Chapter 13

¡Supera tus tareas y exámenes ahora con Quizwiz!

Imagine that you are a hacker. Which would be most desirable when attempt-ing to compromise encrypted data? A.A weak key B.The algorithm used by the encryption protocol C.Captured traffic D.A block cipher

A A weak key

When encrypting credit card data, which would be the most secure algorithm with the least CPU utilization? A.AES B.3DES C.SHA-1 D.MD5

A AES

Which of the following is the weakest encryption type? A.DES B.RSA C.AES D.SHA

A DES

Your boss wants you to set up an authentication scheme in which employ-ees will use smart cards to log in to the company network. What kind of key should be used to accomplish this? A.Private key B.Public key C.Cipher key D.Shared key

A Private key

Give two examples of hardware devices that can store keys. (Select the two best answers.) A.Smart card B.Network adapter C.PCI Express card D.PCMCIA card

A Smart card D.PCMCIA card

Which type of encryption technology is used with the BitLocker application? A.Symmetric B.Asymmetric C.Hashing D.WPA2

A Symmetric

You need to encrypt and send a large amount of data, which of the following would be the best option? A.Symmetric encryption B.Hashing algorithm C.Asymmetric encryption D.PKI

A Symmetric encryption

What does steganography replace in graphic files? A.The least significant bit of each byte B.The most significant bit of each byte C.The least significant byte of each bit D.The most significant byte of each bit

A The least significant bit of each byte

Why would a hacker use steganography? A.To hide information B.For data integrity C.To encrypt information D.For wireless access

A To hide information

What type of attack sends two different messages using the same hash func-tion, which end up causing a collision? A.Birthday attack B.Bluesnarfing C.Man-in-the-middle attack D.Logic bomb

A. Birthday attack

Which of the following is not a valid cryptographic hash function? A. RC4 B. SHA-512 C. MD5 D. RIPEMD

A. RC4

Last week, one of the users in your organization encrypted a file with a private key. This week the user left the organization, and unfortunately the systems administrator deleted the user's account. What are the most probable out-comes of this situation? (Select the two best answers.) A.The data is not recoverable. B.The former user's account can be re-created to access the file. C.The file can be decrypted with a PKI. D.The data can be decrypted using the recovery agent. E.The data can be decrypted using the root user account.

A. The data is not recoverable. D. The data can be decrypted using the recovery agent.

Which of the following might a public key be used to accomplish? A.To decrypt the hash of a digital signature B.To encrypt web browser traffic C.To digitally sign a message D.To decrypt wireless messages

A. To decrypt the hash of a digital signature

Why would a hacker use steganography? A.To hide information B.For data integrity C.To encrypt information D.For wireless access

A. To hide information

The fundamental difference between symmetric key systems and asymmetric key systems is that the symmetric key system will: A.Use the same key on each end B.Use different keys on each end C.Use multiple keys for nonrepudiation purposes D.Use public key cryptography

A. Use the same key on each end

A hash algorithm has the capability to avoid the same output from two guessed inputs. What is this known as? A.Collision resistance B.Collision strength C.Collision cipher D.Collision metric

A.Collision resistance

Which of the following is not a symmetric key algorithm? A.RC4 B.ECC C.3DES D.Rijndael

B .ECC

Which of the following encryption algorithms is used to encrypt and decrypt data? A.SHA-1 B.RC5 C.MD5 D.NTLM

B RC5

Which of the following encryption methods deals with two distinct, large prime numbers and the inability to factor those prime numbers? A.SHA-1 B.RSA C.WPA D.Symmetric

B RSA

A network stream of data needs to be encrypted. Jason, a security administrator, selects a cipher that will encrypt 128 bits at a time before sending the data across the network. Which of the following has jason chosen? A. Stream cipher B. Block cipher C. Hashing algorithm D. RC4

B. Block cipher

You are tasked with selecting an asymmetric encryption method that allows for the same level of encryption strength, but with a lesser key length than is typically necessary. Which encryption method fulfills your requirement? A. RSA B. ECC C. DHE D. Twofish

B. ECC

An SHA algorithm will have how many bits? A.64 B.128 C.512 D.1,024

C 512

You are attempting to move data to a USB flash drive. Which of the following enables a rapid and secure connection? A.SHA-1 B.3DES C.AES256 D.MD5

C AES256

Which of the following is the proper order of functions for asymmetric keys? A.Decrypt, validate, and code and verify B.Sign, encrypt, decrypt, and verify C.Encrypt, sign, decrypt, and verify D.Decrypt, decipher, and code and encrypt

C Encrypt, sign, decrypt, and verify

You scan a computer for weak passwords and discover that you can figure out the password by cracking the first seven characters and then cracking the second part of the password separately. What type of hash is being used on the computer? A.MD5 B.SHA-1 C.LANMAN D.NTLMv2

C LANMAN

What is another term for secret key encryption? A. PKI B. Asymmetrical C. Symmetrical D. Public key

C Symmetrical

You are tasked with ensuring that messages being sent and received between two systems are both encrypted and authenticated. Which of the following protocols accomplishes this? A.Diffie-Hellman B.WDE C.RSA D.SHA-1

C. RSA

Of the following, which statement correctly describes the difference between a secure cipher and a secure hash? A.A hash produces a variable output for any input size; a cipher does not. B.A cipher produces the same size output for any input size; a hash does not. C.A hash can be reversed; a cipher cannot. D.A cipher can be reversed; a hash cannot.

D A cipher can be reversed; a hash cannot.

What does it mean if a hashing algorithm creates the same hash for two differ-ent downloads? A.A hash is not encrypted. B.A hashing chain has occurred. C.A one-way hash has occurred. D.A collision has occurred.

D A collision has occurred.

Which of the following methods will best verify that a download from the In-ternet has not been modified since the manufacturer released it? A.Compare the final LANMAN hash with the original. B.Download the patch file over an AES encrypted VPN connection. C.Download the patch file through an SSL connection. D.Compare the final MD5 hash with the original.

D Compare the final MD5 hash with the original.

Which of the following will provide an integrity check? A.Public key B.Private key C.WEP D.Hash

D Hash

Which of the following concepts does the Diffie-Hellman algorithm rely on? A.Usernames and passwords B.VPN tunneling C.Biometrics D.Key exchange

D Key exchange

The IT director wants you to use a cryptographic algorithm that cannot be decoded by being reversed. Which of the following would be the best option? A.Asymmetric B.Symmetric C.PKI D.One way function

D One way function

Which of the following is used by PGP to encrypt data. A.Asymmetric key distribution system B.Asymmetric scheme C.Symmetric key distribution system D.Symmetric scheme

D Symmetric scheme

WEP improperly uses an encryption protocol and because of this is considered to be insecure. What encryption protocol does it use? A.AES B.RSA C.RC6 D.RC4

D. RC4


Conjuntos de estudio relacionados

Genera; Psychology Chapter 8 Inquizitive

View Set

Health Assessment Chapter 23: Male Genitalia and Rectum

View Set