Security Engineering and Architecture Flashcards
What is the primary purpose of cryptography in communications networks?
A. To speed up data transfer rates.
B. To protect data from interception, manipulation, and falsification.
C. To compress data for better storage.
D. To analyze network traffic for potential attacks.
B
What are the two types of information cryptography aims to protect?
A. Data in memory and in transit.
B. Data at rest and in transit.
C. Data in use and in archives.
D. Data in transit and in the cloud.
B
What is Caesar’s Cipher primarily known for?
A. Being the first mechanical encryption device.
B. Using substitution to encrypt text by shifting letters.
C. Encrypting messages using random keypads.
D. Being an unbreakable encryption method.
B
What does the term ‘Cryptology’ encompass?
A. Cryptanalysis and Cryptography.
B. Cryptography and Encoding.
C. Cryptanalysis and Data Compression.
D. Cryptography and Network Protocols.
A
What characterizes symmetric key cryptographic systems?
A. Use of two keys, one for encryption and one for decryption.
B. Encryption and decryption keys are the same or can be derived from each other.
C. Keys are generated randomly for each transaction.
D. It only works with block cipher algorithms.
B
Which of the following is an example of a symmetric key algorithm?
A. RSA
B. Diffie-Hellman
C. DES
D. ElGamal
C
What is the main advantage of public-key cryptography?
A. Faster encryption processes.
B. Requires only one key for secure communication.
C. Solves the problem of secure key distribution.
D. Works exclusively with block ciphers.
C
Which algorithm is an example of public-key cryptography?
A. AES
B. RSA
C. DES
D. MD5
B
What is the primary purpose of a hash function?
A. To encrypt messages securely.
B. To produce fixed-length outputs from variable-length inputs.
C. To generate public-private key pairs.
D. To decode cipher texts.
B
Which of the following is considered an obsolete hash function?
A. SHA-3
B. SHA-256
C. MD5
D. Whirlpool
C
What is a Message Authentication Code (MAC) used for?
A. Encrypting and decrypting data.
B. Verifying the origin and integrity of a message.
C. Compressing data for transmission.
D. Storing user passwords.
B
Which method combines encryption and MAC production for security?
A. Encrypt-then-MAC
B. Hash-then-Encrypt
C. Compress-and-Encrypt
D. Encrypt-and-Hash
A
What is a key function of a digital signature?
A. Compressing the data for storage.
B. Guaranteeing data integrity and authentication.
C. Encrypting data with public keys.
D. Generating symmetric keys for communication.
B
Which algorithm is commonly used for digital signatures?
A. DSS
B. AES
C. MD5
D. DES
A
What is the primary role of a digital certificate?
A. Encrypting messages in transit.
B. Verifying the identity of the certificate holder.
C. Compressing large files for storage.
D. Managing session keys during communication.
B
Which standard is most commonly used for digital certificates?
A. X.509
B. PKCS #7
C. AES
D. ECC
A
What is the primary characteristic of a brute force attack?
A. Exploiting weaknesses in cryptographic algorithms.
B. Trying all possible keys until the correct one is found.
C. Using statistical analysis to decipher ciphertext.
D. Intercepting messages in transit.
B
What does a ‘Man-in-the-Middle’ attack typically exploit?
A. Symmetric key weaknesses.
B. Vulnerabilities in public-key cryptosystems during key exchange.
C. Poor implementation of block ciphers.
D. Errors in hash function outputs.
B
What is the primary difference between stream ciphers and block ciphers?
A. Stream ciphers encrypt data bit by bit, while block ciphers encrypt data in fixed-sized blocks.
B. Stream ciphers are slower than block ciphers.
C. Stream ciphers use asymmetric keys, while block ciphers use symmetric keys.
D. Stream ciphers cannot handle large amounts of data.
A
Which of the following is an example of a block cipher?
A. AES
B. RC4
C. MD5
D. SHA-3
A
What is the purpose of padding in block cipher encryption?
A. To enhance the security of the encryption algorithm.
B. To ensure the plaintext matches the required block size.
C. To prevent the ciphertext from being intercepted.
D. To improve the speed of encryption.
B
What mathematical problem is the RSA algorithm based on?
A. Discrete logarithms.
B. Factorization of large prime numbers.
C. Matrix multiplication.
D. XOR operations.
B
In RSA encryption, what is the relationship between the public and private keys?
A. They are identical.
B. The public key is derived from the private key.
C. The private key is generated independently of the public key.
D. They are both generated from a hash function.
B
What is a significant disadvantage of public-key cryptography compared to symmetric key cryptography?
A. Requires less computational power.
B. Limited key length options.
C. Slower encryption and decryption processes.
D. Vulnerable to brute force attacks.
C
What is the goal of a dictionary attack?
A. To guess passwords using common words or phrases.
B. To encrypt messages using a predefined dictionary.
C. To analyze hash functions for vulnerabilities.
D. To intercept messages during transmission.
A
Which type of attack targets the physical implementation of cryptographic systems?
A. Timing attacks.
B. Side-channel attacks.
C. Chosen plaintext attacks.
D. Brute force attacks.
B
What is a common characteristic of a birthday attack?
A. It uses statistical analysis to find hash collisions.
B. It targets symmetric key algorithms.
C. It exploits vulnerabilities in digital certificates.
D. It uses brute force techniques to guess keys.
A
What is the primary purpose of an X.509 certificate?
A. To compress data for faster transmission.
B. To encrypt email communications.
C. To provide identification and authentication.
D. To generate private keys for users.
C
What is a Certificate Authority (CA) responsible for?
A. Encrypting sensitive data.
B. Issuing and managing digital certificates.
C. Generating public and private key pairs.
D. Storing cryptographic keys.
B
Which of the following is a characteristic of a digital certificate?
A. Contains a symmetric key for encryption.
B. Can only be used for email encryption.
C. Provides information about the certificate holder and issuer.
D. Requires a physical token for validation.
C
What is the primary goal of a security model?
A. To provide a theoretical framework for understanding security policies.
B. To encrypt sensitive information.
C. To analyze cryptographic algorithms.
D. To prevent brute force attacks.
A
Which of the following is an example of a security model?
A. Bell-LaPadula Model.
B. RSA Algorithm.
C. Elliptic Curve Cryptography.
D. Caesar Cipher.
A
What principle emphasizes designing systems to operate securely even in the presence of failures?
A. Least Privilege.
B. Fail-Safe Defaults.
C. Defense in Depth.
D. Separation of Duties.
B
Which cryptographic concept is essential for verifying a digital signature?
A. Symmetric key exchange.
B. Hash function integrity.
C. Block cipher processing.
D. Brute force attack mitigation.
B
What role does the private key play in a digital signature?
A. It encrypts the data being signed.
B. It verifies the integrity of the signature.
C. It generates the digital signature.
D. It compresses the plaintext for transmission.
C
Which application commonly uses digital signatures for security?
A. Email authentication.
B. Data compression.
C. Network address translation.
D. Symmetric key exchange.
A
What is the main function of a cryptographic protocol?
A. To perform encryption only.
B. To define procedures for secure communication.
C. To generate random keys.
D. To replace symmetric encryption with asymmetric encryption.
B
Which cryptographic protocol is used for secure web communications?
A. AES
B. RSA
C. TLS
D. MD5
C
What does the Diffie-Hellman protocol primarily achieve?
A. Data encryption.
B. Key agreement between parties.
C. Digital signature verification.
D. Hash-based message authentication.
B
What is the purpose of access control in an information system?
A. To encrypt all user data.
B. To restrict unauthorized access to resources.
C. To compress files for better storage.
D. To manage network bandwidth efficiently.
B