MIS 170: CHAPTER 14 REVIEW Q

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What type of encryption technology is used with the BitLocker application? a. Symmetric b. Asymmetric c. Hashing d. WPA2

A. based on AES

Which of the following is not a symmetric key algorithm? a. RC4 b. ECC c. 3DES d. Rijandael

B - example of public key cryptography that uses asymmetric key algorithm.

Which of the following encryption methods deals with two distinct, large prime numbers and the inability to factor those prime numbers? a. sha-1 b. rsa c. wpa d. symmetric

B. RSA uses 2 prime numbers - large prime numbers make it difficult to factor SHA-1 example of secure has algorithm (deprecated) WPA - WIFI protected access protocol RSA - example of an asymmetric method encryption

You are tasked with selecting an asymmetric encryption method that allows for the same level of encryption strength, but with a lesser key strength than is typically necessary. Which encryption method fulfills your requirement? a. RSA b. ECC c. DHE d. twofish

B. allows for lesser key strength but same level of strength as other asymmetric methods. RSA requires more computational power due to the increased key length. DHE uses more CPU power D = symmetric algorithm

you are tasked with ensuring the message being sent and received between two systems are both encrypted/authenticated. Which of the following protocols accomplishes this? a. Diffie-Hellman b. Bitlocker c. RSA d. SHA-384

C. RSA can encrypt and authenticate messages. DH encrypts ONLY. BitLocker is a type of whole disk encryption, not used to send/receive messages. SHA-384 is a cryptographic has function to preserve integrity.

What is another term for secret key encryption? a. PKI b. asymmetrical c. symmetrical d. public key

C. symmetric (uses secret key) symmetric involves private, single, shared key. PKI/Public keyes are asymmetrical.

Which of the following concepts does the Diffie-Hellman algorithm rely on? a. Usernames/passwords b. VPN tunneling c. biometrics d. key exchange

D. Relies on key exchange before data can be sent. Passowrds/usernames = authentication VPN tunneling is to have a secure connection to a network. Biometrics = identification process

Which of the following is used by PGP to encrypt the session key before it is sent? a. asymmetric key distribution system b. asymmetric scheme c. symmetric key distribution system d. symmetric scheme

D. Symmetric key scheme for session key data and asymmetric RSA for sending of the session key. Key distribution systems are apart of an entire encryption scheme = quantum cryptography

Which of the following will provide an integrity check? a. public key b. private key c. WEP d. Hash

D. ex. MD5 hash algorithms

WEP improperly uses an encryption protocol and therefore is considered to be insecure. What encryption protocol does it use? a. AES b. RSA c. RC6 d. RC4

D. several vulnerabilities when used incorrectly by protocols such as WEP. WEP doesn't use RSA, AES, RC6

give 2 examples of hardware devices that can store keys a. smart key b. network adapter c. PCI express card d. USB flash drive

A and D. both can be used to carry token/store keys = can be used for authentication for systems usually multi-factor. Netowrk and PCI are internal to PC.

Imagine that you are an attacker. Which would be most desirable when attempting to compromise encrypted data? a. weak key b. algorithm used by encryption protocol c. captured traffic d. block cipher

A. Easiest way and involves less work - algorithms take far more time to crack. Block ciphers are types of algorithms. Captured traffic still needs to be decrypted. Decryption = more work

Your boss wants you to set up an authentication scheme in which employees will use smart cards to log in to the company network. What kind of key should be used to accomplish this? a. private b. public c. cipher d. shared

A. Private - key determines function of cipher . Shared key is another term for symmetric key encryption = no privacy.

Which of the following encrypted algorithms is used to encrypt and decrypt data? a. SHA-256 b. RC5 d. MD5 d. NTLM

B. RC5 - encrypt/decrypt data. SHA256 type of SHA-2. SHA & MD5 used as hashing algorithms. NTLM is used by microsoft as an authentication protocol and password hash.

What does it mean if a hashing algorithm creates the same hash for two different downloads? a. hash is not encrypted b. hashing chain has occured c. one-way has occured d. collision occured

D - collision occurs

IT director wants you to use cryptographic algorithm that cannot be decoded by being reversed. Which of the following would be the best option? a. asymemtric b. symmetric c. pki d. one-way function

D - one-way function. Almost impossible to reverse engineer. A/B can always be cracked eventually.

A hash algorithm has the capability to avoid the same output from two guessed inputs. What is this known as? a. collision resistance b. collision strength c. collision cipher d. collision metric

A collision resistant - difficult to guess two inputs that has to the same output

Which of the following combines the keystream with the plaintext message using the bitwise XOR operator to produce cipher text? a. one-time pad b. obfuscation c. PBKDF2 d. ECDH

A. a stream cipher that encrypts plaintext w/ secret random key that is same length as plain text. Obfuscation = obsure/unclear PBKDF2 = key stretching software ECDH = public/private key pairs to establish secret key

which of the following is not a valid cryptographic has function? a. RC4 b. SHA-512 c. MD5 d. RIPEMD

A. symmetric encryption algorithm uses a stream cipher not a valid cryptographic hash function

Of the following, which statement correctly describes the difference between a secure cipher and a secure hash? a. hash produces a variable output for any input size; a cipher does not b. cipher produces the same size output for any input size; a has does not. c. a hash can be reserved; a cipher cannot d. cipher can be reversed; hash cannot.

D. Hashing is not the same as encryption (cipher) hashing is a digital fingerprint for a group of data. Hashes are not reversable

Which of the following methods will best verify that a download from the Internet has not been modified since the manufacturer released it? a. compare the final LANMAN hash with the original b. download patch file over an AES encrypted vpn connection c. download the patch file through SSL connection d. compare the final MD5 hash with the original

D. purpose of MD5 is to verify the integrity of a download SHA = hash ex will veritfy integrity of downloads LANMAN = older hashes for Microsfot LAN passwords Encrypted AES/SSL = encrypting data transfer not verifying integrity

What does steganography replace in graphic files? a. Least significant bit of each byte b. most significant bit of each byte c. least significant byte of each bit d. most significant byte of each bit

trick question - impossible to replace byte with each bit (larger into smaller) Least significant bit of each byte A

Which of the following might a public key be used to accomplish? a. decrypt hash of a digital signature b. encrypt web browser traffic c. digitally sign a message d. decrypt wireless messages

A. Session keys = encrypt web browser traffic Private keys = digitally sign a message/decrypt wireless messages

the fundamental difference between symmetric key systems and asymmetric key systems is that symmetric key systems do which of the following? a. use the same key on each end b. use different keys on each end c. use multiple keys for non-repudiation purposes d. public key cryptography

A. asymmetric key systems (public key encryption) use different keyes

You need to encrypt and send a large amount of data. Which of the following is the best option? a. symmetric encryption b. hashing algorithm c. asymmetric encryption d. PKI

A. Symmetric best option for large data while asymmetric (pki is an example are not great for it)

Why would an attacker use steganography? a. to hide information b. for data integrity c. to encrypt information d. for wireless access

A. act of writing hidden messages so that only intended recipients know existence of the message. STEGANOGRAPHERS not concerned with data integrity/encryption b/c normal person shouldn't even know the message exists

What type of attack sends 2 different messages using the same has function, which ends up causing a collision? a. birthday attack b. bluesnarfing c. man-in-the-middle attack d. logic bomb

A. exploits the math behind birthday problem in probability. 2 different messages using the same hash function, generating same message digest. Bluesnarfing = bluetooth devices Man-in-the-middle attack is when person intercepts info between sender/receiver Logic bomb = malicious attack set to go off at set time

Which of the following has the weakest encryption type? a. DES b. RSA c. AES d. SHA

A. the oldest 1970s, 56 bit key. 3DES (168 bit) and AES (256 bit) follow it. RSA is stronger than DES. SHA is a hashing algorithm.

Last week, one of the users in your org encrypted a file with a private key. this week the user left the organization, and unfortunately the systems admin deleted the user's account. What is the most probable outcomes of this situation? a. data not recoverable b. former user's acc can be re-created to access the file c. file can be decrypted with a PKI d. data decrypted using recovery agent e. data can be decrypted using root user account

A/D = systems usually have recovery agent designed. If account that encrypted file is deleted. Cannot be recreated. Recovery agent will be used. If no agent then file will be unrecoverable. File encrypted with private key and needs to be decrypted with private key. PKI is system that uses asymmetric key pairs. Root user account does not have ability to recover file encrypted by other users.

When encrypting credit card data, which would be the most secure algorithm with the least CPU utilization? a. AES b. 3DES c. SHA-512 d. MD5

AES - fast, secure than 3DES. SHA-512/MD5 are hashing algorithms Not listed: RSA most common for credit card transactions

Network stream of data needs to be encrypted. Jason, security admin, selects cipher that will encrypt 128 bits at a time before sending the data across the network. Which of the following has Jason chosen? a. Stream cipher b. Block cipher c. Hashing algorithm d. RC4

B. Stream ciphers encrypt each bit in the stream Hashing algorithms are not used to encrypt network streams of data. RC4 is a stream cipher.

You are attempting to move data to a USB flash drive. Which of the following enables a rapid/secure connection? a. SHA-2 b. 3DES c. AES-256 d. MD5

C. AES-256 - quick/secure encryption connection for use with USB flash drive. SHA2/MD5 examples of hashes 3DES example of encryption algorithm not best for high security and quick to usb


Ensembles d'études connexes

Unit 4: Types of Life Insurance Policies

View Set

Marketing: An introduction -Chapter 9: Pricing Understanding and Capturing Customer Value

View Set