image
  1.  Which of the following is a true statement concerning cryptography?
A.  Provides a means to protect data during storage but not transit.
B.  Provides a means to protect data in transit but not storage.
C.  Converts plaintext to ciphertext for protection during transit or in storage.
D.  Converts ciphertext to plaintext for protection during transit or in storage.
image  C. The whole point of cryptography is to put plaintext into an unreadable format (known as ciphertext) that only you and your intended recipient can translate (that is, decrypt). Cryptography is the science or study of protecting information, whether in transit or at rest, by using techniques to render the information unusable to anyone who does not possess the means to decrypt it. The overall process is simple: Take plaintext (something you can read) data, apply a cryptographic method, and turn it into ciphertext (something you can’t read)—so long as there is some provision to allow you to bring the ciphertext back to plaintext.
image  A is incorrect because cryptography is designed to protect data both at rest and in transit. Only protecting data in a resting state ignores the portion of its life when it’s at the most risk—during transit between a sender and receiver. After all, what good would it do to protect your money in a vault but, once you take it out, to provide no protection at all while walking down the street?
image  B is incorrect because cryptography is designed to protect data both in transit and at rest. Sure, data is most at risk when it’s out of your hands, but ignoring it while in a resting state is folly. Data sitting on a hard drive somewhere unprotected is an open target, just waiting to be discovered.
image  D is incorrect because converting ciphertext to plaintext is decrypting the message. Doing so before sending the message is cryptography in reverse and, frankly, makes no sense at all.
  2.  Which of the following would be the best choice to guarantee the integrity of messages in transit or storage?
A.  Block cipher
B.  Symmetric algorithm
C.  Asymmetric algorithm
D.  Hash algorithm
image  D. Although it’s nice to know the terms block, stream, asymmetric, and asymmetric, they’re all irrelevant to this question. The key is the word integrity, and as you should already know from your study for this exam, that equates to a hash every time. Hash algorithms don’t encrypt anything at all. They’re one-way mathematical functions that take an input and typically produce a fixed-length string (usually a number), known as a hash, based on the arrangement of the data bits in the input. The sole purpose of a hash is to provide a means to verify the integrity of a piece of data—change a single bit in the arrangement of the original data, and you’ll get a different response.
image  A is incorrect because block ciphers are not designed for integrity checks. They use methods such as substitution and transposition in their algorithms and are considered simpler, and slower, than stream ciphers. Data bits are split up into blocks and fed into the cipher, with each block of data (usually 64 bits at a time) then encrypted with the key and algorithm.
image  B is incorrect because a symmetric algorithm is not designed to provide integrity checks. Also known as “single key” and “shared key,” symmetric encryption simply means one key is used both to encrypt and decrypt the data. Therefore, as long as both the sender and the receiver know and have the secret key, communication can be encrypted between the two.
image  C is incorrect because asymmetric algorithms are not designed for integrity checks. Asymmetric encryption uses two keys—what the one key encrypts, the other key decrypts. The “public” key is the one used for encryption, whereas the “private” key is used for decryption.
  3.  Which of the following encryption algorithms is your best choice if your primary need is bulk encryption, and you need fast, strong encryption?
A.  AES
B.  ECC
C.  RSA
D.  MD5
image  A. Questions like this on the exam are to be celebrated because they are easy—assuming you paid attention to my study tips at the beginning of this chapter. The question references bulk encryption—something fast and strong. This screams symmetric all the way, and the only symmetric algorithm listed here is AES.
image  B is incorrect because ECC (Elliptic Curve Cryptosystem) is not symmetric in nature. It’s primarily used for mobile devices and uses points on an elliptical curve, in conjunction with logarithmic problems, for encryption and signatures.
image  C is incorrect because RSA is an asymmetric choice, not a symmetric one. RSA achieves strong encryption through the use of two large prime numbers: Factoring these numbers creates key sizes up to 4,096 bits. RSA can be used for encryption and digital signatures, and it’s the modern de facto standard for those purposes.
image  D is incorrect because MD5 is a hash algorithm and, as we all know, hash algorithms don’t encrypt anything. Sure, they’re great at integrity checks and, yes, you can pass a hash of something in place of the original (sending a hash of a stored password, for instance, instead of the password itself). However, this is not true encryption.
  4.  You’re describing a basic PKI system to a new member of the team. He asks how the public key can be distributed within the system in an orderly, controlled fashion so that the users can be sure of the sender’s identity. Which of the following would be your answer?
A.  Digital signature
B.  Hash value
C.  Private key
D.  Digital certificate
E.  Nonrepudiation
image  D. This one’s actually easy, yet is confusing to a lot of folks. You have to remember the goal of this little portion of a PKI system—how does one know this public key really belongs to User Joe and not User Mike, and how can it be delivered safely to everyone? A digital certificate is the answer because it contains the sender’s public key and can be used to identify the sender. Because the CA provides the certificate and key (public), the user can be certain the public key actually belongs to the intended recipient. This simplifies distribution of keys as well, because users can go to a central authority—a key store, if you will—instead of directly to each user in the organization. Without central control and digital certificates, it would be a madhouse, with everyone chucking public keys at one another with wild abandon. And PKI is no place for Mardi Gras, my friend.
image  A is incorrect because although a digital signature does provide a means for verifying an identity (encryption with your private key, which can only be decrypted with your corresponding public key, proves you are indeed you), it doesn’t provide any means of sending keys anywhere. A digital signature is nothing more than an algorithmic output that is designed to ensure the authenticity (and integrity) of the sender. You need it to prove your certificate’s authenticity, but you need the certificate in order to send keys around.
image  B is incorrect because a hash value has nothing to do with sending public keys around anywhere. Yes, hash values are “signed” to verify authenticity, but that’s it. There is no transport capability in a hash. It’s just a number and, in this case, a distractor answer.
image  C is incorrect for a number of reasons, but one should be screaming at you from the page right now: you never, never, send a private key anywhere. If you did send your private key off, it wouldn’t be private anymore, now would it? The private key is simply the part of the pair used for encryption. It is never shared with anyone.
image  E is incorrect because nonrepudiation is a definition term and has nothing to do with the transport of keys. Nonrepudiation is the means by which a recipient can ensure the identity of the sender and that neither party can deny having sent or received the message.
  5.  You are discussing hash values with a CEH instructor. Immediately after telling you the hash is a one-way algorithm and cannot be reversed, he explains that you can still discover the value entered into the hash, given enough time and resources. Which of the following hash anomalies might allow this?
A.  L0phtCrack
B.  Hash value compromise
C.  Chosen Plaintext
D.  Collision
image  D. A collision, in the world of hashes, occurs when plaintext is fed into a hash until, eventually, two or more entries are found that create the same fixed-value hash result. In short, a collision occurs when two or more files create the same output. When a hacker can create a second file that produces the same hash value output as the original, he may be able to pass off the fake file as the original. This can obviously cause all sorts of problems, and when you think about what hashes are sometimes used for (such as storing hashes of passwords in a file instead of the passwords themselves), you can certainly understand where collisions are concerning. As an aside, it is just as likely you would find a new collision than the original collision, and without the knowledge of the original text, your results would be nothing more than an educated guess. For the purposes of the exam, though, just remember what a collision is and means.
image  A is incorrect because L0phtCrack really has nothing to do with this question. It is a good-old password cracker in the Windows world, but it’s not a collision of hash values in any sense. It’s a “password auditing and recovery application” used to test password strength and “recover” lost passwords on Windows machines. It uses dictionary, brute-force, and hybrid attacks, as well as rainbow tables.
image  B is incorrect for a couple of reasons. First, the term hash value compromise sounds really cool, but has no meaning in the CEH world. This term could be construed to mean lots of things, but if you’ll run a quick Google check (go ahead, I’ll wait) you’ll see that it’s not a definition term you’ll need to know. Pretty good distractor, yes, but not a viable answer.
image  C is incorrect because chosen plaintext is an attack used to determine the key used for encryption. It’s a variant of “known plaintext,” where the hacker has both plaintext and corresponding ciphertext messages and scans them for repeatable sequences. These are compared to the ciphertext versions and—voilà—key found.
  6.  What is the standard format for digital certificates?
A.  X.500
B.  X.25
C.  XOR
D.  X.509
image  D. This is a quick, simple question you’ll see on pretty much every study guide and practice test for CEH. It’s just something you’re going to have to have in your memory bank—one of those things you just know without thinking about it. The X.509 standard is a part of a much bigger series of standards, and it defines what should and should not be in a digital certificate. Because of the standard, any system complying with X.509 can exchange and use digital certificates to establish authenticity.
image  A is incorrect because X.500 has nothing to do with digital certificates. It’s actually a series of standards covering directory services, and it’s more applicable to things such as Active Directory in Windows-based networks. As a related but completely worthless note, it was developed by ITU-T way back in 1988.
image  B is incorrect because X.25 has nothing to do with digital certificates. X.25 is a protocol suite from ITU-T defining wide area network (WAN) communication.
image  C is incorrect because XOR refers to a mathematical function. An XOR operation requires two inputs, which are compared by the operation. If the bits match, the output is 0; if they don’t, it’s 1.
  7.  You’re discussing cryptography and determine you need to ensure messages are safe from unauthorized observation. Also, you want to provide a way to ensure the identity of the sender and receiver during the communications process. Which of the following best suits your needs?
A.  Steganography
B.  Asymmetric encryption
C.  Hash
D.  Symmetric encryption
image  B. This one should be easy for you by now because it’s right out of the definition book for asymmetric encryption. The other choices make no sense because the key to the answer is the repudiation aspect asked for in the question. Remember, asymmetric encryption came about because of the inherit problem with symmetric encryption and the single key to encrypt and decrypt messages—that is, how do you share the key efficiently and effectively without compromising security? The answer was to use two keys, and the machinations involved in that provide the means for nonrepudiation.
image  A is incorrect because steganography is all about hiding messages inside images and other files. It’s the practice of concealing a message inside another medium (such as another file or an image) in such a way that only the sender and recipient even know of its existence. It can be as simple as hiding the message in the text of a written correspondence or as complex as changing bits within a huge media file to carry a message.
image  C is incorrect because a hash has nothing to do with this question. It’s purely used as a distractor here, and you should be able to easily dismiss this one.
image  D is incorrect because although symmetric encryption algorithms do a great job of protecting your data, they don’t do a thing for you in the repudiation realm. Remember, symmetric uses only a single key, so there’s nothing to identify the sender or receiver. It was this drawback that brought about asymmetric thinking for encryption in the first place.
  8.  A hacker has gained access to several files. Many are encrypted, but one is not. Which of the following is the best choice for possibly providing a successful break into the encrypted files?
A.  Ciphertext only
B.  Known plaintext
C.  Chosen ciphertext
D.  Replay
image  B. There is definitely some room for argument on this question: Who’s to say all the files were encrypted in the same way? However, of the options presented, known plaintext is the one that makes the most sense. In this attack, the hacker has both plaintext and ciphertext messages. Plaintext copies are scanned for repeatable sequences, which are then compared to the ciphertext versions. Over time, and with effort, this can be used to decipher the key.
image  A is incorrect, but just barely so. I’m certain some of you are arguing that a ciphertext-only attack could also be used here, because in that attack several messages encrypted in the same way are run through statistical analysis to eventually reveal repeating code, which may be used to decode messages later on. Sure, an attacker might just ignore the plaintext copy in there, but the inference in the question is that he’d use both. You’ll often see questions like this where you’ll need to take into account the inference without over-thinking the question.
image  C is incorrect because chosen ciphertext works almost exactly like a ciphertext-only attack. Statistical analysis without a plaintext version for comparison can be performed, but it’s only for portions of gained ciphertext. That’s the key word to look for.
image  D is incorrect because it’s irrelevant to this scenario. Replay attacks catch streams of data and replay them to the intended recipient from another sender.
  9.  You are discussing a steganography tool that takes advantage of the nature of “white space” to conceal information. Which tool are you discussing?
A.  Snow
B.  GifShuffle
C.  White Wipe
D.  Tripwire
image  A. Snow is one of the steganography tools the CEH exam covers. The following is from the Snow website: “The program snow is used to conceal messages in ASCII text by appending whitespace to the end of lines. Because spaces and tabs are generally not visible in text viewers, the message is effectively hidden from casual observers. And if the built-in encryption is used, the message cannot be read even if it is detected.”
image  B is incorrect because GifShuffle is used to conceal messages in GIF images by shuffling bits in the color map. Because these changes are minutely small, GifShuffle leaves the image visibly unchanged. It’s also an open source tool.
image  C is incorrect because White Wipe is not a steganography tool. In fact, as far as I know, it’s not a tool at all. This is simply a distractor answer.
image  D is incorrect because Tripwire is not a steganography tool either. Rather, it’s a conglomeration of tool actions that perform the overall IT security efforts for an enterprise. It provides for integrity checks, regulatory compliance, configuration management, and all other sorts of goodies.
10.  At the basic core of encryption approaches, two main methods are in play: substitution and transposition. Which of the following best describes transposition?
A.  Bits are replaced with a different value.
B.  Bits are removed.
C.  The order of bits is changed.
D.  The parity bits are changed.
image  C. This is just a different way of asking you to define substitution and transposition. Substitution is exactly what it sounds like. Transposition doesn’t substitute at all; it changes the bit order altogether.
image  A is incorrect because this is the definition for substitution. Substitution is exactly what it sounds like—bits are simply replaced by other bits.
image  B is incorrect because bits aren’t technically removed with either function. They may be replaced, or reordered, but they are not removed.
image  D is incorrect because this answer has nothing, really, to do with encryption. Parity bits sounds sexy and exciting, but it’s meaningless in this context. Parity bits are used for basic error correction, not encryption.
11.  Jack and Jill work in an organization that has a PKI system in place for securing messaging. Jack encrypts a message for Jill and sends it on. Jill receives the message and decrypts it. Within a PKI system, which of the following statements is true?
A.  Jack encrypts with his private key. Jill decrypts with her private key.
B.  Jack encrypts with his public key. Jill decrypts with her public key.
C.  Jack encrypts with Jill’s private key. Jill decrypts with her public key.
D.  Jack encrypts with Jill’s public key. Jill decrypts with her private key.
image  D. When it comes to PKI encryption questions, remember the golden rule: Encrypt with public, decrypt with private. In this instance, Jack wants to send a message to Jill. He will use Jill’s public key—which everyone can get—to encrypt the message, knowing that only Jill, with her corresponding private key, can decrypt it.
image  A is incorrect because you do not encrypt with a private key in a PKI system. Yes, you can encrypt with it, but what would be the point? Anyone with your public key—which everyone has—could decrypt it! Remember, private = decrypt, public = encrypt.
image  B is incorrect because, in this case, Jack has gotten his end of the bargain correct, but Jill doesn’t seem to know what she’s doing. PKI encryption is done in key pairs—what one key encrypts, the other decrypts. So her use of her own public key to decrypt something encrypted with Jack’s key—a key from a completely different pair—is baffling.
image  C is incorrect because there is no way Jack should have anyone’s private key, other than his own. That’s kind of the point of a private key—you keep it to yourself and don’t share it with anyone. As a note here, the stated steps would actually work—that is, one key encrypts, so the other decrypts—but it’s completely backward for how the system is supposed to work. An abomination to security, if you will.
12.  Which of the following would you find in an X.509 digital certificate? (Choose all that apply.)
A.  Version
B.  Algorithm ID
C.  Private key
D.  Public key
E.  Key usage
F.  PTR record
image  A, B, D, and E. You are definitely going to need to know the digital certificate and what it contains. A digital certificate is an electronic file that is used to verify a user’s identity, providing nonrepudiation throughout the system. The certificate contains standard fields used for specific purposes. Those fields are Version, Serial Number, Subject, Algorithm ID (or Signature Algorithm), Issuer, Valid From and Valid To, Key Usage, Subject’s Public Key, and Optional.
image  C is incorrect because a private key is never shared. The certificate usually is “signed” with an encrypted hash by the private key, but the key itself is never shared.
image  F is incorrect because a PTR record is a part of the Domain Name System (DNS), not a digital certificate. A PTR record provides a reverse DNS lookup as a pointer to a canonical name.
13.  Which of the following is a secure substitute for telnet?
A.  SHA-1
B.  RSA
C.  SSL
D.  SSH
image  D. Secure Shell (SSH) was created to fill a security need. Telnet provides easy administrative access, but it’s in the clear and ripe for theft. SSH performs the same functions—providing a channel for command execution and remote logging—but does so in a secured method, over a secured channel with strong authentication. As an aside, telnet can do lots of things SSH cannot (providing some marginal interaction with generic TCP services, serving as a poor hacker’s web browser and so on). Therefore, SSH is to be thought of as a secure alternative to telnet, not a replacement.
image  A is incorrect because SHA-1 is a hashing algorithm, not a means for encrypting a channel for communication exchange. It was published by NIST (National Institute of Standards and Technology) as a better, stronger hash alternative, and is now in its third cycle of development (SHA-2 and SHA-3 have been released).
image  B is incorrect because RSA is an encryption algorithm, achieving strong encryption through the use of two large prime numbers. Factoring these numbers creates key sizes up to 4,096 bits. RSA can be used for encryption and digital signatures and is the modern de facto standard.
image  C is incorrect because SSL is an application layer protocol for managing security on Internet message transit. It uses RSA asymmetric encryption to encrypt data transferred over its connection.
14.  An SSL session requires a client and a server to handshake information between each other and agree on a secured channel. Which of the following best describes the session key creation during the setup of an SSL session?
A.  The server creates the key after verifying the client’s identity.
B.  The server creates the key immediately on the client connection.
C.  The client creates the key using the server’s public key.
D.  The client creates the key after verifying the server’s identity.
image  D. In the CEH world, SSL has six major steps (others claim seven or more, but we’re studying for the CEH certification here, so we’ll stick with theirs). The six steps are (1) Client hello, (2) Server hello and certificate, (3) Server hello done message, (4) Client verifies server identity and sends Client Key Exchange message, (5) Client sends Change Cipher Spec and Finish message, and (6) Server responds with Change Cipher Spec and Finish message. The session key is created by the client after it verifies the server identity (using the certificate provided in step 2).
image  A is incorrect because the server does not create the session key.
image  B is incorrect for the same reason—the client creates the key, not the server.
image  C is incorrect because the client does not use a “public key” for an SSL session. It’s a great distractor, trying to confuse you with PKI terms in an SSL question.
15.  Which encryption algorithm uses variable block sizes (from 32 to 128 bits)?
A.  SHA-1
B.  RC5
C.  3DES
D.  AES
image  B. Questions on identifying encryption algorithms really come down to memorization of some key terms. Rivest Cipher (RC) encompasses several versions, from RC2 through RC6. It is an asymmetric block cipher that uses a variable key length up to 2,040 bits. RC6, the latest version, uses 128-bit blocks, whereas RC5 uses variable block sizes (32, 64, or 128).
image  A is incorrect because SHA-1 is a hash algorithm, not an encryption algorithm. If this question were about verifying integrity, this would be a good choice. However, in this case, it is a distractor.
image  C is incorrect because although 3DES is a symmetric block cipher, it does not use variable block sizes. 3DES (called triple DES) uses a 168-bit key and can use up to three keys in a multiple-encryption method. It’s much more effective than DES, but is much slower.
image  D is incorrect because AES, another symmetric block cipher, uses key lengths of 128, 192, or 256 bits. It effectively replaces DES and is much faster than either DES or its triplicate cousin (3DES).
16.  Which hash algorithm was developed by the NSA and produces output values up to 512 bits?
A.  MD5
B.  SHA-1
C.  SHA-2
D.  SSL
image  C. Both SHA-1 and SHA-2 were developed by the NSA; however, SHA-1 only produced a 160-bit output value. SHA-2 was developed to rectify the short-comings of its predecessor and is capable of producing outputs of 224, 256, 384, and 512 bits. Although it was designed as a replacement for SHA-1 (which was supposed to have been phased out in 2010), SHA-2 is still not as widely used.
image  A is incorrect because MD5 produces 128-bit output. It was created by Ronald Rivest for ensuring file integrity; however, serious flaws in the algorithm, and the advancement of other hashes, have resulted in this hash being rendered obsolete (U.S. CERT, August 2010). Despite this, you’ll find MD5 is still used for file verification on downloads and, in many cases, to store passwords.
image  B is incorrect because SHA-1 produces a 160-bit value output. It was created by NSA and used to be required by law for use in U.S. Government applications. However, serious flaws became apparent in late 2005, and the U.S. Government began recommending the replacement of SHA-1 with SHA-2 after 2010 (see FIPS PUB 180-1).
image  D is incorrect because SSL isn’t even a hash algorithm. If you picked this one, you have some serious studying to do.
17.  A hacker is attempting to uncover the key used in a cryptographic encryption scheme. Which attack vector is the most resource intensive and usually takes the longest amount of time?
A.  Social engineering
B.  Known plaintext
C.  Frequency analysis
D.  Brute force
image  D. I know you probably weren’t expecting a brute force definition to show up so early, but sometimes this exam will throw terms in and out of objectives to see if you’re paying attention. Brute force attacks—whether attempting to crack a password or, in this case, to determine a key used in cryptography—are the longest and most resource intensive. If you think about what the attack is doing, this makes perfect sense. Although, eventually, every brute force attack will be successful, the length of the key can make the length of time necessary to go through all possible iterations unacceptable. For example, if it takes your supercomputer 12 years to crack an algorithm key, it’s probably a safe bet that the target has changed it within that timespan.
image  A is incorrect because social engineering requires little to no resources at all, and given the right individual on the phone (or sitting behind a desk), it could be pretty quick. Granted, this is a ridiculous answer here—who is actually going to hand over a cryptographic key to someone—but stranger things have happened.
image  B is incorrect because known plaintext takes at least some of the time-crunching out for you. Remember in this attack that the hacker has both plaintext and ciphertext messages. Plaintext copies are scanned for repeatable sequences, which are then compared to the ciphertext versions. Over time, and with effort, this can be used to decipher the key; however, it is not as resource intensive as brute force.
image  C is incorrect because, although this answer sounds really cool, it doesn’t fit with the question criteria (time and resource intensive). Frequency analysis relies on the fact that, in any given sample of English writing, there will be certain letters (and combinations of letters) that occur with more frequency than others. This kind of attack appeals to the math geeks in our field—and to those who tech-edit hacking books.
18.  In a discussion on symmetric encryption, a friend mentions that one of the drawbacks with this system is scalability. He goes on to say that for every person you add to the mix, the number of keys goes up exponentially. If seven people are in a symmetric encryption pool, how many keys are necessary?
A.  7
B.  14
C.  21
D.  28
image  C. Symmetric encryption is really fast and works great with bulk encryption; however, scalability and key exchange are huge drawbacks. To determine the number of keys you need, use the formula N (N – 1) / 2. Plugging in the number 7 into this, we have 7 (7 – 1) / 2 = 21.
image  A is incorrect because although symmetric key does use the same key for encryption and decryption, each new node requires a different key. Seven keys simply isn’t enough.
image  B is incorrect because 14 keys isn’t enough.
image  D is incorrect because 28 keys is too many. Stick with the formula N (N – 1) / 2.
19.  Which of the following is a true statement?
A.  Symmetric encryption scales easily and provides for nonrepudiation.
B.  Symmetric encryption does not scale easily and does not provide for nonrepudiation.
C.  Symmetric encryption is not suited for bulk encryption.
D.  Symmetric encryption is slower than asymmetric encryption.
image  B. Symmetric encryption has always been known for strength and speed; however, scalability and key exchange are big drawbacks. Additionally, there is no way to provide for nonrepudiation (within the confines of the encryption system). Symmetric encryption is good for a great many things when you don’t want all the overhead of key management.
image  A is incorrect because symmetric encryption does not scale easily and does not provide for nonrepudiation. The single key used for each channel makes scalability an issue. Remember, the formula for number of keys is N (N – 1) / 2.
image  C is incorrect because symmetric encryption is perfectly designed for bulk encryption. Assuming you can find a way to ensure the key exchange is protected, speed makes this the best choice.
image  D is incorrect because one of the benefits of symmetric encryption is its speed. It is much faster than asymmetric encryption, but doesn’t provide some of the benefits asymmetric provides us (scalability, nonrepudiation, and so on).
20.  The PKI system you are auditing has a Certificate Authority (CA) at the top that creates and issues certificates. Users trust each other based on the CA itself. Which trust model is in use here?
A.  Standalone CA
B.  Web of Trust
C.  Single Authority
D.  Hierarchical Trust
image  C. Trust models within PKI systems provide a standardized method for certificate and key exchanges. The valid trust models include Web of Trust, Single Authority, and Hierarchical. The Single Authority system has a CA at the top that creates and issues certs. Users then trust each other based on the CA at the top vouching for them. Assuming a Single Authority model is used, it’s of vital importance to protect it. After all, if it is compromised, your whole system is kaput.
image  A is incorrect because “Standalone CA” doesn’t refer to a trust model. It instead defines a single CA that is usually set up as a Trusted Offline Root in a hierarchy, or when extranets and the Internet are involved.
image  B is incorrect because Web of Trust refers to a model where users create and manage their own certificates and key exchange and multiple entities sign certificates for one another. In other words, users within this system trust each other based on certificates they receive from other users on the same system.
image  D is incorrect because although a Hierarchical Trust system also has a CA at the top (which is known as the root CA), it makes use of one or more intermediate CAs underneath it—known as RAs—to issue and manage certificates. This system is the most secure because users can track the certificate back to the root to ensure authenticity without a single point of failure.
21.  A portion of a digital certificate is shown here:
images
Which of the following statements is true?
A.  The hash created for the digital signature holds 160 bits.
B.  The hash created for the digital signature holds 2,048 bits.
C.  RSA is the hash algorithm used for the digital signature.
D.  This certificate contains a private key.
image  A. Questions on the digital certificate are usually easy enough, and this is no exception. The algorithm used to create the hash is clearly defined (Signature Hash Algorithm) as SHA-1 and, as we already know, SHA-1 creates a 160-bit hash output. This will then be encrypted by the sender’s private key and decrypted on the recipient’s end with the public key, thus verifying identity.
image  B is incorrect as a distractor, because the RSA key size of 2,048 is listed in the Public Key section of the certificate.
image  C incorrect because RSA is not a hash algorithm. It is, without doubt, used as an encryption algorithm with this certificate (and uses a 2,048-bit key to do so), but does not hash anything.
image  D is incorrect because (as I’m certain you are already aware) a private key is never shared. The public key is contained for recipients to use if they wish to encrypt something to send back to the originator, but the private key is never shared.
22.  Two bit strings are run through an XOR operation. Which of the following is a true statement for each bit pair regarding this function?
A.  If the first value is 0 and the second value is 1, then the output is 0.
B.  If the first value is 1 and the second value is 0, then the output is 0.
C.  If the first value is 0 and the second value is 0, then the output is 1.
D.  If the first value is 1 and the second value is 1, then the output is 0.
image  D. An XOR operation requires two inputs, and in the case of encryption algorithms, this would be the data bits and the key bits. Each bit is fed into the operation—one from the data, the next from the key—and then XOR makes a determination: If the bits match, the output is 0; if they don’t, it’s 1.
image  A is incorrect because the two values being compared are different; therefore, the output would be 1.
image  B is incorrect because the two values being compared are different; therefore, the output would be 1.
image  C is incorrect because the two values being compared are the same; therefore, the output should be 0.
23.  Which of the following attacks attempts to re-send a portion of a cryptographic exchange in hopes of setting up a communications channel?
A.  Known plaintext
B.  Chosen plaintext
C.  Man in the middle
D.  Replay
image  D. Replay attacks are most often performed within the context of a man-in-the-middle attack and not necessarily just for comm channel setup: They’re also used for DoS attacks against a system, to feed bad data in hope of corrupting a system, to try to overflow a buffer (send more encrypted data than expected), and so on. The hacker repeats a portion of a cryptographic exchange in hopes of fooling the system into setting up a communications channel. The attacker doesn’t really have to know the actual data (such as the password) being exchanged; he just has to get the timing right in copying and then replaying the bit stream. Session tokens can be used in the communications process to combat this attack.
image  A is incorrect because known plaintext doesn’t really have anything to do with this scenario. Known plaintext refers to having both plaintext and corresponding ciphertext messages, which are scanned for repeatable sequences and then compared to the ciphertext versions.
image  B is incorrect for the same reason as A: This answer simply doesn’t apply to this scenario. In a chosen plaintext attack, a hacker puts several encrypted messages through statistical analysis to determine repeating code.
image  C is incorrect because, in this instance, replay refers to the attack being described in the question, not man in the middle. I know you think this is confusing, and I do understand. However, this is an example of CEH wordplay you’ll need to be familiar with. Man in the middle is usually listed as an attack by every security guide; however, within the context of the exam, it may also refer solely to where the attacker has positioned himself. From this location, he can launch a variety of attacks—replay being one of them.
24.  Within a PKI system, which of the following is an accurate statement?
A.  Bill can be sure a message came from Sue by using his public key to decrypt it.
B.  Bill can be sure a message came from Sue by using his private key to decrypt it.
C.  Bill can be sure a message came from Sue by using her private key to decrypt the digital signature.
D.  Bill can be sure a message came from Sue by using her public key to decrypt the digital signature.
image  D. Remember, a digital signature is a hash value that is encrypted with the user’s private key. Because the corresponding public key can decrypt it, this provides the nonrepudiation feature we’re looking for. This is the only instance on the exam where the private key is used for encryption. In general, public encrypts, private decrypts.
image  A is incorrect because not only does this have nothing to do with proving identity, but it also cannot work. Bill can’t use his own public key to decrypt a message sent to him. The keys work in pairs—if the message is encrypted with his public key, only his private key can decrypt it.
image  B is incorrect because this has nothing to do with proving Sue’s identity. Sure, Bill will be using his own private key to decrypt messages sent to him by other users; however, it doesn’t provide any help in proving identity.
image  C is incorrect because there is no way Bill should have Sue’s private key. Remember, private keys are not shared with anyone, for any reason. This is why encrypting a hash with it works so well for the digital signing process.
25.  One use of hash algorithms is for the secure storage of passwords: The password is run through a one-way hash, and the value is stored instead of the plaintext version. If a hacker gains access to these hash values, and knows the hash algorithm used to create them, which of the following could be used to speed up his effort in cracking them?
A.  Salt
B.  Rainbow tables
C.  Steganography
D.  Collision
image  B. Rainbow tables are the result of a lot of effort in putting all known combinations of plaintext entries into a hash, one at a time, and capturing the hash value that’s created. Then, instead of having to brute force your way in and spending countless computational cycles, you can simply compare the hash value you stole from the password file to the rainbow table—once you find a match, voilà!
image  A is incorrect because a salt is used to increase security on a password hash, not to crack it. A salt is a collection of random bits used as a key in addition to the hashing algorithm. Because the bits, and length, are random, a good salt makes a collision attack very difficult to pull off.
image  C is incorrect because steganography simply makes no sense here. Steganography involves hiding messages inside another medium—for example, hiding a message inside a .jpg file.
image  D is incorrect because although the entire effort is in finding the correct collision to unlock the plaintext version, the collision itself isn’t an effort to speed things up.
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset