Chapter 7

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following algorithms are used in symmetric encryption? (Select two.)

3DES Blowfish

A private key has been stolen. Which action should you take to deal with this crisis?

Add the digital certificate to the CRL

A PKI is an implementation for managing which type of encryption?

Asymmetric

You want a security solution that protects the entire hard drive and prevents access even if the drive is moved to another system. Which solution should you choose?

BitLocker

You've used BitLocker to implement full volume encryption on a notebook system. The notebook motherboard does not have a TPM chip, so you've used an external USB flash drive to store the BitLocker startup key. You use EFS to encrypt the C:\Secrets folder and its contents. Which of the following is true in this scenario? (Select two.)

By default, only the user who encrypted the C:\Secrets\confidential.docx file will be able to open it. If the C:\Secrets\confidential.docx file is copied to an external USB flash drive, the file will be saved in an unencrypted state.

When two different messages produce the same hash value, what has occurred?

Collision

You create a new document and save it to a hard drive on a file server on your company's network. Then you employ an encryption tool to encrypt the file using AES. This activity is an example of accomplishing which security goal?

Confidentiality

Cryptographic systems provide which of the following security services?

Confidentiality Non-repudiation

Which of the following functions are performed by a TPM?

Create a hash of systems components

Hashing algorithms are used to perform which of the following activities?

Create a message digest

Which of the following encryption mechanisms offers the least security because of weak keys?

DES

Which of the following should you set up to ensure encrypted files can still be decrypted if the original user account becomes corrupted?

DRA

Which type of password attack employs a list of pre-defined passwords that it tries against a login prompt?

Dictionary attack

Which of the following algorithms are used in asymmetric encryption?

Diffie-Hellman RSA

Which of the following is a direct integrity protection?

Digital signature

What is the most obvious means of providing non-repudiation in a cryptography system?

Digital signatures

Which of the following security solutions would prevent a user from reading a file that she did not create?

EFS

You would like to implement BitLocker to encrypt data on a hard disk, even if it is moved to another system. You want the system to boot automatically without providing a startup key on an external USB device. What should you do?

Enable the TPM in the BIOS

Which utility would you MOST likely use on OS X to encrypt and decrypt data and messages?

GPG

What is the main function of a TPM hardware chip?

Generate and store cryptographic keys

Which of the following is a message authentication code that allows a user to verify that a file or message is legitimate?

HMAC

Which of the following is used to verify that a downloaded file has not been altered?

Hash

A birthday attack focuses on which of the following?

Hashing algorithms

To obtain a digital certificate and participate in a public key infrastructure (PKI), what must be submitted and where?

Identifying data and a certification request to the registration authority (RA)

You want to protect data on hard drives for users with laptops. You want the drive to be encrypted, and you want to prevent the laptops from booting unless a special USB drive is inserted. In addition, the system should not boot if a change is detected in any of the boot files. What should you do?

Implement BitLocker without a TPM

You have downloaded a file from the internet. You generate a hash and check it against the original file's hash to ensure the file has not been changed. Which information security goal is this an example of?

Integrity

You are concerned that if a private key is lost, all documents encrypted with your private key will be inaccessible. Which service should you use to solve this problem?

Key escrow

Which of the following are true of Triple DES (3DES)?

Key length is 168 bits

Which of the following is the weakest hashing algorithm?

MD5

Your computer system is a participant in an asymmetric cryptography system. You've crafted a message to be sent to another user. Before transmission, you hash the message and then encrypt the hash using your private key. You then attach this encrypted hash to your message as a digital signature before sending it to the other user. Which protection does the private key-signing activity of this process provide?

Non-repudiation

Which technology was developed to help improve the efficiency and reliability of checking the validity status of certificates in large, complex environments?

Online Certificate Status Protocol

Above all else, what must be protected to maintain the security and benefit of an asymmetric cryptographic solution, especially if it is widely used for digital certificates?

Private key

Which of the following can be classified as a stream cipher?

RC4

An attacker is attempting to crack a system's password by matching the password hash to a hash in a large table of hashes he or she has. Which type of attack is the attacker using?

Rainbow

In the certificate authority trust model known as a hierarchy, where does trust start?

Root CA

Which of the following does not or cannot produce a hash value of 128 bits?

SHA-1

What is the process of adding random characters at the beginning or end of a password to generate a completely different hash called?

Salting

Mary wants to send a message to Sam in such a way that only Sam can read it. Which key should be used to encrypt the message?

Sam's public key

A receiver wants to verify the integrity of a message received from a sender. A hashing value is contained within the digital signature of the sender. Which of the following must the receiver use to access the hashing value and verify the integrity of the transmission?

Sender's public key

Which term means a cryptography mechanism that hides secret communications within various forms of data?

Steganography

Which form of cryptography is best suited for bulk encryption because it is so fast?

Symmetric key cryptography

An SSL client has determined that the certificate authority (CA) issuing a server's certificate is on its list of trusted CAs. What is the next step in verifying the server's identity?

The CA's public key must validate the CA's digital signature on the server certificate.

You have transferred an encrypted file across a network using the Server Message Block (SMB) Protocol. What happens to the file's encryption?

The file is encrypted when moved

Which of the following would require that a certificate be placed on the CRL?

The private key is compromised.

Which of the following database encryption methods encrypts the entire database and all backups?

Transparent Data Encryption (TDE)

When a cryptographic system is used to protect data confidentiality, what actually takes place?

Unauthorized users are prevented from viewing or accessing the resource.

Which of the following items are contained in a digital certificate? (Select two.)

Validity period Public key

Which standard is most widely used for certificates?

X.509

You have just downloaded a file. You create a hash of the file and compare it to the hash posted on the website. The two hashes match. What do you know about the file?

Your copy is the same as the copy posted on the website

When a sender encrypts a message using their own private key, which security service is being provided to the recipient?

non-repudiation


Ensembles d'études connexes

[PT Y1 A2] Posterior Compartment

View Set

Chapter 16: Speaking to Persuade

View Set

Psychology Research Methods - Chapter 5

View Set

Google Cloud Digital Leader - After March 15th, 2024 update

View Set

LAW AND SOCIETY Final SHSU Fall 2018

View Set

Music Exam 2 part 3: the Baroque Era

View Set