chapter 6 study guide
Which of the following statements describe a quantum computer?
A quantum computer is a computer that relies on qubits that can be both 0 and 1 at the same time.
Wilson has requested your help to suggest an encryption method that will provide the highest security against attacks. Which encryption process should you suggest?
AES
Which of these is the strongest symmetric cryptographic algorithm?
Advanced Encryption Standard
If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message?
Alice's public key
Deo has been asked to explain RSA to his colleague. After his explanation, Deo is asked what, if any, weaknesses RSA has. How would Deo respond?
As computers become more powerful, the ability to compute factoring has increased.
John needs to add an algorithm for his company communication process, in which encryption uses two keys. One is the public key, and the other one is a private key. Which algorithm will be suitable to achieve this?
Asymmetric cryptographic
A new e-commerce startup with global operations is looking for a method to manage its supply-chain data for production. Instead of using bar codes, scanners, paper forms, and individual databases, making the system difficult to use, which method should be used to quickly track shipments?
Blockchain
Wireless data networks are particularly susceptible to which type of attack?
Ciphertext attack
Which of these is NOT a characteristic of a secure hash algorithm?
Collisions should occur no more than 15 percent of the time.
Which of the following hides the existence of information?
Correct Answer Steganography
Which of the following is FALSE about "security through obscurity"?
Correct! It can only provide limited security.
Cryptography can prevent an individual from fraudulently reneging on an action. What is this known as?
Correct! Nonrepudiation
Brielle is researching substitution ciphers. She came across a cipher in which the entire alphabet was rotated 13 steps. What type of cipher is this?
Correct! ROT13
What is low latency?
Correct! The time between when a byte is input into a cryptographic cipher and when the output is obtained.
ABC Enterprise is a global operation. As such, it needs to send regular, confidential messages and data between offices to communicate important market information, employee decisions, financial decisions, etc., for management consideration and senior-level decision making. Since these decisions impact the local employees and global businesses, they suspect that the data may be prone to attacks from threat actors internally and externally. While one of the senior systems administrators suggested implementing steganography to achieve this objective, the IT Department head at another branch suggested implementing cryptography. The management team has now called you for expert advice to select the best method to implement in the enterprise.What should your advice be, and why?
Cryptography should be implemented because it allows information to be viewed only by authorized users and checks whether the information has been altered or changed by anybody. It also makes the information unclear, even if other users see it. Cryptography is a more advanced technology than steganography. These features make cryptography the right choice for the enterprise to implement.
Which of the following is a state of data, where data is transmitted across a network?
Data in transit
Which of the following is not to be decrypted but is only used for comparison purposes?
Digest
John receives an encrypted document using asymmetric cryptography from Alex. Which process should Alex use along with asymmetric cryptography so that John can be sure that the received document is real, from Alex, and unaltered?
Digital signature algorithm
Basil was reading about a new attack that forces the system to abandon a higher cryptographic security mode of operation and instead fall back to an older and less secure mode. What type of attack is this?
Downgrade attack
Which of these provides cryptographic services and is external to the device?
Hardware Security Module (HSM)
Which of the following is NOT a characteristic of the Trusted Platform Module (TPM)?
It can easily be transported to another computer.
Spectrum Technologies uses SHA-256 to share confidential information. The enterprise reported a breach of confidential data by a threat actor. You are asked to verify the cause of the attack that occurred despite implementing secure cryptography in communication. Which type of attack should you consider first, and why?
Misconfiguration attack; the company should have configured a higher security hash algorithm rather than using the less-secure SHA-256.
Which feature of cryptography is used to prove a user's identity and prevent an individual from fraudulently reneging on an action?
Nonrepudiation
Which characteristic of cryptography makes information obscure or unclear, and by which the original information becomes impossible to be determined?
Obfuscation
Which of the following is used to create a sequence of numbers whose output is close to a random number?
PRNG
What is data called that is to be encrypted by inputting it into a cryptographic algorithm?
Plaintext
Which of these is NOT a basic security protection for information that cryptography can provide?
Risk
Which of the following is NOT a symmetric cryptographic algorithm?
SHA
Cicero is researching hash algorithms. Which algorithm would produce the longest and most secure digest?
SHA3-512
Which function in cryptography takes a string of any length as input and returns a string of any requested variable length?
Sponge
Which algorithm encrypts and decrypts data using the same key?
Symmetric cryptographic algorithm
What is a collision?
Two files produce the same digest.
Alex is working for Alpha Technology as a system administrator. The enterprise's sales team uses multiple external drives, often containing confidential data, that they carry between their offices and their clients' offices. What should Alex do to ensure that data is secure if it is stolen or lost, and why?
Use encrypted USBs in the enterprise because they automatically encrypt the information and give Alex remote access to the drive to monitor and disable the user.
Egor wanted to use a digital signature. Which of the following benefits will the digital signature NOT provide?
Verify the receiver
What are public key systems that generate different random public keys for each session?
perfect forward secrecy