SEC110: Chapt 3 Test

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Amtel University decides to keep a record of their student data in a backup server. The administrator contacts you to identify the right command interface protocol to be used in this. Which command interface protocol should you advise? a. TLS b. SSH c. HTTPS d. SSL

b. SSH

Which unit is used by quantum computers, making them faster and more efficient than normal computers? a. Candela b. Ampere c. Mole d. Qubit

d. Qubit

You have been asked to implement a block cipher mode of operation that requires both the sender and receiver of the message to have access to a synchronous counter that adds an AAD to the transmission. Which operating block cipher mode should you use? a. GCM b. CBC c. CTR d. ECB

a. GCM

Harry works at an automobile parts manufacturer. They sell these parts to retailers and deposit the proceeds in their bank. Using these funds, Harry pays the suppliers and employees. The Accounts Department maintains a ledger of all transactions of materials bought and sold. Similarly, the quality department and operations department also maintain a ledger of all transactions. Over the years, this process has become quite cumbersome, as growing data create confusion. Harry is looking at simplifying the process and has contacted you for a solution.Using which technology can this process be simplified and confusions avoided? a. Blockchain b. SED c. TPM d .HSM

a. Blockchain

Sigma solutions use hash algorithms in the communications between departments while transferring confidential files. A human resource employee informed you that one of the employees' salary statements sent from her end looks tampered with and requested your help. Which of the following tasks would enable you to identify whether the file is tampered with or not, and how will you make the determination? a. Check the digest of the file with the original digest. If the values are different, it can be confirmed that the file has been tampered with. b. Check the file digest for alternate values. If the digest's alternate value is the same in the entire digest, the file can be confirmed to be not tampered with. c. Check the digest for the file size. If the digest file size is different from that of the original digest, it can be concluded that the file has been tampered with. d. Check whether the original plaintext can be generated from the digest. If the original values can be generated and match the original file, the file has not been tampered with.

a. Check the digest of the file with the original digest. If the values are different, it can be confirmed that the file has been tampered with.

Wireless data networks are particularly susceptible to which type of attack? a. Ciphertext attack b. Birthday attack c. Collision attack d. Downgrade attack

a. Ciphertext attack

Blockchain relies on which cryptographic algorithm to make it computationally infeasible to try to replace a block or insert a new block of information without the approval of all entities involved? a. Cryptographic hash algorithms b. Asymmetric cryptographic algorithms c. Symmetric cryptographic algorithms d. RSA algorithm

a. Cryptographic hash algorithms

A manager working in ABC Consulting shared a list of employees from his team who were eligible for an extra week off. Later, he claimed that he has never shared this list. Which principle or functionality of a secured communication can be used to substantiate or verify the manager's claim? a. Nonrepudiation b. Hashing c. Obfuscation d. Steganography

a. Nonrepudiation

Which of the following is a standard format for digital certificates? a. X.509 b. .cer c. JPG d. MPEG-4 Part 14

a. X.509

Which of the following protocols are used to secure HTTP? a. TLS and SSL b. TLS and SRTP c. SSH and SSL d. TLS and SSH

a. TLS and SSL

Wilson has requested your help to suggest an encryption method that will provide the highest security against attacks. Which encryption process should you suggest? a. 3DES b. AES c. RC4 d. Blowfish

b. AES

Star Technology is working on a project that needs a communication mode specializing in encryption, where only authorized parties should understand the information. The company also requires accuracy, completeness, and reliability of data throughout the project. The company has contacted you for an ideal cipher mode solution without using a counter. Which mode should you suggest? a. GCM b. CBC c. CTR d. HTTPS

b. CBC

Which attack sees an attacker attempt to determine the hash function's input strings that produce the same hash result? a. Downgrade attack b. Collision attack c. Birthday attack d. Known ciphertext attack

b. Collision attack

Alex needs to find a method that can change a single character of plaintext into multiple characters of ciphertext. Which method should Alex use? a. Confusion b. Diffusion c. Steganography d. Obfuscation

b. Diffusion

John and Sarah are working for Star Alliance. John had to send certain confidential data and messages to Sarah online. The use of which of the following will ensure that the message's sender is, in fact, John? a. Physical signature b. Digital certificate c. Public key d. Digital signature

b. Digital certificate

XYZ University wants to set up a VPN network to connect to the internet and ensure that all their data is safe. They have asked you to recommend the correct communication protocol to use. Which of the following protocols should you recommend and why? a. HTTPS, because it authenticates that the packets received were sent from the source and ensures that no other party can view the contents. It manages the keys to ensure that they are not intercepted or used by unauthorized parties. b. IPsec, because it authenticates that the packets received were sent from the source and ensures that no other party can view the contents. It manages the keys to ensure that they are not intercepted or used by unauthorized parties. c. TLS, because it is used to secure communications between a browser and a web server. This ensures data is safe in communications across the network. d. SSH, because it is used to secure communications between a browser and a web server. This ensures data is safe in communications across the network.

b. IPsec, because it authenticates that the packets received were sent from the source and ensures that no other party can view the contents. It manages the keys to ensure that they are not intercepted or used by unauthorized parties.

Jane, an IT security expert whose services are sought by XYZ Company, has recommended implementing CTR mode in the network. What is one requirement that needs to be fulfilled for computers to communicate when the CTR mode is implemented? a. Neither sender nor receiver need access to a counter. b. Receiver should have access to a counter. c. Both sender and receiver should have access to a counter. d. Sender should have access to a counter.

c. Both sender and receiver should have access to a counter

Malik and Chris are shopping for shoes on an e-commerce website and need to enter their credit card details. Which of the following can assure them that they are using the retailer's authentic website and not an imposter's look-alike site that will steal their credit card details? a. Digital signature b. Hash digest c. Digital certificate d. SSL

c. Digital certificate

Under which of the following modes does the ciphertext depend only on the plaintext and the key, independent of the previous ciphertext blocks? a. GCM b. CRT c. ECB d. CBC

c. ECB

Which of the following devices can perform cryptographic erase? a. HSM b. TPM c. SED d. USB device encryption

c. SED

Which encryption is a chip on the motherboard of a computer that provides cryptographic services? a. Hardware security module b. Self-encrypting hard disk drives c. Trusted platform module d. File and File system cryptography

c. Trusted platform module

John needs to add an algorithm for his company communication process, in which encryption uses two keys. One is the public key, and the other one is a private key. Which algorithm will be suitable to achieve this? a. Lightweight cryptographic b. Private key cryptographic c. Symmetric cryptographic d. Asymmetric cryptographic

d. Asymmetric cryptographic

Which algorithm encrypts and decrypts data using the same key? a. Rivest-Shamir-Adleman algorithm b. Hash algorithm c. Asymmetric cryptographic algorithm d. Symmetric cryptographic algorithm

d. Symmetric cryptographic algorithm

Robert has two cryptographic keys, and he needs to determine which of them is less prone to being attacked. The cryptoperiod is limited and equal for both the keys. The first key has a length of 2 and uses 16 characters, while the other key has a length of 3 and uses 15 characters. Which of the following is the best conclusion for Robert to come to? a. Both the keys are equally secure. b. The first key is more secure than the second key. c. Neither of the keys are secure because they both have a limited cryptoperiod. d. The second key is more secure than the first key.

d. The second key is more secure than the first key.


Set pelajaran terkait

Chapter 48: Assessment and Management of Patients with Obesity

View Set

Chapter 35- Musculoskeletal Function

View Set

PN 131 Comprehensive Final NCLEX Questions

View Set

Istorie 17. Prima Jumătate de Secolul XX - Războaie, Unirea Mare, Perioada Interbelică

View Set

A & P - Saladin Skeletal System Ch 8

View Set

Chapter 5: Small Businesses, Entrepreneurship, and Franchises

View Set

ATI Musculoskeletal Problems Practice Questions

View Set

Obsessive-Compulsive-Ralated Disorders

View Set

independent, dependent variables, functions, domain, and range

View Set

Marketing Analytics Exam 2 - Google Analytics Key Terms

View Set