Security 6

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Consider the ciphersuite: SSL_DHE_RSA_WITH_DES_CBC_SHA. The Hash Algorithm here is _______________ A). SDBM B). CRC32 C). SHA D). MD5

SHA

Of the following choices, what can you use to verify data integrity? A). AES (Advanced Encryption Standard) B). DES (Data Encryption Standard) C). RC4 (Rivest Cipher 4) D). SHA (Secure Hash Algorithm)

SHA (Secure Hash Algorithm)

A Collision problem is seen in which of the following hashing algorithms? A). AES B). SHA-256 C). SHA1 D). Blow fish

SHA1

What is the maximum length for MD5 input/output? A). None of these B). 23 characters C). 16 characters D). 24 Characters

none of these

WPA2 uses AES for data encryption. What level or strength encryption does it use? A). 128 bit and CRC B). 64 bit and CCMP C). 128 bit CCMP D). 128 bit and TKIP

128 bit CCMP

The hash value produced by MD5 is... A). None of these B). 64 bits C). 128 bits D). 160 bits

128 bits

What is the effective key size of DES? A). 56 bits B). 128 bits C). 256 bits D). 64 bits

56 bits

Choose all necessary technology for real WPA. A). 802.1X B). EAP C). TKIP D). WEP

802.1X; EAP; TKIP

Which of the following is true about asymmetric encryption? A). A message encrypted with the public key can be decrypted with the private key. B). A message encrypted with the private key can be decrypted by the same key. C). A message encrypted with the public key can be decrypted with a shared key. D). A message encrypted with a shared key, can be decrypted by the same key.

A message encrypted with the public key can be decrypted with the private key.

Which of these is an EAP type: A). All of these B). PEAP C). EAP-TLS D). EAP-FAST

All of these

Which of the following are symmetric algorithms? (name all that apply): A). Diffie-Hellman B). RSA C). Blowfish D). AES

Blowfish; AES

Which of these is responsible for issuing certificates? A). CRL B). CA C).OSCP D). All of these

CA

Which of these is used to issue and revoke certificates in a PKI? A). WPA B). CA C). RADIUS D). Diffie-Hellman

CA

Which of the following EAP variants is supported in current versions of Windows? (Select all that apply.) A). EAP-TLS B). EAP-MD5 C). PEAP D). None of these

EAP-TLS; PEAP

Which of these is an insecure block cipher? A). AES B). RC4 C). ECB D). MD5

ECB

Which of the following is true about SHA? A). Ensures integrity of the message B). It comprises a three way handshake C). It has the same properties as DES D). All of these

Ensures integrity of the message

True or false: A WPA2 pre-shared key must be between 8 and 48 printable ASCII characters.

False

Which hashing algorithm relies heavily on matching the receiver's hash calculation in relation to the modified messages? A). HMAC B). SHA-1 C). MD2 D). MD4

HMAC

Which of the following correctly describes steganography? Select all that apply. A). It is a type of security through obscurity. B). Steganography is a hashing technique C). Steganography is more secure than encryption. D). Media files are often used for steganography

It is a type of security through obscurity.; Media files are often used for steganography

Symmetric algorithms have drawbacks in these areas (Choose 2): A). Key Management B). Preserving Confidentiality C). Non-repudiation features D). Speed

Key Management ; Non-repudiation features

Which feature makes WPA easy to defeat? A). PSK B). WPS support C). TKIP support D). RC4 Support

PSK

How does EAP-FAST provide authentication? A). Protected Access Credentials (PAC) B). Generic Token Card (GTC) C). Protocol for Carrying Authentication for Network Access (PANA) D). LAN Manager

Protected Access Credentials (PAC)

In an asymmetric cryptosystem, the key primarily used for encrypting for the sake of confidentiality is __________ A). Public key B). Private key C). Symmetric key D). Lateral key

Public key

f the data is encrypted with the server's public key, it can be decrypted only by the: A). Client's public key B). Server's public key C). Client's private key D). Server's private key

Server's private key

Which encryption method is used when the sender and receiver use an instance of the same key for encryption and decryption purposes? A). Symmetric algorithm B). Asymmetric algorithm C). Block cipher D). Diffusion

Symmetric algorithm

Which of the following security encryption protocols was implemented to make WEP more secure? A). AES B). IPsec C). TKIP D). EAP-TLS

TKIP

What is the purpose of key stretching? A). To ensure keys are the proper length for their corresponding locks. B). To strengthen weak keys against brute force attacks C). To combat key shortening D). None of these

To strengthen weak keys against brute force attacks

True or False: Theoretically, it's possible to derive the private key from the public key

True

True or false. Asymmetric key systems use a public key and a private key.

True

True or false: 802.11i was implemented as WPA2.

True

True or false: WPA2 is a more secure improvement over WEP and WPA.

True

Which of the following statements is true about WPA and WPA2? A). WPA uses TKIP and WPA2 uses CCMP B). WPA uses AES and WPA2 use TKIP. C). Both WPA and WPA2 use TKIP. D). Both WPA and WPA2 use AES.

WPA uses TKIP and WPA2 uses CCMP

Key reinstallation attacks exploit design weaknesses in which type of network security protocol? A). Kerberos B). WEP C). TLS D). WPA2

WPA2

Which encryption method works on the basis of sender and receivers using different keys for encryption and decryption? A). Asymmetric B). Symmetric C). Blowfish D). IDEA

asymmetric

Which of the following indicates an asymmetric algorithm key? A). A public key/ private key combination is used for encryption and decryption B). One encryption/decryption key is shared between sender and recipient C). The algorithm is less complex and fast D). Uses bulk encryption

A public key/ private key combination is used for encryption and decryption

Tom wants to use WPA2 CCMP. In this case, which of these encryption methods is he using? A). AES B). DES C). 3DES D). RC4

AES

WPA2 uses ____ to encrypt the data payload. A). AES B). DES C). RC4 D). Caesar Cipher

AES

Which of the following is most recommended for encryption? A). MD5 B). 3DES C). AES D). SHA

AES

Which of the following is not a hashing algorithm? A). MD5 B). SHA C). RIPEMD D). AES

AES

The NIST developed federal government standards beginning in 1991 called digital signature standards. Of the DSS standards RSA and DSA are most commonly used. When two different messages are computed using the same algorithm and the same message digest value results, this is called what? A). CMAC B). Knapsack algorithm C). Collision D). One-way hatch

Collision

Hash functions with longer output are generally considered stronger. Why? A). They can accommodate longer input values. B). They can accommodate longer salt values. C). They take longer to generate. D). Collisions are less likely.

Collisions are less likely.

Which of the following EAP methods is one way authentication only? A). EAP-FAST B). EAP- TTLS C). EAP-TLS D). EAP-MD5

EAP-MD5

Which of these is not a valid EAP type? A). EAP-TTLS B). EAP-TLS C). EAP-PIM D). EAP-FAST

EAP-PIM

True or false: A WPA2-secured network does not have to worry about brute-force attacks if it uses a sufficiently long timeout for users that enter incorrect passwords.

False

True or false: In symmetric encryption, a secret private key is used to decrypt data, while public key is used to encrypt data

False

True or false: P7B is the certificate format used to export private keys.

False

Which of the following is the PRIMARY advantage of using symmetric key encryption systems compared to public key systems? A). Fast encryption B). Long keys C). Key management D). Implemented both in hardware and software

Fast encryption

What method is used to protect the integrity of a message? A). hashing B). symmetric encryption C). asymmetric encryption D). stream cipher

Hashing

Which of the following is security through obscurity? A). MAC address filtering B). Using WPA-PSK C). Hiding SSID broadcast D). Storing the router in an obscure physical location

Hiding SSID broadcast

In reviewing the key differences between symmetric and asymmetric systems, asymmetric systems would contain all of these attributes EXCEPT? A). Performed through out of band key exchange B). The public key is made available to everyone C). The algorithm is complex D). The algorithm is slower

Performed through out of band key exchange

Which encryption standard is used in WEP? A). AES B). RC5 C). MD5 D). RC4

RC4

Which of the following encryption standards does WEP use for confidentiality? A). AES B). RC4 C). 3DES D). RC5

RC4

Which of the following is not an example of hash function? A). RIPEMD B). RC4 C). SHA-256 D). MD4

RC4

Which of the following algorithms is found to be suitable for both digital signature and encryption? A). MD5 B). SHA-1 C). RSA D). AES

RSA

Which of the following is an asymmetric algorithm? A). AES B). SHA-1 C). Blowfish D). RSA

RSA

Which of these does not use symmetric encryption? A). RSA B). Twofish C). AES D). DES

RSA

Which of the following describes an asymmetric key algorithm? (select two) A). Requires two separate keys B). Does not require secure exchange of a secret key C). Encryption and decryption is performed using the same key D). Cannot be used to ensure non-repudiation

Requires two separate keys; Does not require secure exchange of a secret key


Ensembles d'études connexes

CH3-Analyzing Transactions Using T-Accounts (game mode)

View Set

Life and Health Missed Questions

View Set