Security Module 5 Flashcards

1
Q

What is a benefit of using a combination of symmetrical and asymmetrical cryptography when transferring data across the internet?

A

Asymmetrical cryptography is necessary to establish a secure connection and symmetrical cryptography can enhance the speed of the data transmission after the fact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which solution is ideal for encrypting an entire hard drive of a PC?

A

Bitlocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

NTRUEncrypt is based on which cryptography method?

A

Lattice-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

“Plaintext” is a term that is best described as what?

A

Data in an unencrypted form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why would a security administrator use perfect forward secrecy instead of other key exchange solutions?

A

If compromised it can only expose the content of a single message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is a homoalphabetic substitution considered a stream cipher?

A

It encrypts one plaintext character at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the disadvantage of TSA compared to most symmetrical algorithms?

A

RSA is complicated and slower than other algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the differences between a block cipher and a sponge function?

A

A block cipher encrypts plaintext at a fixed size whereas a sponge function takes input string at any length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An encrypted digest is produced from what?

A

Hash algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following encryption algorithms has not been successfully attacked?

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is an advantage of the Keccak algorithm?

A

It is a compact algorithm that could be considered ideal for smaller devices and appliances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A digital signature does NOT provide which of the following?

A

Redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How is a hash algorithm limited in functionality?

A

It cannot be decrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

OTPs were originally used by whom?

A

Resistance groups and operation teams during World War II

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does SHA-1 differ from the MD4 algorithm?

A

MD4 creates a digest length of 128 bit whereas SHA-1’s digest length is 160 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following best describes TPM?

A

A chip on a motherboard

17
Q

What type of system is blowfish designed to run efficiently on?

A

32-bit systems

18
Q

Using asymmetric cryptography practices, Alex wants to send Jessica an encrypted message that he received from Joel. Additionally, Jessica wants to verify the message came from Alex by viewing his digital signature. Whose keys would be used for what in this scenario?

A

Jessica’s public key will encrypt the message, Jessica’s private key would be used to view the message, Alex’s private key would be used to encrypt the digest, and Alex’s public key would be used by Jessica to decrypt the digest.

19
Q

Why does RC4 consume more processing power than RC5?

A

RC4 is a stream cipher and RC5 is a block cipher

20
Q

Which of the following is NOT a benefit of USB device encryption?

A

The USB device can encrypt the hard drive of an attacker when they attempt to access data.