image
  1.  Which of the following is a true statement concerning cryptography?
A.  Provides a means to protect data during storage but not transit.
B.  Provides a means to protect data in transit but not storage.
C.  Converts plaintext to ciphertext for protection during transit or in storage.
D.  Converts ciphertext to plaintext for protection during transit or in storage.
  2.  Which of the following would be the best choice to guarantee the integrity of messages in transit or storage?
A.  Block cipher
B.  Symmetric algorithm
C.  Asymmetric algorithm
D.  Hash algorithm
  3.  Which of the following encryption algorithms is your best choice if your primary need is bulk encryption, and you need fast, strong encryption?
A.  AES
B.  ECC
C.  RSA
D.  MD5
  4.  You’re describing a basic PKI system to a new member of the team. He asks how the public key can be distributed within the system in an orderly, controlled fashion so that the users can be sure of the sender’s identity. Which of the following would be your answer?
A.  Digital signature
B.  Hash value
C.  Private key
D.  Digital certificate
E.  Nonrepudiation
  5.  You are discussing hash values with a CEH instructor. Immediately after telling you the hash is a one-way algorithm and cannot be reversed, he explains that you can still discover the value entered into the hash, given enough time and resources. Which of the following hash anomalies might allow this?
A.  L0phtCrack
B.  Hash value compromise
C.  Chosen plaintext
D.  Collision
  6.  What is the standard format for digital certificates?
A.  X.500
B.  X.25
C.  XOR
D.  X.509
  7.  You’re discussing cryptography and determine you need to ensure messages are safe from unauthorized observation. Also, you want to provide a way to ensure the identity of the sender and receiver during the communications process. Which of the following best suits your needs?
A.  Steganography
B.  Asymmetric encryption
C.  Hash
D.  Symmetric encryption
  8.  A hacker has gained access to several files. Many are encrypted, but one is not. Which of the following is the best choice for possibly providing a successful break into the encrypted files?
A.  Ciphertext only
B.  Known plaintext
C.  Chosen ciphertext
D.  Replay
  9.  You are discussing a steganography tool that takes advantage of the nature of “white space” to conceal information. Which tool are you referring to?
A.  Snow
B.  GifShuffle
C.  White Wipe
D.  Tripwire
10.  At the basic core of encryption approaches, two main methods are in play: substitution and transposition. Which of the following best describes transposition?
A.  Bits are replaced with a different value.
B.  Bits are removed.
C.  The order of bits is changed.
D.  The parity bits are changed.
11.  Jack and Jill work in an organization that has a PKI system in place for securing messaging. Jack encrypts a message for Jill and sends it on. Jill receives the message and decrypts it. Within a PKI system, which of the following statements is true?
A.  Jack encrypts with his private key. Jill decrypts with her private key.
B.  Jack encrypts with his public key. Jill decrypts with her public key.
C.  Jack encrypts with Jill’s private key. Jill decrypts with her public key.
D.  Jack encrypts with Jill’s public key. Jill decrypts with her private key.
12.  Which of the following would you find in an X.509 digital certificate? (Choose all that apply.)
A.  Version
B.  Algorithm ID
C.  Private key
D.  Public key
E.  Key usage
F.  PTR record
13.  Which of the following is secure substitute for telnet?
A.  SHA-1
B.  RSA
C.  SSL
D.  SSH
14.  An SSL session requires a client and a server to handshake information between each other and agree on a secured channel. Which of the following best describes the session key creation during the setup of an SSL session?
A.  The server creates the key after verifying the client’s identity.
B.  The server creates the key immediately on the client connection.
C.  The client creates the key using the server’s public key.
D.  The client creates the key after verifying the server’s identity.
15.  Which encryption algorithm uses variable block sizes (from 32 to 128 bits)?
A.  SHA-1
B.  RC5
C.  3DES
D.  AES
16.  Which hash algorithm was developed by the NSA and produces output values up to 512 bits?
A.  MD5
B.  SHA-1
C.  SHA-2
D.  SSL
17.  A hacker is attempting to uncover the key used in a cryptographic encryption scheme. Which attack vector is the most resource intensive and usually takes the longest amount of time?
A.  Social engineering
B.  Known plaintext
C.  Frequency analysis
D.  Brute force
18.  In a discussion on symmetric encryption, a friend mentions that one of the drawbacks with this system is scalability. He goes on to say that for every person you add to the mix, the number of keys goes up exponentially. If seven people are in a symmetric encryption pool, how many keys are necessary?
A.  7
B.  14
C.  21
D.  28
19.  Which of the following is a true statement?
A.  Symmetric encryption scales easily and provides for nonrepudiation.
B.  Symmetric encryption does not scale easily and does not provide for nonrepudiation.
C.  Symmetric encryption is not suited for bulk encryption.
D.  Symmetric encryption is slower than asymmetric encryption.
20.  The PKI system you are auditing has a Certificate Authority (CA) at the top that creates and issues certificates. Users trust each other based on the CA itself. Which trust model is in use here?
A.  Standalone CA
B.  Web of Trust
C.  Single Authority
D.  Hierarchical Trust
21.  A portion of a digital certificate is shown here:
images
Which of the following statements is true?
A.  The hash created for the digital signature holds 160 bits.
B.  The hash created for the digital signature holds 2,048 bits.
C.  RSA is the hash algorithm used for the digital signature.
D.  This certificate contains a private key.
22.  Two bit strings are run through an XOR operation. Which of the following is a true statement for each bit pair regarding this function?
A.  If the first value is 0 and the second value is 1, then the output is 0.
B.  If the first value is 1 and the second value is 0, then the output is 0.
C.  If the first value is 0 and the second value is 0, then the output is 1.
D.  If the first value is 1 and the second value is 1, then the output is 0.
23.  Which of the following attacks attempts to re-send a portion of a cryptographic exchange in hopes of setting up a communications channel?
A.  Known plaintext
B.  Chosen plaintext
C.  Man in the middle
D.  Replay
24.  Within a PKI system, which of the following is an accurate statement?
A.  Bill can be sure a message came from Sue by using his public key to decrypt it.
B.  Bill can be sure a message came from Sue by using his private key to decrypt it.
C.  Bill can be sure a message came from Sue by using her private key to decrypt the digital signature.
D.  Bill can be sure a message came from Sue by using her public key to decrypt the digital signature.
25.  One use of hash algorithms is for the secure storage of passwords: The password is run through a one-way hash, and the value is stored instead of the plaintext version. If a hacker gains access to these hash values and knows the hash algorithm used to create them, which of the following could be used to speed up his effort in cracking them?
A.  Salt
B.  Rainbow tables
C.  Steganography
D.  Collision
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset