2.0 Cryptography

Your copy is the same as the copy posted on the website.

Which of the following is the strongest hashing algorithm

SHA-1

Which of the following best describes high amplifications when applied to hashing algorithms

A small change in the message results in a big change in the hash value.

Which of the following is the weakest hashing algorithm

MD-5

When two different messages produce the same hash value, what has occurred

Collision

Hashing algorithms are used to perform what activity

Create a message digest

Your company system is a participant in an asymmetric cryptography system. You've crafted a message to be sent another user. Before transmission, you hash the message, then encrypt the hashing using your private key. You then attach this encrypted hash to your message as a digital signature before sending it to the other user. In this example, what protection does the hashing activity provide

Integrity

Which of the following is used to verify that a downloaded file has not been altered

Hash

By definition, which security concept uses the ability to prove that a sender sent an encrypted message

Non-repudiation

You create a new document and save it to a hard drive on a file server on your company's network. Then, you employ an encryption tool to encrypt the file using AES. This activity is an example of accomplishing what security goal

Confidentiality

By definition, which security concept ensures that only authorized parties can access data

What is the cryptography mechanism which hides secret communications within various forms of data

Steganography

Which of the following encryption methods combines a random value with the plaintext to produce the cipher text

One-time pad

By definition, which security concept uses the ability to prove that a sender sent an encrypted message?

Which of the following is not a valid example of steganography

Encrypting a data file with an encryption key

When a cryptographic system is used to protect confidentiality of data, what is actually protected

Unauthorized users are prevented from viewing or accessing the resource.

What form of cryptography is best suited for bulk encryption because it is so fast

Symmetric key cryptography

Which of the following is not true concerning symmetric key cryptography

Key management is easy when implemented on a large scale.

Which of the following algorithms are used in symmetric encryption (Select three.)

Blowfish, AES, 3DES

What type of key or keys are used in symmetric cryptography

A shared private key

Which of the following is the weakest symmetric encryption method

DES

You want to encrypt data on a removable storage device. Which encryption method would you choose to use the strongest method possible

AES

How many keys are used with symmetric key cryptography

One

Which of the following is used for secure exchange of symmetric encryption keys

Diffie-Hellaman

Which of the following algorithms are used in asymmetric encryption (Select two.)

Diffie-Hellman, RSA

Which of the following are characteristics of ECC (Select two.)

Asymmetric encryption, Uses a finite set of values within an algebraic field.

A receiver wants to verify the integrity of a message received from a sender. A hashing value is contained within the digital signature of the sender. What must the receiver use to access the hashing value to the verify the integrity of the transmission

Sender's public key

How many keys are used with asymmetric or public key cryptography

Two

Which of the following is the employment of two separate key pairs in order to separate the security functions of confidentiality and integrity in a communication system

Dual key pair

A PKI is a method for managing which type of encryption

Asymmetric

Which of the following protocols are most likely used with digital signatures (Select two.)

ECC, RSA

What is the purpose of key escrow

To provide a means to recover from a lost private key

Which of the following is an entity that accepts and validates information contained within a request for certificate

Registration authority

What is a PKI

A hierarchy of computers for issuing certificates

What is the most obvious means of providing non-repudiation in a cryptography system

Digital signatures

Which of the following items are contained in a digital certificate

Validity period, public key

Which of the following generates the key pair used in asymmetric cryptography

CSP

Which of the following would you find on a CPS

A declaration of security that the organization is implementing for all certificates

Which of the following best describes the content of the CRL

A list of all revoked certificates

Certificate revocation should occur under all but which of the following conditions

The certificate owner has held the certificate beyond the established lifetime timer

Which of the following security measures encrypts the entire contents of a hard drive

Drive Lock

You want to protect data on hard drives for users with laptops. You want to drive to be encrypted, and you want to prevent the laptops from booting unless a special USB drive is inserted. In addition, the system should not boot if a change is detected in any of the boot files. What should you do

Implement BitLocker with a TPM

You want to implement BitLocker to encrypt data on a hard disk even if it is moved to another system. You want the system to boot automatically without providing a startup key on an external USB device. What should you do

Enable the TPM in the BIOS

Which of the following would require that a certificate be placed on the CRL

The private key is compromised.

Which of the following is the best countermeasure for man-in-the-middle attacks

Public Key Infrastructure (PKI)

What action is taken when the private key associated with a digital certificate becomes compromised

The certification is revoked and added to the Certificate Revocation List

When a sender encrypts a message using their own private key, what security service is being provided to the recipient

A private key has been stolen. What action should be taken to deal with this crisis

Add the digital certificate to the CRL

Mary wants to send a message to Sam. She wants to digitally sign the message to prove that she sent it. Which key would Mary use to create the digital signature

Mary's private key

Which of the following statements is true when comparing symmetric and asymmetric cryptography

Asymmetric key cryptography is used to distribute symmetric keys.

You have a Web server that will be used for secure transactions for customers who access the Web site over the Internet. The Web server requires a certificate to support SSL. Which method would you use to get a certificate for the server

Obtain a certificate from a public PKI

Mary wants to send a message to Sam so the only Sam can read it. Which key would be used to encrypt the message

Sam's public key

What is the main function of a TPM hardware chip

Generate and store cryptographic keys

Which of the following security solutions would prevent a user from reading a file which she did not create

EFS

Which of the following network layer protocols provides authentication and encryption services of IP based network traffic

IPSec

Which protocol is used for securely browsing a Web site

HTTPS

Which IPSec sub protocol provides data encryption

Encapsulating Security Payload (ESP)

You are purchasing a hard disk over the Internet from an online retailer. What does your browser use to ensure the other cannot see your credit card number on the Internet

SSL

Which of the following can be used to encrypt Web, e-mail, telnet, file transfer, and SNMP traffic

IPSec (Internet protocol security)

Which of the following technologies is based upon SSL (Secure Socket Layer)

TLS (Transport Layer Security)

Which of the following is the best countermeasure against man-in-the-middle attacks

You want to allow traveling users to connect to your private network through the Internet. Users will connect from various locations including airports, hotels, and public access points such as coffee shops and libraries. As such, you won't be able to configure the firewalls that might be controlling access to the Internet in these locations.

Which of the following protocols can be used to securely manage a network device from a remote connection?

SSH

Which standard is most widely used for certificates?

X.509

What's the primary function of the IKE protocol use with IPSec?

Create a security association between communicating partners

The session keys employed by SSL (Secure Socket Layer) are available in what bit lengths?

128 bit and 40 bit

Which of the following protocols can TLS for key exchange?

RSA, Diffie- Hellman

Telnet is inherently insecure its communications is in plain text and easily intercepted. Which of the following is an acceptable alternative to Telnet?

0