Mid1 Chap3 M82

Your page rank:

Total word count: 1796
Pages: 7

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

Which type of password attack employs a list of pre-defined passwords that it tries against a logon prompt or a local copy of a security accounts database?

Dictionary

Which of the ff. is a form of mathematical attack against the complexity of a cryptosystem’s algorithm?

Analytic Attack

What is the cryptography mechanism which hides secret communications within various forms of data?

Steganography

Which of the ff. encryption methods combines a random value with the plain text to produce the cipher text?

One-time pad

The Enigma machine, a cryptographic tool introduced in 1944 and used in WW2, encrypted messages by replacing characters for plain text. Which type of cipher does the Enigma machine use?

Substitution

Which of the ff. attacks will typically take the longest amount of time to complete?

Brute force attack

In which type of attack does the attacker have access to both the plain text and the resulting cipher text, but does not have the ability to encrypt the plain text?

Known plaintext

When an attacker decrypts an encoded message using a different key than was used during encryption, what type of attack has occurred?

Key clustering

In a cryptographic system, what properties should the initialization vector have? (Select two.)

Unpredictable, Large

Which type of cipher changes the position of the characters in a plain text message?

Transposition

Your company produces an encryption device that lets you enter text and receive encrypted text in response. An attacker obtains one of these devices and starts inputting random plain text to see the resulting cipher text. What type of attack is this?

Chosen plaintext

Which of the ff. password attacks adds appendages to known dictionary words?

Hybrid

Which form of cryptanalysis focuses on the weaknesses in the supporting computing platform as a means to exploit and defeat encryption?

Statistical attack

Why are brute force attacks always successful?

They test every possible valid combination

Which of the ff. best describes a side-channel attack?

The attack is based on information from the physical implementation of a cryptosystem.

Hashing algorithms are used to perform what activity?

Create a message digest

SHA-1 uses which of the ff. bit length hashing algorithms?

Only 160-bit

Which of the ff. does not or cannot produce a hash value of 128 bits?

SHA-1

You have just downloaded a file. You create a hash of the file and compare it to the hash posted on the Website. The two hashes match. What do you know about the file?

Your copy is the same as the copy posted on the website.

Which of the ff. is used to verify that a downloaded file has not been altered?

Hash

A birthday attack focuses on what?

Hashing algorithms

If a birthday attack is successful, meaning the attacker discovers a password that generates the same hash as that captured from a user’s logon credentials, which of the ff. is true? (Select two.)

A collision was discovered, The discovered password will allow the attacker to log on as the user, even if it is not the same as the user’s password.

If two different messages or files produce the same hashing digest, then a collision has occurred. What form of cryptographic attack exploits this condition?

Birthday attack

When two diff. messages produce the same hash value, what has occurred?

Collision

Which of the ff. is the weakest hashing algorithm?

MD5

Which of the ff. is the strongest hashing algorithm?

SHA-1

Which of the ff. best describes high amplification when applied to hashing algorithms?

A small change in the message results in a big change in the hash value.

Which version of Rivest Cipher is a block cipher that supports variable bit length keys and variable bit block sizes?

RC5

What types of key or keys are used in symmetric cryptography?

A shared private key

Which of the ff. encryption mechanism offers the least security because of weak keys?

DES

Which of the ff. symmetric cryptography systems can have a key size of 0 bits?

RC5

Which of the ff. symmetric block ciphers does not use a variable block length?

IDEA (International Data Encryption Algorithm)

Which of the ff. is not true concerning symmetric key cryptography?

Key management is easy when implemented on a large scale.

You want to encrypt data on a removable storage device. Which encryption method would you choose to use the strongest method possible?

AES

Which of the ff. are true concerning the Advanced Encryption Standard (AES) symmetric block cipher? (Select two.)

AES uses a variable-length block and key length (128-, 192-, or 256-bit keys)., AES uses the Rijndael block cipher.

What form of cryptography is best suited for bulk encryption because it is so fast?

Symmetric key cryptography

Bob Jones used the RC5 cryptosystem to encrypt a sensitive and confidential file on his notebook. He used 32 bit blocks, a 64 bit key, and he only used the selected key once. He moved the key onto a USB hard drive which was stored in a safe deposit box. Bob’s notebook was stolen. Within a few days Bob discovered the contents of his encrypted file on the Internet. What is the primary reason why Bob’s file was opened so quickly?

Weak key

Which of the ff. algorithms are used in symmetric encryption? (Select Three.)

AES, Blowfish, 3DES

When protection of the content of a message is required, which of the ff. cryptography solutions should be employed?

Symmetric encryption

How many keys are used with symmetric key cryptography?

One

Which of the ff. are true of Triple DES (3DES)? (Select two.)

Uses a 168-bit key, Is used in IPSec

Which of the ff. forms of cryptography is best implemented in hardware?

Symmetric steam

How many keys are used with asymmetric or public key cryptography?

Two

Mary wants to send a message to Sam. She wants to digitally sign the message to prove that she sent it. Which key would Mary use to recreate the digital signature?

Mary’s private key

Mary wants to send a message to Sam so that only Sam can read it. Which key would be used to encrypt the message?

Sam’s public key

A receiver wants to verify the integrity of a message received from a sender. A hashing value is contained within the digital signature of the sender. What must the receiver use to access the hashing value to verify the integrity of the transmission?

Sender’s public key

The strength of a cryptosystem is dependent upon which of the ff.?

Secrecy of the key

Which of the ff. are characteristics of ECC? (Select two.)

Uses a finite set of value within an algebraic field, Asymmetric encryption

Which of the ff. algorithms are used in asymmetric encryption? (Select two.)

RSA, Diffie-Hellman

Which of the ff. generates the key pair used in asymmetric cryptography?

CSP

Above all else, what must be protected to maintain the security and benefit of an asymmetric cryptographic solution, especially if it is widely used for digital certificates?

Private keys

Which form of asymmetric cryptography is based upon Diffie-Hellman?

El Gamal

Which cryptography system generates encryption keys that could be used with DES, AES, IDEA, RC5 or any other symmetric cryptography solution?

Diffie- Hellman

Which of the ff. conditions does "not" result in a certificate being added to the certificate revocation list?

Certificate expiration

You have lost the private key that you have used to encrypt files. You need to get a copy of the private key to open some encrypted files. Who should you contact?

Recovery agent

You have a Web server that will be used for secure transactions for customers who access the Web site over the Internet. The Web server requires a certificate to support SSL. Which method would you use to get a certificate for the server?

Obtain a certificate from a public PKI.

What technology was developed to help improve the efficiency and reliability of checking the validity status of certificates in large complex environments?

Online Certificate Status Protocol

Which of the ff. items are contained in a digital certificate? (Select two.)

Public Key, Validity period

What is the purpose of key escrow?

To provide a means to recover from a lost private key

Which of the ff. is an entity that accepts and validates information contained within a request for a certificate?

Registration authority

Which aspect of certificates makes them a reliable and useful mechanism for providing the identity of a person, system, or service on the Internet?

Trusted third-party

How many keys are used with Public Key Cryptography?

Two

In what form of key management solution is key recovery possible?

Centralized

What is a PKI?

A hierarchy of computers for issuing certificates

To obtain a digital certificate and participate in a Public Key Infrastructure (PKI), what must be submitted and where should it be submitted?

Identifying data and a certification request to the registration authority (RA)

Which of the ff. would you find on a CPS?

A declaration of the security that the organization is implementing for all certificates

A PKI is a method for managing which type of encryption?

Asymmetric

When is the best time to apply for a certificate renewal?

Near the end of the certificate’s valid lifetime

Which of the ff. statements is "true" when comparing symmetric and asymmetric cryptography?

Asymmetric key cryptography is used to distribute symmetric keys.

Which public key encryption system does PGP (Pretty Good Privacy) use for key exchange signatures?

RSA

Which of the ff. communication encryption mechanisms has a specific version for wireless communications?

TLS (Transport Layer Security)

Which security mechanism can be used to harden or protect e-commerce traffic from Web servers?

SSL

HTTPS (Hypertext Transfer Protocol over Secure Socket Layer) can be used to provide security for what type of traffic?

Web

The PGP or Pretty Good Privacy encryption utility relies upon what algorithms? (Select two.)

IDEA, 3DES

What form of cryptography is scalable for use in very large and ever-expanding environments where data is frequently exchanged between different communication partners?

Asymmetric cryptography

Which of the ff. is a direct protection of integrity?

Digital Signature

Which of the ff. is "not" true regarding to S/MIME?

Uses IDEA encryption

What form of cryptography is "not" scalable as a stand-alone system for use in very large and ever expanding environments where data is frequently exchanged between different communication partners?

Symmetric cryptography

What is the primary use of Secure Electronic Transaction (SET)?

Protect credit card information transmissions

Secure Multi-Purpose Internet Mail Extensions (S/MIME) is used primarily to protect what?

E-mail attachments

Which of the ff. can be used to encrypt Web, e-mail, telnet, file transfer, and SNMP traffic?

IPSec (Internet Protocol Security)

What is the main function of a TPM hardware chip?

Generate and store cryptographic keys

Which of the ff. technologies is based upon SSL (Secure Sockets Layer)?

TLS (Transport Layer Security)

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending