Sec+ | Certification | 22

Ace your homework & exams now with Quizwiz!

DSA

A cryptographic standard for digital signatures is known as: DSA PFS DES RSA

Asymmetric encryption Public-key encryption

A type of encryption scheme that uses a paired public and private key is known as: (Select 2 answers) Secret-key encryption Asymmetric encryption Symmetric encryption Public-key encryption Session-key encryption

Integrity Authentication Non-repudiation

Digital signatures provide: (Select 3 answers) Integrity Authentication Confidentiality Authorization Non-repudiation Accounting

Cryptographic nonce Salting Initialization Vector (IV)

Examples of means that provide randomization during the encryption process include: (Select 3 answers) Cryptographic nonce Obfuscation Salting Initialization Vector (IV)) Shimming

True

In asymmetric encryption, any message encrypted with the use of a public key can only be decrypted by applying the same algorithm and a matching private key. True False

True

In cryptography, the number of bits in a key used by a cryptographic algorithm is referred to as a key size or key length. The key size determines the maximum number of combinations required to break the encryption algorithm, therefore typically a longer key means stronger cryptographic security. True False

True

In cryptography, the term "Key stretching" refers to a mechanism for extending the length of a cryptographic key to make it more secure against brute-force attacks. True False

True

In cryptography, the term "Secret algorithm" refers to an algorithm designed in a way that prevents the examination of its inner workings. True False

Salt

Pseudo-random data added to a password before hashing is called: Shim Salt Seed IV

IV

Pseudo-random data used in combination with a secret key in WEP and SSL encryption schemes is known as: Salt Shim IV Seed

True

The term "Ephemeral key" refers to an asymmetric encryption key designed to be used only for a single session or transaction. True False

True

Unlike stream ciphers which process data by encrypting individual bits, block ciphers divide data into separate fragments and encrypt each fragment separately. True False

Asymmetric encryption Low processing power requirements Suitable for small wireless devices

What are the characteristic features of Elliptic Curve Cryptography (ECC)? (Select 3 answers) Asymmetric encryption Low processing power requirements Suitable for small wireless devices High processing power requirements Symmetric encryption Not suitable for small wireless devices

Used during a single session Symmetric key

What are the characteristic features of a session key? (Select 2 answers) Used during a single session Asymmetric key Reused during multiple sessions Symmetric key

WEP SSL DES

What are the examples of weak/deprecated cryptographic solutions? (Select 3 answers) WEP AES SSL DES PGP

RSA

Which of the algorithms listed below does not belong to the category of symmetric ciphers? RC4 DES RSA AES Blowfish 3DES Twofish

Symmetric-key algorithm 128-, 192-, and 256-bit keys Block cipher algorithm

Which of the answers listed below refer to the Advanced Encryption Standard (AES)? (Select 3 answers) Symmetric-key algorithm 128-, 192-, and 256-bit keys Asymmetric-key algorithm Stream cipher algorithm 56-, 112-, and 168-bit keys Block cipher algorithm

PFS

Which of the answers listed below refers to a solution designed to strengthen the security of session keys? ECB PFS EFS PFX

GCM

Which of the block cipher modes listed below provides both data integrity and confidentiality? CBC GCM ECB CTR

Diffie-Hellman

Which of the following answers refers to a commonly used asymmetric algorithm for secure exchange of symmetric keys? RC4 Bcrypt Diffie-Hellman RIPEMD

Salt

Which of the following answers refers to a type of additional input that increases password complexity and provides better protection against brute-force, dictionary, and rainbow table attacks? Seed IV Salt Shim

Code obfuscation Steganography SSID broadcast suppression

Which of the following terms illustrate(s) the security through obscurity concept? (Select all that apply) Code obfuscation Steganography SSID broadcast suppression Encryption Substitution ciphers

Confusion

Which of the following terms is used in conjunction with the assumption that the output of a cryptographic function should be considerably different from the corresponding plaintext input? Confusion Obfuscation Collision Diffusion

Diffusion

Which of the terms listed below is used to describe a situation where a small change introduced to the input data before encryption causes large changes in its encrypted version? Diffusion Confusion Obfuscation Collision

Data-in-use

Which of the three states of digital data requires data to be processed in an unencrypted form? Data-in-transit Data-at-rest Data-in-use


Related study sets

3.5 Special Cases: Repeated and Zero Eigenvalues

View Set

LearningCurve: 15b. The Biomedical Therapies and Preventing Psychological Disorders

View Set

IBM Week 10/ 11/ 13 - Human Resources Management (HRM)

View Set