Module 15 Flashcards

1
Q

To ensure secure communications across both the public and private infrastructure, the network
administrator’s first goal is to

A

secure the network
infrastructure, including routers, switches, servers, and hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

There are three primary objectives of securing
communications:

A
  • Authentication
  • Integrity
  • Confidentiality
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authentication

There are two primary methods for validating a source in network communications:

A

authentication services and
data nonrepudiation services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In network communications, authentication can be accomplished using

A

cryptographic methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

is a similar service that allows the sender of a message to be uniquely
identified.

A

Data nonrepudiation

With nonrepudiation services in place, a sender cannot deny having been the source
of that message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ensures that messages are not altered in transit. With___, the receiver can verify that the received message is identical to the sent message and that no manipulation occurred.

A

Data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ensures privacy so that only the receiver can read the message. This can be achieved through encryption.

A

Data confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

is the process of scrambling data so that it cannot
be easily read by unauthorized parties.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When enabling encryption, readable data is called ____ while the encrypted
version is called __.

A

readable data = plaintext, or cleartext,

encrypted version = encrypted text or ciphertext

The plaintext readable message is converted to
ciphertext, which is the unreadable, disguised message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

reverses the process of encryption

A

Decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A __ is required to encrypt and decrypt a message. The ___ is the link between the plaintext
and ciphertext.

A

key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Using a ____ is another way to ensure data confidentiality. A____ transforms
a string of characters into a usually shorter, fixed-length value or key that represents the
original string.

A

hash function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The difference between hashing and encryption is

A

in how the data is stored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The ___ was an electromechanical
encryption device that was developed and used by Nazi Germany during World War II. The device depended on the distribution of pre-shared keys that were used to encrypt and decrypt messages.

A

Enigma machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

depended on the distribution of pre-shared keys that were used to encrypt and decrypt messages.

A

Enigma machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In ____, no letters are replaced; they are simply rearranged.

A

transposition ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Another example of a transposition cipher is known as the ____. They are staggered, some in front, some in the middle and some in back, across several parallel lines.

A

rail fence cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Modern encryption block cipher algorithms, such as ____, still use transposition as part of the algorithm.

A

AES and the legacy 3DES,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

____ substitute one letter for another. In their simplest form, ____ retain the letter frequency of the original message.

A

Substitution ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The ____ is based
on the Caesar cipher, except
that it encrypts text by using a
different polyalphabetic key
shift for every plaintext letter.

The different key shift is
identified using a shared key
between sender and receiver.

A

Vigenère cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

__ was an AT&T Bell Labs engineer who, in 1917, invented, and later patented, the stream cipher. He also co-invented the one-time pad cipher.

A

Gilbert Vernam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Vernam proposed a teletype cipher in which a prepared key consisting of an arbitrarily long, non-repeating sequence of numbers was
kept on paper tape. It was then combined character by character with the plaintext message to produce the ciphertext.

To decipher the ciphertext, the same paper tape key was again combined character by character, producing the plaintext. Each tape was used only once; hence, the name one-time pad. Several difficulties are inherent in using onetime pads in the real world.

A

one-time pad ciphers

the stream cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

is the practice and study of determining the meaning of encrypted information
(cracking the code), without access to the shared secret key. This is also known as

A

Cryptanalysis or codebreaking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Throughout history, there have been many instances of cryptanalysis:

A
  • The Vigenère cipher had been absolutely secure until it was broken in the 19th century by English cryptographer Charles Babbage.
  • Mary, Queen of Scots, was plotting to overthrow Queen Elizabeth I from the throne and sent encrypted messages to her co-conspirators. The cracking of the code used in this plot led to the beheading of Mary in 1587.
  • The Enigma-encrypted communications were used by the Germans to navigate and direct their U-boats in the Atlantic. Polish and British cryptanalysts broke the German Enigma code. Winston Churchill was of the opinion that it was a turning point in WWII.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Methods of Cracking Code

Several methods are used in cryptanalysis:

A
  • Brute-force method
  • Ciphertext method
  • Known-Plaintext method
  • Chosen-Plaintext method
  • Chosen-Ciphertext method
  • Meet-in-the-Middle method
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
  • The attacker tries every possible key knowing that eventually one of them will work.
A
  • Brute-force method
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
  • The attacker has the ciphertext of several encrypted messages but no knowledge of the underlying plaintext.
A
  • Ciphertext method
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q
  • The attacker has access to the ciphertext of several messages and knows something about the plaintext underlying that ciphertext.
A
  • Known-Plaintext method
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
  • The attacker chooses which data the encryption device encrypts and observes the ciphertext output.
A
  • Chosen-Plaintext method
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q
  • The attacker can choose different ciphertext to be decrypted and has access to the decrypted plaintext.
A
  • Chosen-Ciphertext method
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q
  • The attacker knows a portion of the plaintext and the corresponding ciphertext.
A
  • Meet-in-the-Middle method
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A more scientific approach is to use the
fact that some characters in the English
alphabet are used more often than
others. This method is called

A

frequency
analysis.

33
Q

When choosing a cryptanalysis method,
consider the Caesar cipher encrypted
code. The best way to crack the code is
to use ____. Because there are
only 25 possible rotations, the effort is
relatively small to try all possible
rotations and see which one returns
something that makes sense.

A

brute force

34
Q

is the science of making and breaking
secret codes.

A

Cryptology

35
Q

cryptology combines two separate disciplines:

A

*Cryptography - the development and use
of codes

*Cryptanalysis - the breaking of those
codes

36
Q

is often used by governments in military and diplomatic surveillance, by enterprises in testing the strength of security procedures, and by malicious hackers in exploiting weaknesses
in websites.

A

Cryptanalysis

37
Q

are individuals who perform cryptanalysis to crack secret codes.

A

Cryptanalysts

38
Q

MD5 (legacy)
SHA

A

Integrity

H for hashing

39
Q

HMAC-MD5 (legacy)
HMAC-SHA-256
RSA and DSA

A

Authenticity

40
Q

3DES (legacy)
AES

A

Confidentiality

E for encrypting

41
Q

The three primary objectives of securing communications are

A

authentication, integrity, and confidentiality.

42
Q

Authentication may be secured by

A

HMAC.

43
Q

is ensured through the use of the SHA family of hash generating algorithms.

A

Integrity

44
Q

is ensured through symmetric encryption algorithms, such as AES, and
asymmetric algorithms, such RSA and PKI.

A

Data confidentiality

45
Q

proves that a message actually comes from a valid source.

A

Authentication

46
Q

is a similar service to authentication in that it allows the sender of a message to be uniquely identified.

A

Data nonrepudiation

47
Q

ensures that messages are not altered in transit.

A

Data integrity

48
Q

ensures privacy so that only the intended receiver can read the message.

A

Data confidentiality

49
Q

Three types of cipher are

A

transposition, substitution, and one-time pad

50
Q

is the practice and study of determining the meaning of encrypted information (cracking the code), without access to the shared secret key.

A

Cryptanalysis, or codebreaking,

51
Q

The objective of modern cryptographers is

A

to have a keyspace large enough that it takes too much time and money to accomplish a brute-force attack.

52
Q

is the science of making and breaking secret codes. It combines cryptography and
cryptanalysis.

A

Cryptology

53
Q

The choice of algorithm varies depending on the security requirements, the hardware resources
that are available for encryption and decryption, and the acceptance of the algorithm in the security community.

A

True

54
Q

With most modern algorithms, the security of encryption lies in the secrecy of the __ not the
algorithm.

A

keys

55
Q

Ensures privacy so that only the receiver can read the message.

A

confidentiality

56
Q

Ensures that messages are not altered in transit.

A

integrity

57
Q

Guarantees that a message comes from the source that it claims to come from.

A

authentication

58
Q

In banking, it can be achieved by requiring a secure personal identification number (PIN) at an ATM.

A

authentication

59
Q

Encryption and hashing are used to make certain that only authorized entities can read the message.

A

confidentiality

60
Q

A key is required to encrypt and decrypt a message.

A

confidentiality

61
Q

The receiver can verify that the received message is identical to the sent message and that no manipulation occurred.

A

integrity

62
Q

What is a cipher that replaces one letter for another, possibly retaining the letter frequency of the original message?

A

A substitution cipher replaces one letter for another, possibly retaining the letter frequency in the cleartext language.

63
Q

What is a method of cryptanalysis in which an attacker tries every possible key knowing that eventually one of them will work?

A

In a brute-force attempt to decipher a coded message, every possible value is attempted.

64
Q

What cipher method does 3DES use as part of the algorithm?

A

A transposition cipher is used in part by the legacy 3DES algorithm.

65
Q

What is the term for when a device cannot refute the validity of a message that it has received?

A

Nonrepudiation means that a device cannot refute the validity of a message sent.

66
Q

What is the practice and study of determining the meaning of encrypted information, without access to the shared secret key?

A

Cryptanalysis is the study of determining the meaning of coded messages without access to message key.

67
Q

Refer to the exhibit. Which type of cipher method is depicted?

A

transposition cipher

There are many cipher methods developed for message encryptions. In transposition ciphers, no letters are replaced; they are simply rearranged. An example of this type of cipher is known as the rail fence cipher. In this transposition, the words are spelled out as if they were a rail fence, meaning some are in front and some in back across several parallel lines.

68
Q

What are two objectives of ensuring data integrity? (Choose two.)

A

data is unaltered during transit

data is not changed by unauthorized entities

The objectives for data integrity include data not being altered during transit and not being changed by unauthorized entities. Authentication and encryption are methods to ensure confidentiality. Data being available all the time is the goal of availability.

69
Q

A network security specialist is tasked to implement a security measure that monitors the status of critical files in the data center and sends an immediate alert if any file is modified. Which aspect of secure communications is addressed by this security measure?

A

data integrity

Secure communications consists of four elements:
Data confidentiality - guarantees that only authorized users can read the message
Data integrity - guarantees that the message was not altered
Origin authentication - guarantees that the message is not a forgery and does actually come from whom it states
Data nonrepudiation – guarantees that the sender cannot repudiate, or refute, the validity of a message sent

70
Q

To answer the question, you do not need to consider the exhibit. The exhibit shows a lock with the word “PASSWORD” above a window that is on the front of the lock. Within the window the following information appears : ***8 OK.
Which type of attack allows an attacker to use a brute force approach?

A

password cracking

Common ways used to crack Wi-Fi passwords include social engineering, brute-force attacks, and network sniffing.

71
Q

Why would HMAC be used to help secure the data as it travels across various links?

A

it is a hashing algorithm used to guarantee that the message is not a forgery and actually comes from the authentic source

MD5 is a hashing algorithm that guarantees that no one intercepted the message and altered it. Advanced Encryption Standard (AES) is a popular symmetric encryption algorithm where each communicating party needs to know the pre-shared key. Public key infrastructure (PKI) is an asymmetric encryption algorithm based on the assumption that the two communicating parties have not previously shared a secret key. HMAC is a hash message authentication code that guarantees that the message is not a forgery and actually comes from the authentic source.

72
Q

What is the focus of cryptanalysis?

A

breaking encrypted codes

Cryptology is the science of making and breaking secret codes. There are two separate disciplines in cryptology, cryptography and cryptanalysis. Cryptography is the development and use of codes. Cryptanalysis is the breaking of those secret (encrypted) codes.

73
Q

What is cryptology?

A

the science of making and breaking secret codes

Cryptography is the science of creating transposition and substitution ciphers. Cryptanalysis is the science of cracking the code without access to the shared secret key. Cryptology is the science of making and breaking secret codes. Cryptology combines cryptography and cryptanalysis.

74
Q

Which objective of secure communications is achieved by encrypting data?

A

confidentiality

When data is encrypted, it is scrambled to keep the data private and confidential so that only authorized recipients can read the message. A hash function is another way of providing confidentiality.

75
Q

What is the purpose of a nonrepudiation service in secure communications?

A

to ensure that the source of the communications is confirmed

Nonrepudiation uses the unique characteristics of the sender of a message to confirm that the reputed sender is in fact the actual sender.

76
Q

A web server administrator is configuring access settings to require users to authenticate first before accessing certain web pages. Which requirement of information security is addressed through the configuration?

A

confidentiality

Confidentiality ensures that data is accessed only by authorized individuals. Authentication will help verify the identity of the individuals.

76
Q

What is an example of the transposition cipher?

A

rail fence

RC4 is an example of the one-time pad cipher, and it is widely used on the Internet. The Caesar cipher is a simple substitution cipher, and the Vigenère cipher is based on the Caesar cipher. An example of the transposition cipher is the rail fence cipher.​

77
Q

To answer the question, you do not need to consider the exhibit. The graphic displays a conveyor belt with items on it. The items include a combination of the characters 10100 going through a box and as they exit the box they are being modified into the characters %&@.
As data is being stored on a local hard disk, which method would secure the data from unauthorized access?

A

data encryption

Data encryption is the process of converting data into a form where only a trusted, authorized person with a secret key or password can decrypt the data and access the original form.