Security 6
Consider the ciphersuite: SSL_DHE_RSA_WITH_DES_CBC_SHA. The Hash Algorithm here is _______________ A). SDBM B). CRC32 C). SHA D). MD5
SHA
Of the following choices, what can you use to verify data integrity? A). AES (Advanced Encryption Standard) B). DES (Data Encryption Standard) C). RC4 (Rivest Cipher 4) D). SHA (Secure Hash Algorithm)
SHA (Secure Hash Algorithm)
A Collision problem is seen in which of the following hashing algorithms? A). AES B). SHA-256 C). SHA1 D). Blow fish
SHA1
What is the maximum length for MD5 input/output? A). None of these B). 23 characters C). 16 characters D). 24 Characters
none of these
WPA2 uses AES for data encryption. What level or strength encryption does it use? A). 128 bit and CRC B). 64 bit and CCMP C). 128 bit CCMP D). 128 bit and TKIP
128 bit CCMP
The hash value produced by MD5 is... A). None of these B). 64 bits C). 128 bits D). 160 bits
128 bits
What is the effective key size of DES? A). 56 bits B). 128 bits C). 256 bits D). 64 bits
56 bits
Choose all necessary technology for real WPA. A). 802.1X B). EAP C). TKIP D). WEP
802.1X; EAP; TKIP
Which of the following is true about asymmetric encryption? A). A message encrypted with the public key can be decrypted with the private key. B). A message encrypted with the private key can be decrypted by the same key. C). A message encrypted with the public key can be decrypted with a shared key. D). A message encrypted with a shared key, can be decrypted by the same key.
A message encrypted with the public key can be decrypted with the private key.
Which of these is an EAP type: A). All of these B). PEAP C). EAP-TLS D). EAP-FAST
All of these
Which of the following are symmetric algorithms? (name all that apply): A). Diffie-Hellman B). RSA C). Blowfish D). AES
Blowfish; AES
Which of these is responsible for issuing certificates? A). CRL B). CA C).OSCP D). All of these
CA
Which of these is used to issue and revoke certificates in a PKI? A). WPA B). CA C). RADIUS D). Diffie-Hellman
CA
Which of the following EAP variants is supported in current versions of Windows? (Select all that apply.) A). EAP-TLS B). EAP-MD5 C). PEAP D). None of these
EAP-TLS; PEAP
Which of these is an insecure block cipher? A). AES B). RC4 C). ECB D). MD5
ECB
Which of the following is true about SHA? A). Ensures integrity of the message B). It comprises a three way handshake C). It has the same properties as DES D). All of these
Ensures integrity of the message
True or false: A WPA2 pre-shared key must be between 8 and 48 printable ASCII characters.
False
Which hashing algorithm relies heavily on matching the receiver's hash calculation in relation to the modified messages? A). HMAC B). SHA-1 C). MD2 D). MD4
HMAC
Which of the following correctly describes steganography? Select all that apply. A). It is a type of security through obscurity. B). Steganography is a hashing technique C). Steganography is more secure than encryption. D). Media files are often used for steganography
It is a type of security through obscurity.; Media files are often used for steganography
Symmetric algorithms have drawbacks in these areas (Choose 2): A). Key Management B). Preserving Confidentiality C). Non-repudiation features D). Speed
Key Management ; Non-repudiation features
Which feature makes WPA easy to defeat? A). PSK B). WPS support C). TKIP support D). RC4 Support
PSK
How does EAP-FAST provide authentication? A). Protected Access Credentials (PAC) B). Generic Token Card (GTC) C). Protocol for Carrying Authentication for Network Access (PANA) D). LAN Manager
Protected Access Credentials (PAC)
In an asymmetric cryptosystem, the key primarily used for encrypting for the sake of confidentiality is __________ A). Public key B). Private key C). Symmetric key D). Lateral key
Public key
f the data is encrypted with the server's public key, it can be decrypted only by the: A). Client's public key B). Server's public key C). Client's private key D). Server's private key
Server's private key
Which encryption method is used when the sender and receiver use an instance of the same key for encryption and decryption purposes? A). Symmetric algorithm B). Asymmetric algorithm C). Block cipher D). Diffusion
Symmetric algorithm
Which of the following security encryption protocols was implemented to make WEP more secure? A). AES B). IPsec C). TKIP D). EAP-TLS
TKIP
What is the purpose of key stretching? A). To ensure keys are the proper length for their corresponding locks. B). To strengthen weak keys against brute force attacks C). To combat key shortening D). None of these
To strengthen weak keys against brute force attacks
True or False: Theoretically, it's possible to derive the private key from the public key
True
True or false. Asymmetric key systems use a public key and a private key.
True
True or false: 802.11i was implemented as WPA2.
True
True or false: WPA2 is a more secure improvement over WEP and WPA.
True
Which of the following statements is true about WPA and WPA2? A). WPA uses TKIP and WPA2 uses CCMP B). WPA uses AES and WPA2 use TKIP. C). Both WPA and WPA2 use TKIP. D). Both WPA and WPA2 use AES.
WPA uses TKIP and WPA2 uses CCMP
Key reinstallation attacks exploit design weaknesses in which type of network security protocol? A). Kerberos B). WEP C). TLS D). WPA2
WPA2
Which encryption method works on the basis of sender and receivers using different keys for encryption and decryption? A). Asymmetric B). Symmetric C). Blowfish D). IDEA
asymmetric
Which of the following indicates an asymmetric algorithm key? A). A public key/ private key combination is used for encryption and decryption B). One encryption/decryption key is shared between sender and recipient C). The algorithm is less complex and fast D). Uses bulk encryption
A public key/ private key combination is used for encryption and decryption
Tom wants to use WPA2 CCMP. In this case, which of these encryption methods is he using? A). AES B). DES C). 3DES D). RC4
AES
WPA2 uses ____ to encrypt the data payload. A). AES B). DES C). RC4 D). Caesar Cipher
AES
Which of the following is most recommended for encryption? A). MD5 B). 3DES C). AES D). SHA
AES
Which of the following is not a hashing algorithm? A). MD5 B). SHA C). RIPEMD D). AES
AES
The NIST developed federal government standards beginning in 1991 called digital signature standards. Of the DSS standards RSA and DSA are most commonly used. When two different messages are computed using the same algorithm and the same message digest value results, this is called what? A). CMAC B). Knapsack algorithm C). Collision D). One-way hatch
Collision
Hash functions with longer output are generally considered stronger. Why? A). They can accommodate longer input values. B). They can accommodate longer salt values. C). They take longer to generate. D). Collisions are less likely.
Collisions are less likely.
Which of the following EAP methods is one way authentication only? A). EAP-FAST B). EAP- TTLS C). EAP-TLS D). EAP-MD5
EAP-MD5
Which of these is not a valid EAP type? A). EAP-TTLS B). EAP-TLS C). EAP-PIM D). EAP-FAST
EAP-PIM
True or false: A WPA2-secured network does not have to worry about brute-force attacks if it uses a sufficiently long timeout for users that enter incorrect passwords.
False
True or false: In symmetric encryption, a secret private key is used to decrypt data, while public key is used to encrypt data
False
True or false: P7B is the certificate format used to export private keys.
False
Which of the following is the PRIMARY advantage of using symmetric key encryption systems compared to public key systems? A). Fast encryption B). Long keys C). Key management D). Implemented both in hardware and software
Fast encryption
What method is used to protect the integrity of a message? A). hashing B). symmetric encryption C). asymmetric encryption D). stream cipher
Hashing
Which of the following is security through obscurity? A). MAC address filtering B). Using WPA-PSK C). Hiding SSID broadcast D). Storing the router in an obscure physical location
Hiding SSID broadcast
In reviewing the key differences between symmetric and asymmetric systems, asymmetric systems would contain all of these attributes EXCEPT? A). Performed through out of band key exchange B). The public key is made available to everyone C). The algorithm is complex D). The algorithm is slower
Performed through out of band key exchange
Which encryption standard is used in WEP? A). AES B). RC5 C). MD5 D). RC4
RC4
Which of the following encryption standards does WEP use for confidentiality? A). AES B). RC4 C). 3DES D). RC5
RC4
Which of the following is not an example of hash function? A). RIPEMD B). RC4 C). SHA-256 D). MD4
RC4
Which of the following algorithms is found to be suitable for both digital signature and encryption? A). MD5 B). SHA-1 C). RSA D). AES
RSA
Which of the following is an asymmetric algorithm? A). AES B). SHA-1 C). Blowfish D). RSA
RSA
Which of these does not use symmetric encryption? A). RSA B). Twofish C). AES D). DES
RSA
Which of the following describes an asymmetric key algorithm? (select two) A). Requires two separate keys B). Does not require secure exchange of a secret key C). Encryption and decryption is performed using the same key D). Cannot be used to ensure non-repudiation
Requires two separate keys; Does not require secure exchange of a secret key