Network Security 1.0 Modules 15-17
What are two symmectric encryption algorithms?
3DES AES
What popular encryption algorithm requires that both the sender and receiver know a pre-shared key?
AES
Which three security services are provided by digital signatures? (Choose three)
Guarantees data has not changed in transit Provides data encryption Authenticates the source
An IT enterprise is recommending the use of PKI applications to securely exchange information between the employees. IN which two cases might an organization use PKI applications to securely exchange information between users?
HTTPS web service 802.1x authentication
What technology supports asymmectric key encryption used in IPsec VPNs?
IKE
Which requirement of secure communications is ensured by the implementation of MD5 or SHA hash generating algorithms?
Integrity
What is the purpose of digital certificate?
It authenticates a website and establishes a secure connection to exchange confidential data.
Which algorithm can ensure data integrity?
MD5
A company is developing a security policy for secure communication. In the exchange of critical
Origin authentication
What technology has a function of using trusted third-party protocols to issue credentials that are accepted as an authoritative identity?
PKI certificates
What is another name for confidentiality of information?
Privacy
Alice and Bob are using a digital signature to sign a document. What key should Alice use to sign the document so that Bob can make sure that the document came from Alice?
Private key from Alice
What is an example of the one-time pad cipher?
RC4
What are two properties of a cryptographic hash function? (Choose two)
The hash function is one way and irreversible The output is a fixed length
Which statement describes asymmetric encryption algorithms?
They are relatively slow because they are based on difficult computational algorithms.
Which two items are used in asymmectric encryption? (Choose two)
a private key a public key
As data is being stored on a local hard disk, which method would secure the data from unauthorized access?
data encryption
The following message was encrypted using a Ceasar cipher with a key of 2: fghgpf vjg ecuvng
defend the castle
In a hierarchical CA topology, where can a subordinate CA obtain a certificate for itself?
from the root CA or another subordinate CA at a higher level
In which method used in cryptanalysis does the attacker know a portion of the plaintext and the corresponding cipthertext?
meet-in-the-middle
What is the keyspace of an encryption algorithm?
the set of all possible values used to generate a key
What is the purpose for the using digital signatures for code signing?
to verify the integrity of executable files downloaded from a vendor website