Cryptography important info Flashcards

1
Q

Which encryption standard uses the same key to encrypt and decrypt messages?

Symmetric?
Asymmetric?
Rivest-Shamir-Adleman (RSA)?
Digital Signature Algorithm (DSA)?

A

Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which algorithm is designated as a Type 2 product by the National Security Agency (NSA)?

Data Encryption Standard (DES)
Secure hash algorithm (SHA)
Skipjack
PEGASUS

A

Skipjack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the most commonly used format for certificates?

X.509 v1
X.509 v3
Secure Hash Algorithm 1 (SHA-1)
Secure Hash Algorithm 2 (SHA-2)

A

X.509 v3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is referenced to determine if a certificate has been revoked?

Certificate revocation list (CRL)
Data Encryption Standard (DES)
Rivest-Shamir-Adleman (RSA)
Secure hash algorithm (SHA)

A

Certificate revocation list (CRL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What needs to be installed on end users’ computers to allow them to trust applications that have been digitally signed by the developer?

Sender’s public key
Sender’s private key
Administrator’s public key
Administrator’s private key

A

Sender’s public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which type of certificate must be certified by an authority to verify it with other participants?

Public
Root
Private
Domain

A

Public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an attribute of the Rivest Cipher 4 (RC4) algorithm?

It encrypts whole blocks of data at a time.
It is an asymmetric cipher.
Its keys are longer than the encrypted message.
It requires a unique nonce.

A

It requires a unique nonce.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which mode generates the key stream with a nonce and incrementing value?

Electronic codebook (ECB)
Cipher block chaining (CBC)
Output feedback (OFB)
Counter (CTR)

A

Counter (CTR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which mode is a stream algorithm that concatenates an incrementing value with a nonce?

Electronic codebook (ECB)
Cipher block chaining (CBC)
Output feedback (OFB)
Counter (CTR)

A

Counter (CTR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which key would an administrator use to encrypt data so only the CEO can decrypt it?

Administrator’s private key
Administrator’s public key
CEO’s private key
CEO’s public key

A

CEO’s public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the result of a hash function?

Digest
Signature
Ciphertext
Plaintext

A

Digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is used to efficiently encrypt large files?

Hash function
XML function
Asymmetric encryption
Symmetric encryption

A

Symmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An administrator needs to encrypt the following word with the Atbash cipher:

security

Which ciphertext is correct?

hvxfirgb
hemfirjc
hexfirgc
hyxfigrb

A

hvxfirgb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which cryptographic algorithm has a 128-bit hash size?

Secure Hash Algorithm 1 (SHA-1)
Message Digest Algorithm 5 (MD5)
Triple Data Encryption Standard (3DES)
Advanced Encryption Standard (AES)

A

Message Digest Algorithm 5 (MD5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which characteristic makes a hashing function suitable for use in signature schemes?

Varying operational modes
Use of bit-by-bit encryption
Use of unique key values
Collision resistance

A

Collision resistance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which attribute of a hashing function makes a birthday attack possible?

Man-in-the-middle detection
Partial-message collision
Brute-force protection
Plaintext

A

Partial-message collision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which hash algorithm produces a 160-bit output value?

SHA-1
MD5
SHA-2
Diffie-Hellman

A

SHA-1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does cipher block chaining (CBC) use with the key to encrypt subsequent blocks of plaintext?

Counter
Nonce
Previous generated ciphertext
Previous plaintext

A

Previous generated ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which mode produces the same ciphertext from two identical plaintext blocks?

A

Electronic codebook (ECB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which encryption mode is least secure?

Cipher block chaining (CBC)		
Cipher feedback (CFB)		
Electronic codebook (ECB)		
Output feedback (OFB)
A

Electronic codebook (ECB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the mathematical formula used for symmetric decryption?

P = E (K,C)		
C = E (K,P)		
E = C (K,P)		
K = C (P,E)
A

P = E (K,C)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which algorithm relies on factoring the product of large prime numbers?

Elliptical curve
ElGamal
Rivest–Shamir–Adleman
Diffie–Hellman

A

Rivest–Shamir–Adleman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which encryption technology is a serial combination of hashing, data compression, symmetric-key cryptography, and public key infrastructure (PKI) and can be used for encrypting texts, emails, files, and directories or for full disk encryption?

Pretty Good Privacy (PGP)
Wired Equivalent Privacy (WEP)
Diffie–Hellman (DH)
Rivest–Shamir–Adleman (RSA)

A

Pretty Good Privacy (PGP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which concept stipulates that algorithms should be openly shared and scrutinized, but keys must be absolutely secured?

Communication Theory of Secrecy Systems
Kerckhoffs’s principle
Feistel function
Mathematical Theory of Communication

A

Kerckhoffs’s principle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Which encryption process minimizes known plaintext attacks against Advanced Encryption Standard (AES)? Randomizing the initialization vector Using a hashing algorithm Increasing the block size Decreasing the block size
Randomizing the initialization vector
26
What prevents a rainbow table attack during the encryption process? Increasing key size Decreasing key size Stretching Salting
Salting
27
Which factor increases the required number of attempts in a brute-force attack?
Larger key size
28
What is a vulnerability of the Data Encryption Standard (DES)?
Key length is too short.
29
Which block size does the Advanced Encryption Standard (AES) use? 64 128 192 256
128
30
Which block algorithm includes a provision for the decryption key kept in a key escrow? Blowfish Serpent Skipjack Twofish
Skipjack
31
What is the result of A|B and B|C? B|A C|B A|C C|A
A|C
32
How is X mod N if N = PQ represented in number theory? (((( A- B)( Q − 1 mod Q))mod Q) Q+ B )mod P ( P mod X, Q mod X) (((( A+ B)( Q − 1 mod P))mod P) Q+ B )mod P ( X mod P, X mod Q)
( X mod P, X mod Q)
33
What is the outcome when using the binary AND function on 11011 and 10100? 01110 10000 11110 21111
10000
34
Which mode does the Fortuna algorithm use to generate random numbers? Electronic codebook (ECB) Cipher block chaining (CBC) Output feedback (OFB) Counter (CTR)
Counter (CTR)
35
What is a potential weakness of a pseudo-random number generator (PRNG)? Unknown internal state Different state used each time Random internal state Same state used more than once
Same state used more than once
36
Which key combination is used to decrypt and verify a digital signature? Recipient’s public key to decrypt and sender’s private key to verify the signature Recipient’s private key to decrypt and sender’s public key to verify the signature Sender’s public key to decrypt and recipient’s private key to verify the signature Sender’s private key to decrypt and recipient’s public key to verify the signature
Recipient’s private key to decrypt and sender’s public key to verify the signature
37
Which key is used to sign a message or a message digest? Recipient’s private key Recipient’s public key Sender’s private key Sender’s public key
Sender’s private key
38
Which key does the certificate authority (CA) use to digitally sign keys that it issues? Recipient’s private key Recipient’s public key Server’s private key Server’s public key
Server’s private key
39
What does an end user need to verify a Rivest–Shamir –Adleman (RSA) digitally signed message? Recipient’s private key Recipient’s public key Sender’s private key Sender’s public key
Sender’s public key
40
What is used when creating a digital signature, using public key infrastructure (PKI)? The digest as the key after hashing the message The private key of the person receiving the message The private key of the person creating the message The symmetric key known between the sender and receiver
The private key of the person creating the message
41
Which feature in Wired Equivalent Privacy (WEP) provides integrity control when sending packets over a wireless network? Nonce Network password Cyclic redundancy check Secret key
Cyclic redundancy check
42
Which feature of Wi-Fi Protected Access (WPA) increases the difficulty of attack? Temporal Key Integrity Protocol (TKIP) Pre-shared key (PSK) Extensible Authentication Protocol (EAP) Internet Key Exchange (IKE)
Temporal Key Integrity Protocol (TKIP)
43
Which two concerns does the use of Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) address? Choose 2 answers. ``` Confidentiality Nonrepudiation Availability Accountability Integrity ```
Confidentiality | Integrity
44
Which extension designates a file containing a password-protected private key? .cer .pem .p7b .p12
.p12
45
Which part of the public key infrastructure (PKI) defines how a credential is used? ``` Certificate authority (CA) Certificate policy (CP) Public Key Cryptography Standards (PKCS) Registration authority (RA) ```
Certificate policy (CP)
46
Which part of the public key infrastructure (PKI) is used to ensure that the format for a credential can be used by anyone on the internet? ``` Certificate authority (CA) Certificate policy (CP) Public Key Cryptography Standards (PKCS) Registration authority (RA) ```
Public Key Cryptography Standards (PKCS)
47
Which solution is used in a Layer 2 Tunneling Protocol (L2TP) virtual private network (VPN) to secure data in transmission? Cipher block chaining (CBC) Hypertext Transfer Protocol Secure (HTTPS) Microsoft Point-to-Point Encryption (MPPE) Internet Protocol Security (IPsec)
Internet Protocol Security (IPsec)
48
Which network-based virtual private network (VPN) prevents unauthorized logins by preventing packet retransmission? Point to Point Tunneling Protocol (PPTP) IP security (IPsec) Layer 2 Tunneling Protocol (L2PT) Transport Layer Security (TLS)
IP security (IPsec)
49
Which port does Secure Socket Tunneling Protocol (SSTP) use? 389 443 1701 1723
443
50
What is a common problem with using pre-shared keys (PSKs)? Key collision Secure key exchange Key generation Secure key escrow
Secure key exchange
51
What is a concern with storing long-term secrets on media or memory? Integrity Randomness Modularization Assertions
Integrity
52
Which cipher uses a series of ciphers based on a keyword? Affine Atbash Caesar Vigenère
Vigenère
53
Which substitution cipher system reverses the sequence of the alphabet? Atbash Caesar ROT13 Affine
Atbash
54
Which type of cipher converts a letter to a number, passes it through a mathematical function, and then converts it back to a letter? Atbash Caesar ROT13 Affine
Affine
55
Which technique solves polyalphabetic substitution ciphers by deducing the key length? Kasiski’s method Frequency analysis Exhaustive search Rainbow tables
Kasiski’s method
56
Which cryptanalysis technique examines ciphertext for recurring letter combinations? Rainbow table Dictionary attack Frequency analysis Exhaustive search
Frequency analysis
57
Which cryptanalysis method involves a person being tricked into encrypting a set of known messages? Ciphertext-only attack Chosen plaintext attack Frequency analysis Kasiski examination
Chosen plaintext attack
58
Which technique does related-key cryptanalysis use to decipher a message? Ciphertext messages are created from plaintext that is chosen by the analyst to determine how the algorithm works. Encrypted messages are gathered, and the analyst looks for patterns to figure out which algorithm is being used. Messages are encrypted using different secrets, and the analyst compares the messages to figure out how the algorithm works. Plaintext messages and corresponding ciphertext are gathered to help the analyst learn about the algorithm.
Messages are encrypted using different secrets, and the analyst compares the messages to figure out how the algorithm works.
59
Which type of cryptography is being used when the author uses secret inks? Cryptanalysis Steganography Digital encryption One-time pad
Steganography
60
What is the hidden message in a steganographic communication? Bit Carrier Channel Payload
Payload