CompTIA Module 6 Review
Which of the following is not to be decrypted but is only used for comparison purposes? A) Digest B) Key C) Stream D) Algorithm
Digest
Cicero is researching hash algorithms. Which algorithm would produce the longest and most secure digest? A) SHA-256 B) MD5 C) SHA3-512 D) SHA6-6
SHA3-512
Which of these is the strongest symmetric cryptographic algorithm? A) Data Encryption Standard B) Advanced Encryption Standard C) Triple Data Encryption Standard D) RC1
Advanced Encryption Standard
If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message? A) Alice's private Key B) Alice's public Key C) Bob's public Key D) Bob's private Key
Alice's public Key
Which is FALSE concerning hashing? A) It can generate asymmetric cryptographic public keys and private keys B) The hash represents the contents of the input message C) Hashing is one way and is used for comparison purposes D) Creates a unique "digital fingerprint" of a set of data and is commonly called hashing
It can generate asymmetric cryptographic public keys and private keys
Which of these is NOT a basic security protection for information that cryptography can provide? A) Integrity B) Authenticity C) Risk D) Confidentiality
Risk
Which of the following is NOT a symmetric cryptographic algorithm? A) DES B) SHA C) Blowfish D) 3DES
SHA
Which of the following hides the existence of information? A) Encryption B) Decryption C) Steganography D) Ciphering
Steganography
What type of cipher is based on the binary operation eXclusive OR that compares two bits? A) XOR B) XAND13 C) ROT13 D) Alphabetic
XOR
How many keys are required in asymmetric encryption? A) 3 B) 1 C) Depends on the algorithm D) 2 E) 4
2
What is the key length of the Data Encryption Standard (DES) algorithm? A) 256-bit B) 56-bit C) 168-bit D) 128-bit
56-bit
Deo has been asked to explain RSA to his colleague. After his explanation, Deo is asked what, if any, weaknesses RSA has. How would Deo respond? A) RSA has no known weaknesses B) As computers become more powerful. the ability to compute factoring has increased C) RSA weaknesses are based on ECC D) The digest produced by the RSA algorithm is too short to be secure
As computers become more powerful. the ability to compute factoring has increased
Which type of cryptography attack attempts to find two input strings of a hash function that produce the same hash result? A) Downgrade attack B) Birthday attack C) Ciphertext attack D) Algorithm attack
Birthday attack
Which of the following is an example of FDE? Full Disk Encryption A) BitLocker B) EFS C) GNuPG D) Folder Lock
BitLocker
What is the process of scrambling encrypted information? A) Encryption B) Decryption C) Steganography D) Ciphering
Ciphering
Which of these is NOT a characteristic of a secure hash algorithm? A) The results of a hash function should not be reversed B) Collisions should occur no more than 15 percent of the time C) A message cannot be produced from a predefined hash D) The hash should always be the same fixed size
Collisions should occur no more than 15 percent of the time
Which key exchange channel uses a key once and then discards them? A) Public Key Exchange (PKE) B) Diffie-Hellman Ephemeral (DHE) C) Elliptic Curve Diffie-Hellman (ECDH) D) Diffie-Hellman (DH)
Diffie-Hellman Ephemeral (DHE)
Which of the following will thwart threat actors from discovering the underlying key to cryptographic algorithms? Select any that apply. A) Diffusion B) Confusion C) Collusion D) Delusion
Diffusion & Confusion
Which hashing algorithm is no longer used because it has been hacked? A) SHA-256 B) MD5 C) SHA3-512 D) SHA6-6
MD5
What is TRUE about non-repudiation? A) Non-repudiation proves that a user performed an action B) Non-repudiation ensures that only authorized users parties can view the information C) Non-repudiation ensures the information is correct and no unauthorized person or malicious software has altered the data D) Non-repudiation ensures two keys are the same length
Non-repudiation proves that a user performed an action
Cryptography can prevent an individual from fraudulently reneging on an action. What is this known as? A) Repudiation B) Nonrepudiation C) Obfuscation D) Integrity
Nonrepudiation
Which of the following is a term that proves that a user performed an action with a computer or on data? A) Confidentiality B) Nonrepudiation C) Obfuscation D) Authentication
Nonrepudiation
Which of the following algorithms are examples of lightweight cryptography? [Choose all that apply] A) RSA B) OTR C) ECC D) TWINE
OTR, TWINE
What does it mean to make something "obscure" or "unclear"? A) Repudiation B) Nonrepudiation C) Obfuscation D) Integrity
Obfuscation
Which of the following is TRUE about "security through obscurity"? A) It sets a precedent by encouraging other employees to violate company policy B) Open Source Software is secure C) The cryptography used is secure D) Obscurity means a hacker has a difficult time find the actual thing they are trying to hack
Obscurity means a hacker has a difficult time find the actual thing they are trying to hack
What are public key systems that generate different random public keys for each session? A) Public Key Exchange (PKE) B) Perfect forward secrecy C) Elliptic Curve Diffie-Hellman (ECDH) D) Diffie-Hellman (DH)
Perfect forward secrecy
What is data called that is to be encrypted by inputting it into a cryptographic algorithm? A) Plaintext B) Byte-text C) Cleartext D) Ciphertext
Plaintext
Brielle is researching substitution ciphers. She came across a cipher in which the entire alphabet was rotated 13 steps. What type of cipher is this? A) XOR B) XAND13 C) ROT13 D) Alphabetic
ROT13
What is low latency? A) A low-power source requirement of a sensor B) The time between when a byte is input into a cryptographic cipher and when the output is obtained C) The requirements for an IoT device that is using a specific network D) The delay between when a substitution cipher decrypts the first block and when it finishes with the last block
The time between when a byte is input into a cryptographic cipher and when the output is obtained
In asymmetric key encryption, what is the next step when a client initiates a session with a web server that is configured with a certificate? A) The client takes the public key from the certificate B) The web server decrypts the asymmetric key C) The client shares the encrypted key D) The web server sends a certificate to the web browse
The web server sends a certificate to the web browse
What statement is FALSE concerning cryptographic keys? A) The key is a mathematical value entered into the algorithm to produce ciphertext B) To decipher an encrypted message, you must always use ROT13 C) XOR cipher is based on the binary operation of eXclusive OR that compares two bits D) Prove the integrity of the message
To decipher an encrypted message, you must always use ROT13
Which statement is FALSE about Public Key Cryptography? A) Uses only one key called the Public Key B) Uses two mathematically related keys C) The Public key is available to everyone and freely distributed D) The Private key is known only to the individual to whom it belongs
Uses only one key called the Public Key