Additional Practice Flashcards
Which block cipher modes can be used to turn a block cipher into a stream cipher? Select two.
Electronic Code Book (ECB) mode
Propagating Cipher Block Chaining (PCBC) mode
Counter (CTR) mode
Output Feedback (OFB) mode
Counter (CTR) mode Output Feedback (OFB) mode
What are reasons certificates should have an expiration date? Select all that apply
Decreases attacker work factor
Decreases risk of compromise
To facilitate recovery from compromise
Creates forced opportunity for users to update certificate information
Decreases risk of compromise
To facilitate recovery from compromise
Creates forced opportunity for users to update certificate information
What phase of the certificate lifecycle does certificate expiration and certificate renewal reside in? Setup and Initialization Phase Administrative Phase Cancelation and History Phase Update and Patch Vulnerabilities Phase
Cancelation and History Phase
The basic premise of the birthday paradox involves knowing the number of people you would need in a room to have \_\_\_\_\_ of two people being born on the same month and day. a guarantee weak probability strong likelihood least chances
strong likelihood
The birthday paradox concept is employed in the birthday attack on hashes in effort to identify \_\_\_\_\_ of a given hash. the number of bits the number of bytes a collision a coefficient
a collision
In applying the birthday paradox, with a room containing 23 people, what is the likelihood two of those 23 people were born on the same month and day?
Guaranteed (100% likelihood)
Not likely (0% likelihood)
Fifty-fifty (50% likelihood)
Equal to the number of people (23% likelihood)
Fifty-fifty (50% likelihood)
What is the basic path for certificate requests from a user?
User Registration Authority Certificate Authority
User Certificate Authority Registration Authority
User Certificate Authority
User Subordinate Registration Authority
User Registration Authority Certificate Authority
Which National Security Agency (NSA) type is Skipjack classified as? Type 1 Type 2 Type 3 Type 4
Type 2
Which German Federal Office for Information Security (BSI) criteria for random number generators states it should be impossible for any attacker to calculate, or otherwise guess, from any given subsequence, any previous or future values in the sequence? K4 K3 K2 K1
K3
A \_\_\_\_\_\_\_\_\_ adds a key to a hash to improve integrity. Compliment Hash Message Authentication Code (HMAC) Crypto sync Hash Managed Algorithm (HMA)
Hash Message Authentication Code (HMAC)
Of the choices below, which entails an attacker discovering a functionally equivalent algorithm for encryption and decryption, but without learning the key in cryptanalysis? Total break Total Deduction Global Deduction Global break
Global Deduction
Of the choices below, select the ones that are prime numbers. Select Two 71 72 73 74
71
73
Of the choices below, select the ones that are included in an X.509 certificate. Version Certificate holder key pair Serial number Digital Signature of issuer
Version
Serial number
Digital Signature of issuer
Which class of digital certificate is issued to individual subscribers with primary intended use for email? Class 1 Class 2 Class 3 Class 4
Class 1
Which class of digital certificate is issued for online business transactions between companies? Class 1 Class 2 Class 3 Class 4
Class 4
From the list below, select the protocol pairs most closely associated with L2TP. PAP & POP CHAP & POP L2F & PPTP L3F & PAP
L2F & PPTP
Apply the following multi-alphabet substitution cipher to the below letter string to decrypt an important message from your course instructor.
Cipher: (-2-1+5)
Encoded Text: UUVA GJEVNGE
Answer: STAY FOCUSED
Apply the ROT13 cipher to the below letter string to decrypt it
Cipher: ROT13
Encoded text: NAQ LBH JVYY
Answer: AND YOU WILL
Apply the Atbash cipher to the below letter string
Cipher: Atbash
Encoded text: HFXXVVW
Answer: SUCCEED
Which German Federal Office for Information Security (BSI) criteria for random number generators states it should be impossible for an attacker to calculate, or guess from an inner state of the generator, any previous numbers in the sequence or any previous inner generator states? K4 K3 K2 K1
K4
What component within public key infrastructure acts as a proxy between a user and the certificate authority (CA) by performing authentication of a certificate received from the user before forwarding it to the actual CA? Verification Authority Revocation Authority Registration Authority Certification Authority
Registration Authority
Which National Security Agency cryptography suite is publicly available? Suite A Suite B Suite P Suite PA
Suite B
Of the following National Security Agency algorithm types, which is used for the highest security and classification applications? Type 1 Type 2 Type 3 Type 4
Type 1
The Skipjack algorithm is categorized as a Type \_\_\_\_\_\_\_ National Security Agency cryptographic algorithm. Type 1 Type 2 Type 3 Type 4
Type 2