Knowledge Exam 8

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

A bank's payment machine has been completely replaced with better hardware and encryption protocols. The machine comes standard with AES, which provides faster and more secure transactions. What encryption standard may have been used in the previous payment machine model?

3DES

Which of the following best describes the term of key escrow?

A trusted third party with copies of decryption keys in addition to existing original keys

You need to encrypt the contents of a USB flash drive using the strongest possible encryption. Which type of encryption should you use?

AES

Which of the following is the strongest symmetric cryptographic function?

Advanced Encryption Standards

If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message?

Alice's public key

Which of the following statements about DES, RC4, Blowfish, or Twofish is false?

All are stream ciphers

You want email sent from users in your organization to be encrypted to make messages more secure. Which of the following is an option you can use in order to enhance the encryption of email messages?

An asymmetric key exchange

The security and software development team are working on a password storage application. It will store passwords as a secure hash. Which of the following will provide the best protection against brute force attacks? Two

BCRYPT / PBKDF2

What does an incremental backup do during the backup?

Backs up all files with the archive bit set; resets the archive bit.

You want a security solution that protects the entire hard drive and prevents access even if the drive is moved to another system. Which solution would you choose?

BitLocker

An organization needs to implement a large PKI. Network engineers are concerned that repeated transmission of the OCSP will impact network performance. Which of the following should the security analyst recommend in lieu of an OCSP?

CRL

Which of the following is used in conjunction with a local security Authority to generate the private and public key pair used in asymmetric cryptography?

CSP

Your company produces an encryption device that lets you enter text and receive encrypted text in response. An attacker obtains one of these devices and starts inputting random plain text to see the resulting cipher text. What type of attack is this?

Chosen plaintext

A hard drive contains sensitive data that the owner has recently applied restricted access as internal/official use only. Considering the different data classification levels, what is the appropriate level of data classification in this scenario?

Classified

To secure your server, you would like to ensure server hard disk data cannot be accessed if the hard disks are stolen. What should you do?

Configure TPM with PKI encryption keys

What is the primary function of the IKE protocol used with IPSec?

Create a security association between communicating partners

Which of the following is a technology that tries to detect and stop sensitive data breaches, or data leakage incidents, in an organization?

DLP

Which of the following relies on both a public and private key for encryption and decryption?

Diffie-Hellman

Which of the following is a term used that is not encrypted but is used only for comparison purposes?

Digest

A company network allows multiple computers to work together to solve compound transactions. A central processor divides the transactions and distributes it across nodes for action. If a node fails, the processor will no longer task it, but processing between the other nodes will continues. What does the company achieve with this setup?

Distributive allocation for high availability

Which of the following is a secure alternative to FTP that uses SSL for encryption?

FTPS

You have developed a PKI within your organization. To meet legal reporting requirements, you need to implement a way to provide decryption keys to a third party on an as needed basis. What should you do?

Implement a key escrow arrangement

User A wants to establish a secure connection with a web server. Transport encryption is used to ensure data is encrypted as it is sent over the network. This works when both client and server agree on a secret key. How is this secret key exchanged?

In band

An application's executable is digitally signed using a software developer's private key. What does this ensure?

Integrity

Developers are creating an encrypted service for a private company to secure video conference meetings. As developers are creating the code, they are thinking about reducing the processing overhead from end to end. Why is this process important to consider?

Low latency uses

Which of the following cryptography algorithms will produce a fixed length, irreversible output?

MD5

The CA signature exists in all digital certificates that it issues. Which key does the CA use to create a signature?

Private

An application is being designed to digitally sign files as it publishes them for distribution. What algorithm should be used for this purpose?

RSA

Which of the following is an entity that accepts and validates information contained within a request for a certificate?

Registration Authority

Which of the following is the most frequently used in symmetric key stream ciphers?

Ron's Cipher v4 (RC4)

Which of the following is designed to perform one way encryption?

SHA

Telnet is inherently insecure because its communication is in plain text and is easily intercepted. Which of the following is an acceptable alternative to Telnet?

SSH

Which of the following are symmetric keys to encrypt and decrypt information exchanged during the session and to verify its integrity?

Session keys

A major power incident has impacted a local transportation company and all systems have powered off. While the IT department is waiting for the power to be restored, they have been reviewing the situation and creating an order of restoration plan. Evaluate the following options and select the plan that would best follow standard guidelines.

Step 1. Enable and test power. Step 2. Enable and test critical network servers. Step 3. Enable and test infrastructure.

What form of cryptography would you use for bulk encryption because it is fast?

Symmetric key cryptography

Which of the following is considered the strongest cryptographic transport protocol?

TLS v1.2

Your colleagues report that there is a short time frame in which a revoked certificate can still be used. What is the reason for this?

The CRL is published periodically

Which action is taken when the private key associated with a digital certificate becomes compromised?

The certificate is revoked and added to the Certificate Revocation List

A receiver wants to verify the integrity of a message received from a sender. A hashing value is contained within a digital signature of the sender. Which of the following must the receiver use to access the hashing value and verify the integrity of the transmission?

The sender's public key

A digital certificate would associate which of the following?

The user's identity with his public key

In a Public Key Infrastructure (PKI), which option best describes how users and multiple Certificate Authorities (CAs) share information and exchange certificates?

Trust model

User A sends an encrypted email to User B and signed the email using RSA encryption. If User A uses a digital envelope, which key in this email process would most likely compromise confidentiality for both this and future emails?

User B's private Key


Kaugnay na mga set ng pag-aaral

Chapter 16 / Autonomic nervous system (A&PI)

View Set

Pulmonary/Respiratory Exam Med-Surg

View Set

9.8 - Exemptions from Registration

View Set

I am going to die bc of this class

View Set