David Prowse SY0-401 CHAPTER 13 Encryption and Hashing Concepts
A. (Collision resistance) B. Collision strength C. Collision cipher D Collision metric
A hash algorithm has the capability to avoid the same output from two guessed inputs. What is this known as?
A. Stream cipher B. (Block cipher) C. Hashing algorithm D. RC4
A network stream of data needs to be encrypted. Jason, a security administrator, selects a cipher that will encrypt 128 bits at a time before sending the data across the network. Which of the following has Jason chosen?
A. (Smart card) B. Network adapter C. PCI Express card D. (USB flash drive)
Give two examples of hardware devices that can store keys. (Select the two best answers.)
A. A hash produces a variable output for any input size; a cipher does not. B. A cipher produces the same size output for any input size; a hash does not. C. A hash can be revised; a cipher cannot D. (A cipher can be reversed; a hash cannot)
Of the following, which statement correctly describes the difference between a secure cipher, and a secure hash?
A. Asymmetric B. Symmetric C. PKI D. (One-way function)
The IT director wants you to use a cryptographic algorithm that can be decoded by being reversed. Which of the following would be the best option?
A. AES B. RSA C. RC6 D. (RC4)
WEP improperly uses an encryption protocol and because of this is considered to be insecure. What encryption protocol does it use?
A. A hash is not encrypted. B. A hashing chain has occurred C. A one-way hash has occurred D. (A collision has occurred)
What does it mean if a hashing algorithm creates the same hash for two different Downloads?
A. (The least significant bit of each byte) B. The most significant bit of each byte C. The least significant byte of each bit D. The most significant byte of each bit
What does steganography replace in graphic files?
A. PKI B. Asymmetrical C. (Symmetrical) D. Public key
What is another term for secret key encryption?
A. (AES) B. 3DES C. SHA-1 D. MD5
When encrypting credit card data, which would be the most secure algorithm with the least CPU utilization?
A. Username, and password B. VPN tunneling C. Biometrics D. (Key exchange)
Which of the following concepts does the Diffie-Hellman algorithm rely on?
A. SHA-1 B. (RC5) C. MD5 D. NTLM
Which of the following encryption algorithms is used to encrypt and decrypt data?
A. SHA-1 B. (RSA) C. WPA D. Symmetric
Which of the following encryption methods deals with two distinct, large prime numbers and the inability to factor those prime numbers?
A. RC4 B. (ECC) C. 3DES D. Rijndael
Which of the following is not a symmetric key algorithm?
A. (RC4) B. SHA-512 C. MD5 D. RIPEMD
Which of the following is not a valid cryptographic hash function?
A. (DES) B. RSA C. AES D. SHA
Which of the following is the weakest encryption type?
A. Asymmetric key distribution system B. Asymmetric scheme C. Symmetric key distribution system D. (Symmetric scheme)
Which of the following is used by PGP to encrypt the session key before it is sent?
A. Compare the final LANMAN hash with the original B. Download the patch file over an AES encrypted VPN connection C. Download the patch file through an SSL connection D. (Compare the final MD5 hash with the original)
Which of the following methods will best verify that a download from the Internet has not been modified since the manufacturer released it?
A. (To decrypt the hash of a digital signature) B. To encrypt web browser traffic C. To digitally sign a message D. To decrypt wireless messages
Which of the following might a public key be used to accomplish?
A. Public key B. Private key C. WEP D. (Hash)
Which of the following will provide an integrity check?
A. (Symmetric) B. Asymmetric C. Hashing D. WPA2
Which type of encryption technology is used with the bitLocker application?
A. SHA-1 B. 3DES C. (AES-256) D. MD5
You are attempting to move data to a USB flash drive. Which of the following enables a rapid and secure connection?
A. Diffie-Hellman B. BitLocker C. (RSA) D. SHA-1
You are tasked with ensuring that messages being sent and received between two systems are both encrypted and authenticated. Which of the following protocols accomplishes this?
A. RSA B. (ECC) C. DHE D. Twofish
You are tasked with selecting an asymmetric encryption method that allows for the same level of encryption strength, but with a lesser key length than is typically necessary. Which encryption method fulfills your requirement?
A. (Symmetric encryption) B. Hashing algorithm C. Asymmetric encryption D. PKI
You need to encrypt and send a large amount of data. Which of the following would be the best option?
A. (private key) B. Public key C. Cipher key D. Shared key
Your boss wants you to set up an authentication scheme in which employees will use smart cards to log in to the company network. What kind of key should be used to accomplish this?