Your copy is the same as the copy posted on the website.
Which of the following is the strongest hashing algorithm
SHA-1
Which of the following best describes high amplifications when applied to hashing algorithms
A small change in the message results in a big change in the hash value.
Which of the following is the weakest hashing algorithm
MD-5
When two different messages produce the same hash value, what has occurred
Collision
Hashing algorithms are used to perform what activity
Create a message digest
Your company system is a participant in an asymmetric cryptography system. You've crafted a message to be sent another user. Before transmission, you hash the message, then encrypt the hashing using your private key. You then attach this encrypted hash to your message as a digital signature before sending it to the other user. In this example, what protection does the hashing activity provide
Integrity
Which of the following is used to verify that a downloaded file has not been altered
Hash
By definition, which security concept uses the ability to prove that a sender sent an encrypted message
Non-repudiation
You create a new document and save it to a hard drive on a file server on your company's network. Then, you employ an encryption tool to encrypt the file using AES. This activity is an example of accomplishing what security goal
Confidentiality
By definition, which security concept ensures that only authorized parties can access data
What is the cryptography mechanism which hides secret communications within various forms of data
Steganography
Which of the following encryption methods combines a random value with the plaintext to produce the cipher text
One-time pad
By definition, which security concept uses the ability to prove that a sender sent an encrypted message?
Which of the following is not a valid example of steganography
Encrypting a data file with an encryption key
When a cryptographic system is used to protect confidentiality of data, what is actually protected
Unauthorized users are prevented from viewing or accessing the resource.
What form of cryptography is best suited for bulk encryption because it is so fast
Symmetric key cryptography
Which of the following is not true concerning symmetric key cryptography
Key management is easy when implemented on a large scale.
Which of the following algorithms are used in symmetric encryption (Select three.)
Blowfish, AES, 3DES
What type of key or keys are used in symmetric cryptography
A shared private key
Which of the following is the weakest symmetric encryption method
DES
You want to encrypt data on a removable storage device. Which encryption method would you choose to use the strongest method possible
AES
How many keys are used with symmetric key cryptography
One
Which of the following is used for secure exchange of symmetric encryption keys
Diffie-Hellaman
Which of the following algorithms are used in asymmetric encryption (Select two.)
Diffie-Hellman, RSA
Which of the following are characteristics of ECC (Select two.)
Asymmetric encryption, Uses a finite set of values within an algebraic field.
A receiver wants to verify the integrity of a message received from a sender. A hashing value is contained within the digital signature of the sender. What must the receiver use to access the hashing value to the verify the integrity of the transmission
Sender's public key
How many keys are used with asymmetric or public key cryptography
Two
Which of the following is the employment of two separate key pairs in order to separate the security functions of confidentiality and integrity in a communication system
Dual key pair
A PKI is a method for managing which type of encryption
Asymmetric
Which of the following protocols are most likely used with digital signatures (Select two.)
ECC, RSA
What is the purpose of key escrow
To provide a means to recover from a lost private key
Which of the following is an entity that accepts and validates information contained within a request for certificate
Registration authority
What is a PKI
A hierarchy of computers for issuing certificates
What is the most obvious means of providing non-repudiation in a cryptography system
Digital signatures
Which of the following items are contained in a digital certificate
Validity period, public key
Which of the following generates the key pair used in asymmetric cryptography
CSP
Which of the following would you find on a CPS
A declaration of security that the organization is implementing for all certificates
Which of the following best describes the content of the CRL
A list of all revoked certificates
Certificate revocation should occur under all but which of the following conditions
The certificate owner has held the certificate beyond the established lifetime timer
Which of the following security measures encrypts the entire contents of a hard drive
Drive Lock
You want to protect data on hard drives for users with laptops. You want to drive to be encrypted, and you want to prevent the laptops from booting unless a special USB drive is inserted. In addition, the system should not boot if a change is detected in any of the boot files. What should you do
Implement BitLocker with a TPM
You want to implement BitLocker to encrypt data on a hard disk even if it is moved to another system. You want the system to boot automatically without providing a startup key on an external USB device. What should you do
Enable the TPM in the BIOS
Which of the following would require that a certificate be placed on the CRL
The private key is compromised.
Which of the following is the best countermeasure for man-in-the-middle attacks
Public Key Infrastructure (PKI)
What action is taken when the private key associated with a digital certificate becomes compromised
The certification is revoked and added to the Certificate Revocation List
When a sender encrypts a message using their own private key, what security service is being provided to the recipient
A private key has been stolen. What action should be taken to deal with this crisis
Add the digital certificate to the CRL
Mary wants to send a message to Sam. She wants to digitally sign the message to prove that she sent it. Which key would Mary use to create the digital signature
Mary's private key
Which of the following statements is true when comparing symmetric and asymmetric cryptography
Asymmetric key cryptography is used to distribute symmetric keys.
You have a Web server that will be used for secure transactions for customers who access the Web site over the Internet. The Web server requires a certificate to support SSL. Which method would you use to get a certificate for the server
Obtain a certificate from a public PKI
Mary wants to send a message to Sam so the only Sam can read it. Which key would be used to encrypt the message
Sam's public key
What is the main function of a TPM hardware chip
Generate and store cryptographic keys
Which of the following security solutions would prevent a user from reading a file which she did not create
EFS
Which of the following network layer protocols provides authentication and encryption services of IP based network traffic
IPSec
Which protocol is used for securely browsing a Web site
HTTPS
Which IPSec sub protocol provides data encryption
Encapsulating Security Payload (ESP)
You are purchasing a hard disk over the Internet from an online retailer. What does your browser use to ensure the other cannot see your credit card number on the Internet
SSL
Which of the following can be used to encrypt Web, e-mail, telnet, file transfer, and SNMP traffic
IPSec (Internet protocol security)
Which of the following technologies is based upon SSL (Secure Socket Layer)
TLS (Transport Layer Security)
Which of the following is the best countermeasure against man-in-the-middle attacks
You want to allow traveling users to connect to your private network through the Internet. Users will connect from various locations including airports, hotels, and public access points such as coffee shops and libraries. As such, you won't be able to configure the firewalls that might be controlling access to the Internet in these locations.
Which of the following protocols can be used to securely manage a network device from a remote connection?
SSH
Which standard is most widely used for certificates?
X.509
What's the primary function of the IKE protocol use with IPSec?
Create a security association between communicating partners
The session keys employed by SSL (Secure Socket Layer) are available in what bit lengths?
128 bit and 40 bit
Which of the following protocols can TLS for key exchange?
RSA, Diffie- Hellman
Telnet is inherently insecure its communications is in plain text and easily intercepted. Which of the following is an acceptable alternative to Telnet?
0