Practice Exam 4 Flashcards

(25 cards)

1
Q

Which of the following answers refers to a legacy symmetric-key block cipher encryption algorithm?

A

Answer: DES (Data Encryption Standard)

Quick Explanation:
DES is an outdated symmetric encryption algorithm that uses a 56-bit key. It’s no longer considered secure due to its vulnerability to brute-force attacks.

Key Points:
Symmetric block cipher

56-bit key length

Now deprecated due to weak security

Replaced by AES for stronger encryption

Memory Tip:
“DES is Dead — too Easy to Smash.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the answers listed below refers to a deprecated stream cipher used in some legacy applications, such as WEP?

A

Answer: RC4 (Rivest Cipher 4)

Quick Explanation:
RC4 is a stream cipher that was widely used in protocols like WEP and TLS, but it’s now deprecated due to multiple vulnerabilities and weak security.

Key Points:
Stream cipher

Used in WEP, TLS, SSL

Fast, but insecure

Vulnerable to key reuse attacks

No longer recommended for secure communications

Memory Tip:
“RC4 ran fast but burned out — now it’s banned.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following answers refers to a deprecated (largely replaced by AES) symmetric-key block cipher encryption algorithm?

A

Answer: IDEA (International Data Encryption Algorithm)

Quick Explanation:
IDEA (International Data Encryption Algorithm) was a strong symmetric block cipher in the 1990s but has largely been replaced by AES due to efficiency, flexibility, and broader acceptance.

Key Points:
Symmetric block cipher

Operates on 64-bit blocks with 128-bit key

Strong in its time, but not widely used today

Replaced by AES in most modern systems

Considered obsolete for new implementations

Memory Tip:
“IDEA was good, AES is better — use the new standard.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the recommended replacement for DES?

A

Answer: AES (Advanced Encryption Standard)

Quick Explanation:
AES (Advanced Encryption Standard) is the modern, more secure replacement for DES (Data Encryption Standard), which is now considered weak due to its short key length.

Key Points:
DES uses a 56-bit key → vulnerable to brute-force attacks

AES supports 128, 192, and 256-bit keys → much stronger security

AES is faster, more efficient, and widely adopted

Approved by NIST as the encryption standard for U.S. federal systems

Memory Tip:
“When DES falls short, AES stands strong.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An IV is a random or pseudo random value used in cryptography to ensure that the same plaintext input does not produce the same ciphertext output, even when the same encryption key is used. The IV is typically used with encryption algorithms in block cipher modes to enhance security by introducing randomness to the encryption process.

A

Answer: True

Quick Explanation:
An Initialization Vector (IV) adds randomness to encryption to prevent patterns in the plaintext from showing up in the ciphertext, even with the same key.

Key Points:
Used with block ciphers (e.g., CBC mode)

Ensures unique ciphertexts from identical plaintexts

Does not need to be secret, but must be unique and unpredictable

Helps protect against replay and pattern attacks

Memory Tip:
“IV = Injects Variety” into encryption outcomes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the answers listed below refers to a logical operation commonly used in the context of cybersecurity, particularly in encryption and obfuscation techniques?

A

Answer: XOR (Exclusive OR)

Quick Explanation:
XOR (exclusive OR) is a logical operation that outputs true only when inputs differ. It’s widely used in cryptography for simple encryption, data obfuscation, and integrity checks.

Key Points:
XOR flips bits based on a key: A ⊕ B = C

Used in symmetric encryption (e.g., stream ciphers)

Reversible: applying XOR with the same key again returns original data

Efficient and fast for binary operations

Memory Tip:
“XOR: Encrypt once, decrypt by XORing again with the same key.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following answers refers to a block cipher mode that works by chaining the ciphertext blocks together, such that each ciphertext block depends on the previous block?

A

Answer: CBC (Cipher Block Chaining)

Quick Explanation:
CBC is a block cipher mode where each plaintext block is XORed with the previous ciphertext block before encryption, adding randomness and making patterns less predictable.

Key Points:
Requires an Initialization Vector (IV) for the first block

Each block’s encryption depends on the previous block’s output

Helps prevent patterns in encrypted data

Not ideal for parallel processing (encryption must be done sequentially)

Vulnerable to padding oracle attacks if not properly implemented

Memory Tip:
“CBC chains blocks — one depends on the next, like a chain link.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which block mode transforms a block cipher into a stream cipher enabling the encryption of individual bits or bytes of data?

A

Answer: CFB (Cipher Feedback)

CFB turns a block cipher into a stream cipher by feeding encrypted data back into the encryption process, allowing encryption of smaller units (bits or bytes) rather than full blocks.

Key Points:
Converts block cipher → stream-like behavior

Encrypts one byte/bit at a time

Uses an Initialization Vector (IV)

Each encrypted output is fed back into the next operation

Supports real-time encryption (e.g., secure live communications)

Memory Tip:
“CFB Feeds Back like a live stream.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A block cipher mode that combines a unique counter with encryption key to generate a stream of pseudo random data blocks which are then used for encrypting data is called:

A

Answer: CTM

Quick Explanation:
CTM (also known as CTR mode) uses a counter value + encryption key to produce a keystream that is XORed with the plaintext for encryption.

Key Points:
Also called CTR (Counter Mode)

Turns block cipher into stream cipher

Encrypts blocks in parallel (fast & efficient)

Uses a unique counter for each block

Offers high performance and random access decryption

Memory Tip:
🔢 “CTM = Counter Turns Mode into a stream cipher.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the block cipher modes listed below is the simplest/weakest and therefore not recommended for use?

A

Answer: ECB (Electronic Codebook)

Quick Explanation:
ECB encrypts each block of data independently using the same key, leading to identical ciphertext for identical plaintext blocks—making it easy to detect patterns.

Key Points:
No chaining or randomness

Same plaintext = same ciphertext

Easy to detect patterns

Weakest mode, not secure

Not recommended for modern use

Memory Tip:
“ECB = Easy Code Break.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which block cipher mode combines CTM for encryption with an authentication mechanism to ensure both data confidentiality and integrity?

A

Answer: GCM (Galois/Counter Mode)

Quick Explanation:
GCM uses Counter mode (CTM) for encryption and adds authentication (via Galois field multiplication) to ensure integrity and authenticity of the data.

Key Points:
Combines encryption + authentication

Based on Counter (CTR) mode

Provides confidentiality + integrity

Fast and secure for high-speed systems

Used in TLS, IPsec, SSH

Memory Tip:
“GCM Guards Confidentiality & Message integrity.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In cryptography, the number of bits in a key used by a cryptographic algorithm is referred to as key size or key length. The key length determines the maximum number of combinations required to break the encryption algorithm, therefore typically a longer key means stronger cryptographic security.

A

Answer: True

Quick Explanation:
Key length directly affects how secure encryption is. A longer key increases the number of possible combinations, making brute-force attacks much more difficult.

Key Points:
Key length = cryptographic strength

Measured in bits (e.g., 128-bit, 256-bit)

Longer keys = harder to crack

Not the only factor—algorithm strength also matters

Common key sizes: AES-128, AES-256, RSA-2048+

Memory Tip:
“More bits = more brute-force resistance.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which AES key length provides the highest level of security?

A

Answer: 256-bit key

Quick Explanation:
AES (Advanced Encryption Standard) supports three key lengths:

128-bit

192-bit

256-bit

Among these, 256-bit provides the strongest encryption and highest security level, though it may require more processing power.

Key Points:
AES-256 = strongest level of security

More bits = more resistance to brute-force attacks

Widely used in government, military, and financial sectors

Balance of performance vs. security should be considered

Memory Tip:
“AES-256 = Fort Knox of encryption.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following answers refers to an embedded microcontroller used for secure boot, disk encryption, and system integrity verification?

A

Answer: TPM

Quick Explanation:
TPM is a hardware-based security chip embedded on a computer’s motherboard. It stores and manages cryptographic keys securely and supports various security functions.

Key Functions:
Secure Boot: Verifies system integrity before booting.

Disk Encryption: Stores keys used by systems like BitLocker.

System Integrity: Detects tampering by storing trusted measurements.

Key Protection: Prevents unauthorized access to sensitive keys.

Memory Tip:
“TPM = Tiny chip, Powerful protection.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the answers listed below refers to a piece of hardware and associated software/firmware designed to provide cryptographic and key management functions?

A

Answer: HSM (Hardware Security Module)

Quick Explanation:
An HSM is a dedicated hardware device used to securely generate, store, and manage cryptographic keys and perform encryption/decryption operations.

Key Features:
Tamper-resistant design to protect keys from physical or logical attacks

High-speed cryptographic processing

Used in PKI, digital signatures, payment systems, and certificate authorities

Often used by organizations requiring strong compliance and security (e.g., banking, government)

Memory Tip:
“HSM = Hardware Safe for your Most sensitive keys.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following answers refers to a centralized server that is used to distribute cryptographic keys and authenticate users and services within a computer network?

A

Answer: KDC (Key Distribution Center)

Quick Explanation:
A KDC is a trusted server used in Kerberos authentication systems to issue session keys and authenticate users and services in a secure network.

Key Functions:
Authenticates users/services

Issues tickets (via Ticket Granting Ticket - TGT)

Helps establish secure communication without sharing passwords directly

Part of Kerberos protocol

Memory Tip:
“KDC = Key Dealer in the Center” — it controls who gets the keys in the network.

17
Q

In a Kerberos-protected network, this type of secure token is granted to users during their initial login to enable them access to multiple network services without the need to re-enter their login credentials.

A

Answer: TGT

Quick Explanation:
A TGT is a temporary authentication token issued by the Authentication Server (AS) within a Kerberos system after the user successfully logs in.

Key Points:
Issued at login after initial authentication

Used to request service tickets from the Ticket Granting Server (TGS)

Prevents the need to re-authenticate for every service

Time-limited for security

Memory Tip:
“TGT = Ticket to Get Tickets” — it’s your pass to access multiple services without logging in each time.

18
Q

In cryptography and security, the term “Secure enclave” typically refers to a protected and isolated hardware or software environment within a computing device, such as a smartphone, tablet, or computer, where sensitive data and cryptographic operations can be stored and processed securely.

A

Answer: True

Quick Explanation:
A secure enclave is a trusted execution environment (TEE) that provides hardware-level isolation for sensitive operations and data.

Key Points:
Used in devices like smartphones, tablets, and computers

Protects cryptographic keys, biometric data, PINs, etc.

Ensures data is inaccessible to the OS, apps, or malware

Examples: Apple Secure Enclave, Intel SGX, ARM TrustZone

Why It Matters:
Even if the main system is compromised, the secure enclave remains protected, making it vital for strong security.

19
Q

The term “Obfuscation” is used to describe techniques employed to obscure or hide the true meaning or nature of data, making it challenging for unauthorized parties to decipher or reverse-engineer the information.

A

Answer: True

Quick Explanation:
Obfuscation hides or disguises data/code to make it difficult to understand or reverse-engineer.

Key Points:
Used to protect code or data from attackers or unauthorized users

Common in software, malware, and data security

Techniques include renaming variables, encoding, encryption, or adding misleading code

Helps slow down attackers but is not a replacement for strong encryption

Why It Matters:
Obfuscation adds a layer of complexity to protect intellectual property and sensitive info from easy analysis.

20
Q

What is the purpose of steganography?

A

Answer: Hiding data within another piece of data

Quick Explanation:
Steganography conceals the existence of data by embedding it inside other harmless-looking data.

Key Points:
Used to hide secret info inside images, audio, video, or text

Differs from encryption: it hides data rather than just scrambling it

Goal: avoid detection by making hidden data invisible to casual observers

Common in covert communication and digital watermarking

Why It Matters:
Steganography helps transmit sensitive info without raising suspicion, adding a stealth layer to data protection.

21
Q

In the field of data security, the term “Tokenization” refers to the process of replacing sensitive data with nonsensitive information which holds a reference to the original data and enables its processing but has no value when breached.

A

Answer: True

Quick Explanation:
Tokenization replaces sensitive data with a non-sensitive token that references the original data but is useless if stolen.

Key Points:
Protects data by substituting it with tokens

Tokens represent the real data but can’t be reversed without the tokenization system

Commonly used in payment processing (e.g., credit card info)

Helps reduce risk and compliance scope (like PCI DSS)

Why It Matters:
Tokenization secures sensitive info by removing it from systems, so breaches expose only worthless tokens, not actual data.

22
Q

Replacing password characters in a password field with a series of asterisks is an example of:

A

Answer: Data Masking

Quick Explanation:
Data Masking hides sensitive data by replacing it with obscured characters (e.g., asterisks) to protect it from unauthorized viewing.

Key Points:
Used to hide actual data from users or interfaces

Common in password fields and screenshots

Helps prevent casual exposure of sensitive info

Different from encryption — data is obscured, not transformed securely

Why It Matters:
Data masking protects sensitive info during display or testing, reducing accidental exposure while keeping systems usable.

23
Q

A hash function is a mathematical algorithm that maps data of arbitrary size to a fixed-size hash value, typically represented as a short string of characters. The hash function result, also known as a digest or checksum, provides a unique representation of the original data input. The functionality of hash functions relies on the fact that if there is any change to the data after the original hash was generated, the new hash value calculated after content modification will be different from the original result because hash functions are designed to be sensitive to changes in the input data.

A

Answer: True

Quick Explanation:
A hash function creates a fixed-size unique fingerprint (hash/digest) from any input data. Even a small change in data changes the hash drastically.

Key Points:
Maps any size input to a fixed-length hash

Hash = digest/checksum representing original data

Sensitive to input changes: small data changes → different hash

Used for data integrity verification and digital signatures

Why It Matters:
Hashes ensure data hasn’t been tampered with by comparing hash values before and after transmission or storage.

24
Q

Hash functions find use in a variety of applications, including:

A

Answer: Cryptography, Data integrity verification, Password verification and storage, Digital signatures, and Blockchain technology.

Quick Explanation:
Hash functions are widely used in security and data verification processes to protect data and verify authenticity.

Key Points:
Cryptography: Building blocks for encryption and secure communication

Data integrity: Verify data hasn’t changed by comparing hash values

Password storage: Store hashed passwords instead of plaintext

Digital signatures: Validate authenticity and integrity of messages

Blockchain: Secure transaction records using hashing for tamper-proof chains

Why It Matters:
Hash functions help protect data confidentiality, ensure integrity, and enable secure authentication across many systems.

25
Which of the answers listed below refers to a cryptographic hash function that has been widely used in the past but is now considered deprecated for security-sensitive applications due to known vulnerabilities?
Answer: MD5 Quick Explanation: MD5 is an older hash function once popular but now deprecated due to weaknesses that allow collision attacks. Key Points: Widely used in the past for checksums and data integrity Now insecure because attackers can create different inputs with the same hash (collisions) Not recommended for security-sensitive uses like digital signatures or password hashing Replaced by stronger hashes such as SHA-256 Why It Matters: Using MD5 in security-critical systems risks data integrity and authentication failures because attackers can exploit its flaws.