Practice Test: Module 06 Basic Cryptography
What is the attack by which attackers use strong algorithms and capture large sets of ciphertexts to analyze and then inject their own frames?
Ciphertext attack
In which attack does an attacker force the system to abandon the current higher-security mode of operation and instead "fall back" to implementing an older, less secure mode?
Downgrade attack
Which of the following encryption methods is external to the device and provides cryptographic services?
HSM
Ramesh is looking for an external device solution where software-based malware won't compromise data. Ramesh has shortlisted a device that meets the criteria and includes an onboard random number generator and key storage facility while backing up sensitive material in encrypted form. Which of the following has Ramesh selected for his solution?
Hardware security module (HSM)
Which method combines plaintext with a random key to produce the ciphertext?
OTP
Alice is looking for means of generating random public keys that are different for each session and ensuring that even if the secret key is compromised, it cannot reveal the contents of more than one message. Which of the following is the appropriate solution for Alice?
Perfect forward secrecy
John needs to identify public key systems that generate different, random public keys for each session and, even if a key gets stolen, should not reveal more than one message. Which public key system should John suggest?
Perfect forward secrecy
Mary deals with confidential data that needs to be communicated to clients. How should Mary ensure that confidential data is hidden within other data, the hidden data is difficult to identify, and the encrypted data is confidential?
Steganography
Which of the following processes can conceal a file, message, image, or a video within another file, message, image, or a video?
Steganography
Wilson is consulting with Abram to buy a new external storage device for Wilson's enterprise. Wilson gives Abram the following requirements for the device: Allows administrators to remotely prohibit accessing the data on a device if the user is not verified Locks the user out completely the next time the device connects Can instruct the drive to initiate a self-destruct sequence to destroy all data What should Abram suggest to Wilson?
USB device encryption