Security Ch9

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Could cause personal hardship or embarrassment. *Medium* Could cause personal embarrassment or inconvenience. *Low* Could cause loss of life or social hardship. *High* Could cause operational harm such as loss of control or loss of public trust. *High* Could cause operational harm such as loss of confidence or damage to reputation. *Medium*

Many organizations use the Information Security Classification Framework, which uses the following classification -High -Medium -Low Drag the sensitivity classification on the left to the appropriate description on the right. (Classifications may be used once, more than once, or not at all.)

Sam's public key

Mary wants to send a message to Sam so that only Sam can read it. Which key would be used to encrypt the message?

Mary's private key

Mary wants to send a message to Sam. She wants to digitally sign the message to prove that she sent it. Which key would Mary use to create the digital signature?

Implements the Diffie-Hellman key exchange protocol using elliptic curve cryptography *ECDH* Exist only for the lifetime of a specific communication session *Ephemeral keys* Uses no deterministic algorithm when generating public keys *Perfect forward secrecy* Can be reused by multiple communication sessions *Static keys*

Match each public key cryptography key management mechanism on the left with the corresponding description on the right. Each mechanism may be used once, more than once, or not at all.

The sender's key is sent to a recipient using a Diffie-Hellman key exchange. *In-band distribution* The sender's key is copied to a USB drive and handed to the recipient. *Out-of-band distribution* The sender's key is sent to the recipient using public key cryptography. *In-band distribution* The sender's key is burned to a CD and handed to the recipient. *Out-of-band distribution*

Match the symmetric key distribution mechanism on the left with the appropriate description on the right. Each distribution mechanism may be used once, more than once, or not at all.

Only 160-bit

SHA-1 uses which of the following bit length hashing algorithms?

The certificate owner has held the certificate beyond the established lifetime timer

Certificate revocation should occur under all but which of the following conditions?

Generates two different yet mathematically related keys. *Asymmetric* Only the private key can be used to decrypt information. *Asymmetric* Generates a single key that is used for both encryption and decryption. *Symmetric* Algorithm used for signature verification and data integrity checking. *Hashing* The public key can only be used to encrypt information. *Asymmetric*

Drag the cryptographic algorithm on the left to the appropriate explanation on the right. (Each algorithm may be used once, more than once, or not at all.)

Create a message digest

Hashing algorithms are used to perform what activity?

Two

How many keys are used with Public Key cryptography?

Two

How many keys are used with asymmetric (public key) cryptography?

One

How many keys are used with symmetric key cryptography?

AH ESP

IPsec is implemented through two separate protocols. What are these protocols called? (Select two.)

The discovered password will allow the attacker to log in as the user, even if the discovered password is not the same as the user's password. A collision was discovered.

If a birthday attack is successful, meaning the attacker discovers a password that generates the same hash as that captured from a user's login credentials, which of the following is true? (Select two.)

Symmetric

If a message sender encrypts a message with a key and a message receiver decrypts it using the same key, which type of key exchange is taking place?

Birthday attack

If two different messages or files produce the same hashing digest, then a collision has occurred. Which form of cryptographic attack exploits this condition?

Personally identifiable information

If you lose your wallet or purse and it ends up in the wrong hands, several pieces of information could be used to do personal harm to you. These pieces of information include the following: Name and address Driver license number Credit card numbers Date of birth Which of the following classifications does this information fall into?

Known plaintext

In which type of attack does the attacker have access to both the plaintext and the resulting cipher text, but does not have the ability to encrypt the plain text?

The lowest level of classified information used by the military. Release of this information could cause damage to military efforts. *Confidential* If this information is released, it poses grave consequences to national security. *Top secret* This information can be accessed by the public and poses no security threat. *Unclassified* If this information is disclosed, it could cause some harm, but not a national disaster. *Sensitive but unclassified* If this information is disclosed, it could cause severe and permanent damage to military actions. *Secret*

The government and military use the following information classification system: -Unclassified -Sensitive but unclassified -Confidential -Secret -Top secret Drag the classification on the left to the appropriate description on the right.

The secrecy of the key

The success of asymmetric encryption is dependent upon which of the following?

Identifying data and a certification request to the registration authority (RA)

To obtain a digital certificate and participate in a Public Key Infrastructure (PKI), what must be submitted and where?

Symmetric key cryptography

What form of cryptography is best suited for bulk encryption because it is so fast?

A hierarchy of computers for issuing certificates.

What is a PKI?

Generate and store cryptographic keys

What is the main function of a TPM hardware chip?

Digital signatures

What is the most obvious means of providing non-repudiation in a cryptography system?

Create a security association between communicating partners.

What is the primary function of the IKE protocol used with IPsec?

A shared private key

What type of key or keys are used in symmetric cryptography?

Non-repudiation

When a sender encrypts a message using their own private key, what security service is being provided to the recipient?

Key clustering

When an attacker decrypts an encoded message using a different key than was used during encryption, what type of attack has occurred?

Near the end of the certificate's valid lifetime

When is the best time to apply for a certificate renewal?

Collision

When two different messages produce the same hash value, what has occurred?

Damage the hard disks so badly that all data remanence is gone.

When you dispose of a computer or sell used hardware and it is crucial that none of the data on the hard disks can be recovered. Which of the following actions can you take to ensure that no data is recoverable?

The certificate is revoked and added to the Certificate Revocation List.

Which action is taken when the private key associated with a digital certificate becomes compromised?

It is a trusted third-party.

Which aspect of a certificate makes it a reliable and useful mechanism for proving the identity of a person, system, or service on the internet?

Diffie-Hellman

Which cryptography system generates encryption keys that could be used with DES, AES, IDEA, RC5, or any other symmetric cryptography solution?

El Gamal

Which form of asymmetric cryptography is based upon Diffie-Hellman?

Implementation attack

Which form of cryptanalysis focuses on weaknesses in software, the protocol, or the encryption algorithm?

Asymmetric encryption Uses a finite set of values within an algebraic field

Which of the follow are characteristics of ECC? (Select two.)

Diffie-Hellman RSA

Which of the following algorithms are used in asymmetric encryption? (Select two.)

Is used in IPsec Uses a 168-bit key

Which of the following are true of Triple DES (3 DES)? (Select two.)

Brute force attack

Which of the following attacks typically takes the longest amount of time to complete?

The attack is based on information gained from the physical implementation of a cryptosystem.

Which of the following best describes a side-channel attack?

A small change in the message results in a big change in the hash value.

Which of the following best describes high amplification when applied to hashing algorithms?

RC4

Which of the following can be classified as a stream cipher?

Certificate expiration

Which of the following conditions does not result in a certificate being added to the certificate revocation list?

Pulverizing

Which of the following data destruction techniques uses a punch press or hammer system to crush a hard disk?

SHA-1

Which of the following does not or cannot produce a hash value of 128 bits?

DES

Which of the following encryption mechanisms offers the least security because of weak keys?

Symmetric stream

Which of the following forms of cryptography is best implemented in hardware?

Create a hash of system components

Which of the following functions are performed by the TPM?

HIPAA

Which of the following government acts protects medical records and personal health information?

Digital signature

Which of the following is a direct protection of integrity?

Analytic attack

Which of the following is a mathematical attack that targets the complexity of a cryptosystem's algorithm?

FTPS

Which of the following is a secure alternative to FTP that uses SSL for encryption?

Registration authority

Which of the following is an entity that accepts and validates information contained within a request for a certificate?

Exploiting a computer's inability to produce random numbers

Which of the following is an example of a statistical attack against a cryptosystem?

Copying the key to a USB drive

Which of the following is considered an out-of-band distribution method for private key encryption?

Using short passwords

Which of the following is not a countermeasure against dictionary attacks?

Ron's Cipher v4 (RC4)

Which of the following is the most frequently used symmetric key stream cipher?

SHA-1

Which of the following is the strongest hashing algorithm?

MD5

Which of the following is the weakest hashing algorithm?

DES

Which of the following is the weakest symmetric encryption method?

CSP

Which of the following is used in conjunction with a local security authority to generate the private and public key pair used in asymmetric cryptography?

Hash

Which of the following is used to verify that a downloaded file has not been altered?

Public key Validity period

Which of the following items are contained in a digital certificate? (Select two.)

IPsec

Which of the following network layer protocols provides authentication and encryption services for IP-based network traffic?

Hybrid

Which of the following password attacks adds appendages to known dictionary words?

SSL TLS

Which of the following protocols are often added to other protocols to provide secure transmission of data? (Select two.)

Diffie-Hellman RSA

Which of the following protocols can TLS use for key exchange? (Select two.)

HTTPS

Which of the following protocols uses port 443?

DriveLock

Which of the following security measures encrypts the entire contents of a hard drive?

EFS

Which of the following security solutions would prevent a user from reading a file that she did not create?

Asymmetric key cryptography is used to distribute symmetric keys.

Which of the following statements is true when comparing symmetric and asymmetric cryptography?

International Data Encryption Algorithm (IDEA)

Which of the following symmetric block ciphers does not use a variable block length?

IDEA

Which of the following symmetric cryptography systems does not support a variable block size?

SSH Telnet

Which of the following tools allow for remote management of servers? (Select two.)

X.509

Which standard is most widely used for certificates?

Online Certificate Status Protocol

Which technology was developed to help improve the efficiency and reliability of checking the validity status of certificates in large, complex environments?

Dictionary

Which type of password attack employs a list of pre-defined passwords that it tries against a login prompt or a local copy of a security accounts database?

RC5

Which version of the Rivest cipher is a block cipher that supports variable bit length keys and variable bit block sizes?

They test every possible valid combination.

Why are brute force attacks always successful?

SSL

You are purchasing a hard disk from an online retailer over the internet. What does your browser use to ensure that others cannot see your credit card number on the internet?

Confidentiality

You create a new document and save it to a hard drive on a file server on your company's network. Then you employ an encryption tool to encrypt the file using AES. This activity is an example of accomplishing which security goal?

Your copy is the same as the copy posted on the website.

You have just downloaded a file. You create a hash of the file and compare it to the hash posted on the website. The two hashes match. What do you know about the file?

Recovery agent

You have lost the private key that you have used to encrypt files. You need to get a copy of the private key to open some encrypted files. Who should you contact?

BitLocker

You want a security solution that protects the entire hard drive and prevents access even if the drive is moved to another system. Which solution should you choose?

A cryptographic service provider

You want email sent from users in your organization to be encrypted to make messages more secure. Which of the following is an option you can use to enhance the encryption of email messages?

AES

You want to encrypt data on a removable storage device. Which encryption method would you choose to use the strongest method possible?

Implement BitLocker with a TPM

You want to protect data on hard drives for users with laptops. You want the drive to be encrypted, and you want to prevent the laptops from booting unless a special USB drive is inserted. In addition, the system should not boot if a change is detected in any of the boot files. What should you do?

Enable the TPM in the BIOS

You would like to implement BitLocker to encrypt data on a hard disk, even if it is moved to another system. You want the system to boot automatically without providing a startup key on an external USB device. What should you do?

C: volume Master boot record

You've used BitLocker to implement full volume encryption on a notebook system. The notebook motherboard does not have a TPM chip, so you've used an external USB flash drive to store the BitLocker startup key. Which system components are encrypted in this scenario? (Select two.)

If the C:\Secrets\confidential.docx file is copied to an external USB flash drive, it will be saved in an unencrypted state. By default, only the user who encrypted the C:\Secrets\confidential.docx file will be able to open it.

You've used BitLocker to implement full volume encryption on a notebook system. The notebook motherboard does not have a TPM chip, so you've used an external USB flash drive to store the BitLocker startup key. You use EFS to encrypt the C: Secrets folder and its contents. Which of the following is true in this scenario? (Select two.)

Chosen plaintext

Your company produces an encryption device that lets you enter text and receive encrypted text in response. An attacker obtains one of these devices and starts inputting random plaintext to see the resulting ciphertext. Which type of attack is this?

Asymmetric

A PKI is an implementation for managing which type of encryption?

Hashing algorithms

A birthday attack focuses on what?

Sender's public key

A receiver wants to verify the integrity of a message received from a sender. A hashing value is contained within the digital signature of the sender. Which of the following must the receiver use to access the hashing value and verify the integrity of the transmission?

Private keys

Above all else, what must be protected to maintain the security and benefit of an asymmetric cryptographic solution, especially if it is widely used for digital certificates?

Each cipher text block is fed back into the encryption and then encrypts the next plaintext block. *Cipher Feedback Mode* Each plaintext block is added to the previous cipher text block and then the result is encrypted with the key. *Cipher Block Chaining Mode* This mode can encrypt or decrypt one fixed-length block. *Block Cipher Mode* Sender and recipient access a reliable counter that computes a new shared value each time a cipher text block is exchanged. *Counter Mode* Feeds the output blocks back to the block cipher. *Output Feedback Mode*

Advanced cryptography includes various modes of operation. Drag the mode of operation on the left to the appropriate definition on the right.

The CA's public key must validate the CA's digital signature on the server certificate

An SSL client has determined that the Certificate Authority (CA) issuing a server's certificate is on its list of trusted CAs. What is the next step in verifying the server's identity?

Diffusion

At the end of the cryptographic process, output is generated. With one type of output, simple character changes in the plaintext will cause several characters to change in the cipher text. What type of output is this?


Kaugnay na mga set ng pag-aaral

Psychosocial Nursing: Exam 2 Practice Questions

View Set

Ch.10 Assessing for Violence PrepU

View Set

ACCT 2101 (Chenier) Chapter 1 Connect HW

View Set

AST 101: Chapter 1 Cycles Of The Sky

View Set

IB - DP - Design - Unit 7 - User-Centred Design (UCD)

View Set

Microeconomics: Theory and Application, 12e | Chapter Number: 11

View Set