to be returned to the delivering entity

147
Q

How does an escrow system operate in cryptography applications

A

In cryptography applications, a key escrow system operates with two
components of one key, and these two components are entrusted to two independent escrow agents.

148
Q

In order to support escrow capabilities in telecommunication, the U.S. government adopted the symmetric encryption algorithm _____________ and a
_________________________ method, which presents one part of a key escrow system enabling decryption of encrypted telecommunications.

A

SKIPJACK
Law Enforcement Access Field (LEAF)

149
Q

Decryption of lawfully intercepted telecommunications may be achieved through the acquisition and use of

A

The LEAF, the decryption algorithm, and the
two escrowed key components.

150
Q

Key backup and recovery is part of the

A

KMS contingency plan

151
Q

When should key backup be considered.

A

Only if there are no other ways (such as rekeying or key derivation) to provide continuity

152
Q

a full-fledged PKI deployment often involves two distinct key pairs

A
  1. Signing Key Pair
    • Private Key (Signing Key): Stored securely on a server or HSM. Used for signing certificates, documents, or authentication challenges.
    • Public Key (Verification Key): Sent to the Certificate Authority (CA) and embedded in an X.509 certificate.
  2. Encryption Key Pair (optional but common in PKI deployments)
    • Private Key (Decryption Key): Used to decrypt messages encrypted for the entity.
    • Public Key (Encryption Key): Distributed in a certificate to allow others to encrypt messages for the subscriber.
153
Q

What is an EE in PKI

A

End Entity

154
Q

In PKI what is a CP

A

Certificate policy

155
Q

What is the purpose of a CP

A
  • Specifies who can request, issue, and use a certificate.
    • Defines trust levels and security controls applied to the certificates.
    • Ensures compliance with industry standards (e.g., NIST, WebTrust, ETSI).
    • Helps relying parties (e.g., browsers, applications) understand the trustworthiness of a certificate.
156
Q

What is a CPS

A

A Certificate Practice Statement

157
Q

If a CP Defines what policies apply to certificates what does the CPS do?

A

Defines how the CA enforces those policies

158
Q

What is the difference in scope between the CP and the CPS

A

CP - High level policy framework
CPS - Operational details

159
Q

What is the difference in content between the CP and the CPS

A

CP - Trust levels, authentication requirements, intended use
CPS - Key management procedures, certificate issuance process

160
Q

When talking about PKI certificates and the keys, we should always remember the guidance provided in

A

CP and CPS documents

161
Q

There are many steps between the moment when a subscriber applies for a PKI certificate and the final state, when keys have been generated and certificates have been signed and placed in the appropriate locations in the system. These steps are described
either explicitly or implicitly in the

162
Q

In PKI what is a CPF

A

Certificate Policy Framework, the rules governing CPs in an organisation

163
Q

The most reliable, but most expensive method to authenticate an EE for PKI registration is

A

face-to-face authentication.

164
Q

Technically, the sanctioned and expected usage of the
certificate is represented in the X.509 certificate ___________ attribute.

A

“Key usage”

165
Q

Name three models that provide chains of trust for PKI applications supporting multiple communities

A
  1. Subordinate Hierarchy (Two or more CA’s in a hierarchical trust relationship)
  2. Cross-certified mesh (CA’s cross certify)
  3. Certificate Chains - the validity of an issuing CA’s certificate depends on the validity and life span of the whole certificate chain
166
Q

Which PKI trust model is good for internal enterprise applications but may be hard to implement between enterprises

A

The subordinate hierarchy

167
Q

The _______________________ is probably the most general model of trust between CAs and participating PKIs.

A

Cross-certified mesh

168
Q

When a cross-certified mesh is too dynamic and grows too fast to include n CAs, it may not scale well because it is supposed to include and support n(n - 1) cross-certifications and also because of potentially ambiguous verification paths.
What model may be helpful in this case?

169
Q

How does the bridge CA model allow participating parties to mutually validate each other’s certificate paths.

A

By creating a mesh of participating root CAs

170
Q

The most well-known example of a Trusted List model is

A

a set of publicly trusted root certificates embedded in the Internet browsers.

171
Q

CRL

A

Certificate Revocation List

172
Q

What is the traditional CRL Model

A

A relying party checks a certificate against the latest published CRL. If the certificate is not in the CRL, it is assumed valid.

173
Q

Why is the response time variable in the traditional CRL model

A

The relying party may or may not have the current CRL in cache.

174
Q

What is the problem with the traditional CRL model

A

In applications with a large number of subscribers and relying parties and with a high revocation rate, the CRL request rate can be very high, and CRLs themselves can be very long. This may introduce network and CRL-repository performance problems.

175
Q

When would cached CRL requests peak?
How could this be mitigated?

A

When parties request it for the first time, and when cached CRLs expire.
Set different expirations for overissued CRLs

176
Q

How does a segmented CRL help with peak times.

A

Reducing the size of the CRL or the portion of the CRL that the party needs to download

177
Q

What are some ways of mitigating peaks in CRL traffic

A

Expiring CRLs at different rates
Segmenting CRLs for smaller downloads
Delta CRLs

178
Q

What is an alternative to the CRL model

A

Online certificate status protocol OCSP

179
Q

What is a limitation of the OCSP

A

Cannot be used offline

180
Q

______________ is a way of establishing trust between entities that are
subscribers for different PKI certificates services and which have been issued certificates by different nonrelated CAs.

A

Cross-certification

181
Q

In Cross-certification complete understanding of Certificate
Policy and Practice of each CA is required, because each party needs to know

A

how much it can trust to the certificates issued by another CA, what are the enrolment, issuing and revocation procedures of another

182
Q

Does cross-certification need to be mutual?

183
Q

In cross certification What is issued by company A after going through the process of trusting company B

A

A cross-certificate or cross-signed certificate

184
Q

What is inside a cross-certificate?

A

Issuer: Company A
Subject: Company B
Public Key: Public Key of Company B’s root CA
Signature: Company A
Validity period:how long the certification is valid for

185
Q

Attack models - What is required for a ciphertext-only attacks

A

a large volume of ciphertext encrypted with the same algorithm

186
Q

Attack models - What is required for a known-plaintext attack

A

some plaintext and the corresponding ciphertext

187
Q

Attack models - Chosen-plaintext

A

Choosing the plaintext with the corresponding ciphertext

188
Q

Attack models - Chosen-ciphertext

A

Chosen-ciphertext attack: This attack involves choosing the
ciphertext to be decrypted and gaining access to the resulting
plaintext.

189
Q

Variations on the attack models can be used in a controlled environment to reveal weaknesses in a cryptosystem and analyze an algorithm’s strength. Two common attacks applied to the testing of symmetric ciphers are the techniques
of

A

differential cryptanalysis and linear cryptanalysis

190
Q

AES in ECB mode (Electronic Codebook) is vulnerable to Chosen Plaintext Attack because

A

it encrypts identical plaintext blocks into identical
ciphertext blocks.

191
Q

What is the mitigation for the weaknesses of AES in ECB mode

A

Use a stronger encryption mode like AES-CBC or AES-GCM, which add randomness (IV or nonce) to prevent patterns.

192
Q

What is the differential cryptanalysis method?

A

It is a chosen-plaintext attack where an attacker encrypts pairs of plaintexts with a known difference (ΔP) and observes how this difference propagates through the encryption process.

193
Q

______ was successfully broken using differential cryptanalysis, but ______ remains secure because the number of required
plaintext pairs is beyond practical limits.

194
Q

Linear cryptanalysis

A

Attackers try to find patterns between the plaintext, ciphertext, and secret key. If an attacker can find even a slight pattern, they can use a large amount of data to gradually figure out the secret key.

195
Q

What type of attack is a birthday attack

A

Hash function attack

196
Q

What is the goal of a hash function attack?
Why is this bad?

A

Find two different inputs (M1 and M2) that produce the same hash (H).
If two different documents or files have the same hash, an attacker can swap one for another without detection.

197
Q

What is a network-based cryptanalytic attack?

A

Attacks that target more than just the cryptographic algorithm by exploiting weaknesses in areas such as communication
protocols or transmission methods

198
Q

Name three network-based cryptanalytic attacks

A
  • Man in the middle attack
  • Replay attack
  • Traffic analysis attack
199
Q

How is SSH operating in interactive mode vulnerable to a Traffic Analysis Attack

A

Every keystroke is transmitted as a packet, traffic analysis can get the password length by counting the packets

200
Q

Two general countermeasures to protect against traffic
analysis

A
  1. traffic padding
  2. anonymising message senders using proxy servers, (making the source and destination of communicating parties more difficult to determine)
201
Q

In a cryptographic system where multiple secret keys are necessary, for example, with a tape encryption appliance device, it is common to encrypt individual working keys with a top-level master key. The
storage of the top-level secret key used in such a cryptosystem can be done using key shares, a technique also known as ___________
This involves

A

split-knowledge.
splitting the key into multiple pieces and granting access to each share to separate individuals.

202
Q

The following attacks against keys are variations on the
cryptanalytic attack models and are also important in validating cryptosystems:

A

Meet in the middle attacks
Related key attacks

203
Q

How does the “Meet in the middle” attack against keys work

A

It reduces the time needed to break double encryption schemes (e.g., Double DES) by exploiting the independent encryption and decryption steps.
Instead of brute-forcing the full key space, Meet-in-the-Middle splits the attack into two halves

204
Q

Related key attacks

A

The attacker exploits predictable relationships between multiple encryption keys to break a cipher more efficiently than brute force.

205
Q

These attacks mainly deal with obtaining and analyzing information that originate from the cryptosystem hardware rather than weaknesses in the cryptographic algorithm.

A

Side-channel attacks

206
Q

Three types of side channel attack

A
  1. Timing attack - how long does the cryptographic operation take to execute
  2. Differential Fault Analysis
  3. Differential power analysis
207
Q

Explain the timing attack

A

A side channel attack
By analyzing small variations in execution time, the attacker can extract information about the secret key used in the encryption process.
Cryptographic operations (e.g., RSA, Diffie-Hellman) take slightly different amounts of time based on key bits and input values.

208
Q

Explain differential fault analysis

A

a side-channel attack where an attacker injects small faults (errors) into a cryptographic computation and observes how the faulty outputs differ from correct outputs. By analyzing these differences, the attacker can recover secret keys faster than brute force.

209
Q

Explain differential power analysis

A

In this method, power consumption measurements in a hardware device such as a smart card are made during encryption operations while ciphertext is recorded.

210
Q

a digital signature scheme must employ an acceptable cryptographic hashing function, such as those specified in

A

NIST FIPS 180-4, the Secure Hash Standard

211
Q

Determining if cryptographic controls meet governmental or corporate standards is a function of

A

compliance monitoring.

212
Q

In the PCI standard the essential requirement in protecting card holder data is

A

not to store it at all if possible

213
Q
  1. What cryptographic hash function would be the acceptable replacement
    for MD4?
    A. MD5
    B. RIPEMD
    C. RIPEMD-160
    D. SHA-1
A

The correct option is C
This strengthened version of RIPEMD was successfully developed as a
collision-resistant replacement for other hash functions including MD4, MD5 (Option a), and RIPEMD (Option b) [Collisions]. Because collisions were also announced in SHA-1 (Option d) [SHA-1 Collisions], RIPEMD-160 would be the acceptable replacement [RIPEMD-160].

214
Q
  1. An IPSec Security Association (SA) is a relationship between two
    or more entities that describes how they will use security services to
    communicate. Which values can be used in an SA to provide greater
    security through confidentiality protection of the data payload?
    A. Use of AES within AH
    B. SHA-1 combined with HMAC
    C. Using ESP
    D. AH and ESP together
A

The correct option is C
Encapsulating Security Protocol (ESP) also provides data origin authentication and data integrity, and also offers confidentiality for the IP payload it protects.

215
Q
  1. Suppose a secure extranet connection is required to allow an application in an external trusted entity’s network to securely access server resources in a corporate DMZ. Assuming IPSec is being configured to use ESP in tunnel mode, which of the following is the most accurate?
    A. Encryption of data packets and data origin authentication for the
    packets sent over the tunnel can both be provided.
    B. ESP must be used in transport mode in order to encrypt both
    the packets sent as well as encrypt source and destination IP
    Addresses of the external entity’s network and of the corporate
    DMZ network.
    C. Use of AH is necessary in order to provide data origin
    authentication for the packets sent over the tunnel.
    D. Source and destination IP Addresses of the external entity’s
    network and of the corporate DMZ network are not encrypted.
A

The correct option is A
ESP optionally provides a means of data origin authentication, and while it can be nested within AH, ESP does not require AH for this (Option c) [RFC 2406].
With ESP operating in transport mode (Option b), the original IP headers are not encapsulated within the ESP header, and the original IP addresses (source and destination IP addresses of the external entity’s network and of the corporate DMZ network) are in fact not encrypted. With ESP operating in tunnel mode, the original IP addresses are actually encrypted (Option d).

216
Q

Is it possible to provide both encryption of data packets and data origin authentication for the packets in ESP tunnel mode

A

Yes, ESP optionally provides a means of data origin authentication, and while it can be nested within AH, ESP does not require AH for this

217
Q

In ESP when are the original IP addresses (source and destination IP addresses of the external entity’s network and of the corporate DMZ network) not encrypted

A

In Transport mode

218
Q
  1. What is the BEST reason a network device manufacturer might
    include the RC4 encryption algorithm within an IEEE 802.11 wireless
    component?
    A. They would like to use AES, but they require compatibility
    with TEEE 802.11i.
    B. Their product must support the encryption algorithm WPA2 uses.
    C. RC4 is a stream cipher with an improved key-scheduling
    algorithm that provides stronger protection than other ciphers.
    D. Their release strategy planning includes maintaining some
    degree of backward compatibility with earlier protocols.
A

The correct option is D
RC4 is widely used, and the manufacturer wants to make its product compatible with WPA or even WEP, which use RC4. This does not mean they do not include AES; in fact, they would likely do so in the case of a new product, because IEEE 802.11i does in fact use AES for encryption (Option a). Option b is incorrect because WPA2, which is based on IEEE 802.11i, uses AES. Option
c is incorrect because while RC4 is a stream cipher, it has a weak key-scheduling algorithm and offers less protection than other ciphers such as AES [WPA].

219
Q

True or false RC4 is a stream cipher with an improved key-scheduling
algorithm that provides stronger protection than other ciphers.

A

It is a stream cipher but it it has a weak key-scheduling algorithm

220
Q
  1. What is true about the Diffie-Hellman (DH) key agreement protocol?
    A. The protocol requires initial exchange of a shared secret.
    B. The protocol depends on a secure communication channel for key
    exchange.
    C. The protocol needs other mechanisms such as digital signatures to provide authentication of the communicating parties.
    D. The protocol is based on a symmetric cryptosystem.
A

The correct option is C
It is true that the original Diffie-Hellman key exchange protocol does not provide authentication of the sender and receiver. Other protocols such as digital signatures or HMAC must be used for this [RFC4650]. The Diffie-Hellman (DH) protocol involves computing a shared secret based on exchange of a public
key (Option a), and is intended to be performed over insecure channels (Option b). DH is based on public-key cryptography because it involves deriving a shared secret based on the sender and receiver each having private keys and sharing public keys, and the property of the discrete logarithm problem, which makes it computationally infeasible to derive the private key from the public key
[SCHNEIER].

221
Q

True or false The Diffie-Hellman protocol depends on a secure communication channel for key exchange.

A

False, it is performed over insecure channels to set up the secure channel

222
Q
  1. What is the main security service a cryptographic hash function
    provides, and what is the main security property a cryptographic hash function must exhibit?
A

Integrity and collision resistance

223
Q

Message authentication codes and digital signatures provide

A

message authenticity

224
Q
  1. What is necessary on the receiving side in order to verify a digital
    signature?
    A. The message, message digest, and the sender’s private key
    B. The message, message digest, and the sender’s public key
    C. The message, the MAC, and the sender’s public key
    D. The message, the MAC, and the sender’s private key
A

The correct option is B
Verifying a digital signature is performed by decrypting the message digest using the sender’s public key. Exposing the private key would mean that anyone with the private key could now forge the signature (Option a). Message authentication
codes (MACs) do not use public key encryption, but produce a hash of the combined message input and a secret key (Options c and d).

225
Q
  1. What is a known plaintext attack used against DES to show that
    encrypting plaintext with one DES key followed by encrypting it with
    a second DES key is no more secure than using a single DES key?
    A. Meet-in-the-middle attack
    B. Man-in-the-middle attack
    C. Replay attack
    D. Related-key attack
A

The correct option is A
This attack applies to double encryption schemes such as 2DES by encrypting known plaintext using each possible key and comparing results obtained “in the middle” from decrypting the corresponding ciphertext using each possible key. Option b is a network-based cryptanalytic attack involving intercepting and forwarding a modified version of a transmission between two parties. Option c is also a network-based attack involving capturing and retransmitting

226
Q
  1. What is among the most important factors in validating the
    cryptographic key design in a public key cryptosystem?
    A. Ability of a random number generator to introduce entropy
    during key generation
    B. Preimage resistance
    C. Confidentiality of key exchange protocol
    D. Crypto period
A

The correct option is A
The purpose of randomness in the key or keystream is to make it less likely that cryptanalysts will be able to guess or deduce the key. A random number generator that does not exhibit the property of randomness or entropy in its output will produce weak keys. Option b applies to cryptographic hash functions and is known as the “one-way” property of hash functions. Because the question asks about public-key cryptosystems, Option c is less valid because public keys can be exchanged without loss of the private key. Option d applies more to the operation and management of keys, because the crypto period is the time span during which an actual key can remain valid for use.

227
Q

A random number generator that does not exhibit the property of randomness or entropy in its output will produce

228
Q
  1. What factor would be most important in the design of a solution that is required to provide at-rest encryption in order to protect financial data in a restricted-access file sharing server?
    A. Encryption algorithm used
    B. Cryptographic key length
    C. Ability to encrypt the entire storage array or file system versus
    ability to encrypt individual files
    D. Individual user access and file-level authorization controls
A

The correct option is D
The encryption algorithm, key length, and scope of encryption provided performed in order to ensure confidentiality, and is tied to an access control mechanism because those individuals or entities who must be able to decrypt the data will need authorised access to do so.

229
Q
  1. A large bank with a more than one million customer base implements PKI to support authentication and encryption for online Internet transactions.
    What is the best method to validate certificates in a timely manner?
    A. CRL over LDAP
    B. CRLDP over LDAP
    C. OCSP over HTTP
    D. CRLDP over ODBC
A

The correct option is C
Options a, b, and d are CRL-based methods that require significant network traffic between the verifying party and the LDAP or DB server where the CRL is published. It is most significant with a large base of subscribers whose certificates may point to different CRLDP and require pulling many different CRL fragments from the points of publication.

230
Q
  1. A car rental company is planning to implement wireless communication
    between the cars and rental support centers. Customers will be able
    to use these centers as concierge services, and rental centers will be
    able to check the car’s status if necessary. PKI certificates will be used
    to support authentication, non-repudiation, and confidentiality of
    transactions. Which asymmetric cryptography is a better fit?
    A. RSA 1024
    B. AES 256
    C. RSA 4096
    D. ECC 160
A

The correct option is D
Option b refers to a symmetric algorithm that does not support non-
repudiation. The algorithms in Options a and c have significantly longer keys than the algorithm in Option d, which has equivalent strength. For wireless communication, a smaller key length is an important factor.

231
Q

When would one choose ECC over RSA 1024 or RSA 4096

A

When key length is a factor such as with wireless

232
Q

Should one backup signing keys

233
Q
  1. A key management system of a government agency’s PKI includes a
    backup and recovery (BR) module. PKI issues and manages separate
    certificates for encryption and verification. What is the right BR
    strategy?
    A. Back up all certificates and private keys
    B. Back up all private keys and verification certificates
    C. Back up decryption keys and all certificates
    D. Back up signing keys and all certificates
A

The correct option is C
Options a and b assume backing up signing keys, which is wrong. Option d assumes signing keys, which is wrong, and does not include decryption keys, which is wrong, too.

234
Q
  1. A company needs to comply with FIPS 140-2 level 3, and decided to
    use split knowledge for managing storage encryption keys. What is the
    right method for storing and using the key?
    A. Store the key components on the encrypted media.
    B. Create a master key and store it on external media owned by the
    first security officer.
    C. Store key components on separate external media owned by a
    different security officer.
    D. Publish key components on an LDAP server and protect them by
    officers’ asymmetric keys encryption.
A

The correct option is C
Storing key components on the same media (Option a) will expose them to one
administrator or officer. One officer is in possession of all components (Option
b) and can recreate the whole key. Storing secret keys on intermediate storage
(Option d) is not acceptable.

235
Q
  1. An agency is using symmetric AES 128 cryptography for distributing
    confidential data. Because of its growth and key distribution problems,
    the agency decided to move to asymmetric cryptography and X.509
    certificates. Which of the following is the BEST strength asymmetric
    cryptography to match the strength of the current symmetric
    cryptography?
    A. RSA 2048
    B. ECC 160
    С. ЕСС 256
    D. RSA 7680
A

The correct option is C
According to NISTSP800-57, ECC 256 cryptographic strength is equivalent to
AES 128. Options a and b are wrong because they are weaker than AES 128;
Option d is stronger than required and comes with impractically long keys.

236
Q
  1. One very large company created a business partnership with another,
    much smaller company. Both companies have their own PKI in-house.
    Employees need to use secure messaging and secure file transfer for
    their business transactions. What is the BEST strategy to implement
    this?
    A. The larger company creates a PKI hierarchical branch for the
    smaller company, so all parties have a common root of trust.
    B. The larger company enrolls all employees of the smaller company
    and issues their certificates, so all parties have a common root of
    trust.
    C. Companies should review each other’s CP and CPS, cross-
    certify each other, and let each other access each other’s search
    database.
    D. Employ an external third-party CA and have both company’s
    employees register and use their new certificates for secure
    transactions.
A

The correct option is C
Options a, b, and d either partially or completely disregard existing PKI
infrastructure and require significant expenses for restructuring PKI or hiring
an outside service.

237
Q

Is the asymmetric cryptography in EEC 256 Stronger or Weaker than than the symmetric cryptography of AES 128

A

They are considered equivalent

238
Q
  1. When applications of cross-certified PKI subscribers validate each
    other’s digitally signed messages, they have to perform the following
    steps:
    A. The signature is cryptographically correct, and sender’s validation
    certificate and sender’s CA cross-certificate are valid.
    B. Validate CRL and ARL.
    C. Validate sender’s encryption certificate, ARL, and CRL.
    D. The signature is cryptographically correct, and sender’s CA
    certificate is valid
    The correct option is A
    Option b is incorrect because CRL and ARL just verify revocation status without
    crypto and validity period validation; Option c is incorrect because signature
    verification requires verification certificate validation rather than encryption;
    Option d is incorrect because verification of signature verification certificate is
    missing.
A

The correct option is A
Option b is incorrect because CRL and ARL just verify revocation status without
crypto and validity period validation; Option c is incorrect because signature
verification requires verification certificate validation rather than encryption;
Option d is incorrect because verification of signature verification certificate is
missing.

239
Q

Why might RSA 7680 be a bad choice for asymmetric cryptography

A

They key size is huge, ECC may be better

240
Q
  1. A company implements three-tier PKI, which will include a root CA,
    several sub-CAs, and a number of regional issuing CAs under each
    sub-CA. How should the life span of the CA’s certificates be related?
    A. Root CA = 10 years; sub-CA = 5 years; issuing CA = 1 year
    B. Root CA = sub-CA = issuing CAs = 5 years
    C. Root CA = 1 year; sub-CA = 5 years; issuing CA = 10 years
    D. Root CA = 5 years; sub-CA = 10 years; issuing CA = 1 year
A

The correct option is A
In a hierarchical PKI, the upper CA should issue certificates to the subordinate
CAs with a longer life span than those subordinates issue certificates to their
subordinates. Otherwise, the chain will be expiring before the intermediate CA
and entity certificates expire.

241
Q
  1. Management and storage of symmetric data encryption keys most
    importantly must provide
    A. Integrity, confidentiality, and archiving for the time period from
    key generation through the life span of the data they protect or the
    duration of the crypto period, whichever is longer.
    B. Confidentiality for the time period from key generation through
    the life span of the data they protect or duration of crypto period,
    whichever is longer.
    C. Integrity, confidentiality, and archiving for the duration of the
    key’s crypto period.
    D. Integrity, confidentiality, non-repudiation and archiving for the
    time period from key generation through the life span of the data
    they protect or duration of crypto period, whichever is longer.
A

The correct option is A
Option b is incorrect because without an integrity requirement a key may be
tampered with. Option c is incorrect because if an encryption key crypto period
expires before the encrypted data life span, the key destruction may leave data
that is never possible to decrypt. Option d is incorrect because non-repudiation
is not relevant to symmetric cryptography.

242
Q
  1. Management and storage of public signature verification keys most
    importantly must provide
    A. Integrity, confidentiality, and archiving for the time period from
    key generation until no protected data needs to be verified.
    B. Integrity and archiving for the time period from key generation
    until no protected data needs to be verified.
    C. Integrity, confidentiality and archiving for the time period from
    key generation through the life span of the data they protect or the
    duration of crypto period, whichever is longer.
    D. Integrity and confidentiality for the time period from key
    generation until no protected data needs to be verified.
A

The correct option is B
Options a, c, and d are incorrect because confidentiality is not required for
public keys.