CASP Practice Test Flashcards
Which of the following is known as a ROT 3 cipher?
A. Caesar
B. Scytale
C. DES
D. AES
A. Caesar
Caesar cipher is an early form of encryption and is also known as a ROT3 cipher.
Which of the following is not one of the four common goals of cryptography?
A. Privacy
B. Authentication
C. Availability
D. Integrity
C. Availability
The four common goals of cryptography include privacy, authentication, integrity, and non-repudiation.
The act of obtaining plain text from cipher text without a cryptographic key is known as what?
A. Encryption
B. Cryptanalysis
C. Hashing
D. Integrity verification
B. Cryptanalysis
Cryptanalysis is the act of obtaining plain text from cipher text without a cryptographic key.
______ is a measure of the randomness of data collected by an application or even an operating system and used to create a cryptography key
A. Encryption
B. Hashing
C. Entropy
D. Confusion
C. Entropy
While key size is important, the randomness of the key is also critical. Entropy is a measure of the randomness of data collected by an application or even an operating system and used to create a cryptography key
Which of the following is not a symetric algrothim?
A. CAST
B. RC5
C. DES
D. RSA
D. RSA
Example of symmetric encryption techniques include CAST, DES, and RC5. RSA is a asymmetric algorithm
DES does how many rounds during the encryption process?
A. 2
B. 8
C. 16
D. 48
C. 16
DES does 16 rounds of substitution and transposition during the encryption process.
3DES does how many rounds during the encryption process?
A. 2
B. 8
C. 16
D. 48
D. 48
3DES does 48 rounds of substitution and transposition during the encryption process.
Which of the following makes use of a stream cipher process?
A. DES ECB
B. RC4
C. RC5
D. CAST
B. RC4
RC4 is considered a stream cipher whereas DES ECB, RC5, and RC6 are block ciphers.
SAFER uses ___ blocks of data?
A. 8
B. 32
C. 64
D. 256
C. 64
Secure and Fast Encryption Routine is a block-based cipher that processes data in blocks of 64 and 128 bits.
DES has an effective key length of?
A. 32
B. 56
C. 64
D. 256
B. 56
The DES key size is 56- bits, and DES has four primary modes of operation
Cisco first came up with which of the following remote access technology?
A. TACACS
B. RADIUS
C. Diameter
D. XTACACS
A. TACACS
Cisco has implemented a variety of remote access methods through its networking hardware and software. Originally, this was Terminal Access Controller Access Control System (TACACS).
These devices have the ability to perform deep packet inspection and look at requests and responses within the HTTP/HTTPS/SOAP/XML-RPC/Web Service layers.
A. Proxy
B. IDS
C. DMZ
D. WAF
D. WAF
A WAF is a firewall sitting between a web- client and a web server, analyzing OSI Layer-7 traffic.
What is another name for digital controllers?
A. SCADA
B. JK Flip/Flops
C. Cyber systems
D. NAC
A. SCADA
Yesterday’s analog controls have become today’s digital systems. These digital controls are known as Supervisory Control And Data Acquisition (SCADA) systems.
Which of the following doe VoIP not use?
A. IAX
B. H.121
C. SIP
D. RTP
B. H.121
VoIP makes use of protocols such as Session Initiation Protocol (SIP), H.323, Inter-Asterisk eXchange protocol (IAX), and Real-time Transport Protocol (RTP).
HTTP functions at which layer of the TCP model?
A. Application
B. Host-to-host
C. Internet
D. Data link
A. Application
HTTP, and other protocols like Telnet and SNMP, function at the application layer where they provide network services.
What TCP port does SMTP use?
A. 21
B. 23
C. 25
D. 80
C. 25
SMTP uses TCP port 25
What UDP port does TFTP use?
A. 21
B. 69
C. 25
D. 161
B. 69
UDP port 69 is used for TFTP
This protocol is no longer used in IPv6?
A. ICMP
B. TCP
C. ARP
D. DNS
C. ARP
Say goodbye to ARP. While ARP is an integral part of IPv4, it is not used with IPv6. IPV6 makes use of NDP, the neighbor discovery protocol (NDP).
An IPv4 header has a default length of _______________ .
A. 16 bytes
B. 8 bytes
C. 20 bytes
D. 40 bytes
C. 20 bytes
IPv4 has a 20 byte default header length and can be 60 bytes maximum with options.
An ICMP type 8 message is best defined as?
A. Unreachable
B. Ping
C. Redirect
D. Time exceeded
B. Ping
ICMP is used for logical errors and diagnostics. An ICMP type 8 is a ping request.
___________________ describes a cloud solution where you are buying infrastructure
A. IaaS
B. BasF
C. MaaS
D. SaaS
A. IaaS
This approach includes monitoring for networks, application, servers, applications, and remote systems .
A. IaaS
B. BasF
C. MaaS
D. SaaS
C. MaaS
Another name for a confused deputy attack is?
A. XSS
B. DoS
C. Session hijacking
D. Sniffing
A. XSS
This Cisco VLAN technology wraps the Ethernet frame, yet but it is not a standard used by all vendors.
A. ISL
B. QLAN
C. 802.1q
D. STP
A. ISL