Cryptography Flashcards

1
Q

Which of the following does not apply to a hashing algorithm?

One-way

Long key size

Variable-length input with fixed-length output

A

One-way

long key sizes are not applicable to hashing algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

During a training session, you want to impress upon users the serious nature of security and, in particular, cryptography. To accomplish this, you want to give them as much of an overview about the topic as possible. Which government agency should you mention is primarily responsible for establishing government standards involving cryptography for general-purpose government use?

NSA

NIST

IEEE

A

NSA

The National Security Administration is responsible for cryptography in the U.S. government, even though those standards by then become NIST standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You are responsible for e-commerce security at your company. You want to use the most widely implemented asymmetric algorithm available today. Which of the following is the most widely used asymmetric algorithm today?

RSA

AES

3DES

A

RSA

RSA is the most widely used asymmetric cipher today, though ECC is quickly becoming more widely used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You’re a member of a consortium wanting to create a new standard that will effectively end all spam. After years of meeting, the group has finally come across a solution and now wants to propose it. The process of proposing a new standard or method on the Internet is referred to by which acronym?

WBS

X.509

RFC

A

RFC

The Request for Comment is how you propose a new standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Mary claims that she didn’t make a phone call from her office to a competitor and tell them about developments at her company. Telephone logs, however, show that such a call was placed from her phone, and time clock records show that she was the only person working at the time. What do these records provide?

Confidentiality

Authentication

Nonrepudiation

A

Nonrepudiation

This is nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Mercury Technical Solutions has been using SSL in a business-to-business environment for a number of years. Despite the fact that there have been no compromises in security, the new IT manager wants to use stronger security than SSL can offer. Which of the following protocols is similar to SSL but offers the ability to use additional security protocols?

TLS

SSH

RSH

A

TLS

TLS is the replacement for SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

MAC is an acronym for what as it relates to cryptography?

Media access control

Mandatory access control

Message authentication code

A

Message authentication code

This is a Message Authentication Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You’ve been brought in as a security consultant for a small bicycle manufacturing firm. Immediately, you notice that they’re using a centralized key-generating process, and you make a note to dissuade them from that without delay. What problem is created by using a centralized key-generating process?

Network security

Key transmission

Certificate revocation

A

Key transmission

Key transmission is a concern

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You need to encrypt your hard drive. Which of the following is the best choice?

DES

RSA

AES

A

AES

For a hard drive, you want a symmetric cipher and AES is more secure than DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

As the head of IT for MTS, you’re explaining some security concerns to a junior administrator who has just been hired. You’re trying to emphasize the need to know what is important and what isn’t. Which of the following is not a consideration in key storage?

Environmental controls

Physical security

Hardened servers

A

Environmental controls

Environmental controls would be the least important issue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the primary organization for maintaining certificates called?

CA

RA

LRA

A

CA

This is a certificate authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Due to a breach, a certificate must be permanently revoked, and you don’t want it to ever be used again. What is often used to revoke a certificate?

CRA

CYA

CRL

A

CRL

A Certificate Revocation List should be used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which organization can be used to identify an individual for certificate issue in a PKI environment?

RA

LRA

PKE

A

RA

The Registration Authority identifies an individual for issuing a certificate by a Certificate Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Kristin from Payroll has left the office on maternity leave and won’t return for at least six weeks. You’ve been instructed to suspend her key. Which of the following statements is true?

In order to be used, suspended keys must be revoked.

Suspended keys don’t expire.

Suspended keys can be reactivated.

A

Suspended keys can be reactivated.

The key will have to be re-activated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What document describes how a CA issues certificates and for what they are used?

Certificate policies

Certificate practices

Revocation authority

A

Certificate policies

The certificate policy describes how a certificate can be used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Your company has implemented email encryption throughout the enterprise. You are concerned that someone might lose their cryptographic key. You want to implement some mechanism for storing copies of keys and recovering them. What should you implement?

Key escrow

Key archival

Key renewal

A

Key escrow

A key escrow should be used.

17
Q

The CRL takes time to be fully disseminated. Which protocol allows a certificate’s authenticity to be immediately verified?

CP

CRC

OCSP

A

OCSP

Online Certificate Status Protocol is done in real time

18
Q

John is concerned about message integrity. He wants to ensure that message integrity cannot be compromised no matter what the threat. What would best help him accomplish this goal?

SHA2

MD5

MAC

A

MAC

A message authentication code will reveal any tampering, accidental or intentional

19
Q

Which of the following is similar to Blowfish but works on 128-bit blocks?

Twofish

IDEA

CCITT

A

Twofish

20
Q

Your IT manager has stated that you need to select an appropriate tool for email encryption. Which of the following would be the best choice?

MD5

TLS

PGP

A

PGP

PGP is an excellent choice for email security