Exam Prep Questions

1.

Fill in the blanks with the best choice from the list.

Cryptography is the art of code __________ and cryptanalysis is the art of code __________.

Exam Prep Questions

A.

Graphing, analyzing

Exam Prep Questions

B.

Generation, cracking

Exam Prep Questions

C.

Making, breaking

Exam Prep Questions

D.

Breaking, making

Exam Prep Questions

E.

None of the above.

2.

Read the following sentence and choose the type of attack that is being described from the list of choices.

Several examples of ciphertext created by the same cryptosystem are statistically analyzed to deduce underlying plaintext by pattern analysis.

Exam Prep Questions

A.

Known-Plaintext

Exam Prep Questions

B.

Meet-in-the-Middle

Exam Prep Questions

C.

Brute Force

Exam Prep Questions

D.

Ciphertext-Only

Exam Prep Questions

E.

Chosen-Ciphertext

3.

Match the following crypto algorithms with the letter corresponding to its key length.

AES:

___

3DES:

___

DES:

___

RC4:

___

Blowfish:

___

Your choices are:

A. 1 to 256 bits

B. 112 and 168 bits

C. 56 bits

D. 128, 192, and 256 bits

E. 32 to 448 bits

4.

True or false. AES is considered a trusted encryption algorithm by virtue of its strong 128-bit encryption keys and its 20+ years of use in crypto systems.

5.

What is the best choice of category of encryption algorithm for situations where large volumes of data are transmitted and speed is important? (Choose one from the list.)

A. Block cipher

B. Stream cipher

C. Symmetric key encryption

D. Asymmetric key encryption

E. DES

6.

Figure 6.14 illustrates what type of PKI topology? (Choose the one best answer.)

FIGURE 6.14 What PKI technology is this?

What PKI technology is this?

A. Subordinate-Tiered CA

B. Cross-Certified CA

C. Central CA

D. Hierarchical CA

E. Independent-Mesh CA

7.

Figure 6.15 illustrates the part of the enrollment process that occurs after a PKI participant has retrieved and validated the CA’s certificate. What is always contained in the PKCS #7 message that the PKI participant is retrieving from the CA? (Choose all the correct answers.)

FIGURE 6.15 What is contained in the PKCS #7 message?

What is contained in the PKCS #7 message?

A. X.509 certificate

B. CA’s private key

C. CA’s public key

D. PKI participant’s signed public key

E. CA’s encryption usage keys

F. None of the above.

8.

Which of the following list of protocols are part of NIST’s Digital Signature Standard (DSS)? (Choose all that apply.)

A. DSA

B. Digital Signatures using Reversible Public Key Cryptography

C. SEAL

D. Blowfish

E. ECDSA

9.

Fill in the blanks in the following sentence with the letter corresponding to the best choice. (Choose three.)

Hashing functions are used to validate a message’s __________ but do not provide for __________ like HMACs. If __________ is required, the use of digital signatures is specified.

A. Confidentiality

B. Integrity

C. Authentication

D. Non-repudiation

E. Origin authentication

10.

Which one of the following statements best compares MD5 and SHA-1 as hashing algorithms?

A. MD5 theoretically has higher security than SHA-1; however, SHA-1 remains more commonly used.

B. MD5 is not recommended for new cryptosystems because SHA-1 is preferred for its theoretically higher security.

C. SHA-1 is less resistant to a brute force attack than MD5, and its 32-bit longer buffer makes it faster than MD5.

D. SHA-1 and MD5’s security is not based on encryption keys.

E. None of the above.

Answers to Exam Prep Questions

1.

The correct answer is C. Cryptography is the art of creating and using cryptosystems, whereas cryptanalysis is the process of analyzing a cryptographic algorithm for weaknesses and exploiting them to break the code. They are essentially opponents in the security arena.

2.

The correct answer is D. This kind of attack is not practical with modern ciphers because they use pseudorandom output to resist statistical analysis.

3.

The answers are as follows:

AES:

D

3DES:

B

DES:

C

RC4:

A

Blowfish:

E

4.

False. AES has not yet reached the level of trustworthiness of ciphers such as DES and 3DES precisely because it has not been tested in the field nearly as long. Although AES is cryptographically stronger and a simpler algorithm computationally, DES and 3DES have been in use for over 35 years and found not to possess any flaws.

5.

Answer C is correct. Answers A and B are both incorrect because they define categories of ciphers that may be used both for symmetric and asymmetric key encryption. Answer D is incorrect because asymmetric key encryption is best employed for small amounts of data and where speed isn’t as important. Answer E is incorrect since DES is 1) an example of an obsolete symmetric key encryption algorithm, and 2) not a category of encryption algorithm.

6.

The correct answer is D. Answers A and E are incorrect because they are made-up terms.

7.

Answers A and D are correct. At this point in the enrollment process, the PKI participant retrieves the certificate that contains its CA-signed public key. Answer B is incorrect because the private key is always retained on the CA and is never transmitted at any time during enrollment. The security of the whole PKI depends on safeguarding the CA’s private key. Answer E is incorrect because this is made-up terminology.

8.

Answers A, B, and E are correct. Answers C and D are incorrect because they are examples of encryption algorithms.

9.

The correct choices, in order, are B, E, and D. Answer A is incorrect since hashes, HMACS, and digital signatures do not encrypt. Answer C is incorrect because HMACs’ strength is that they authenticate the origin of the data in a cryptosystem.

10.

The correct answer is B. Answers A and C are exactly opposite to correct. Answer D is incorrect because the security of a hashing cryptosystem is completely based on the safeguarding of the encryption keys that, together with the hash, create the message digest.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset