Security+ CH 5 – Flashcards
Unlock all answers in this set
Unlock answersquestion
A(n) _____ is not decrypted but is only used for comparison purposes?
stream
digest
algorithm
key
answer
digest
question
All of the following can be broken mathematically EXCEPT _____.
AES
3DES
SHA
OTP
answer
OTP
question
Which asymmetric cryptographic algorithm is the most secure?
SHA-2
BTC-2
RSA
ME-14
answer
RSA
question
What are the latest versions of the Secure Hash Algorithm? (pick two)
SHA-2
SHA-3
SHA-4
SHA-5
answer
SHA-2
SHA-3
question
Proving that a user sent an email message is known as _____.
repudiation
integrity
non-repudiation
availability
answer
non-repudiation
question
Which of these has an onboard key generator and key storage facility, as well as accelerated symmetric and asymmetric encryption, and can back up sensitive material in encrypted form?
Trusted Platform Module (TPM)
self-encrypting hard disk drives (HDDs)
encrypted hardware-based USB devices
Hardware Security Module (HSM)
answer
Hardware Security Module (HSM)
question
Which of the following key exchanges uses the same keys each time?
Diffie-Hellman Ephemeral (DHE)
Diffie-Hellman (DH)
Diffie-Hellman-RSA (DHRSA)
Elliptic Curve Diffie-Hellman (ECDH)
answer
Diffie-Hellman (DH)
question
The areas of a file in which steganography can hide data include all of the following EXCEPT _____.
in data that is used to describe the content or structure of the actual data
in the directory structure of the file system
in the file header fields that describe the file
in areas that contain the content data itself
answer
in the directory structure of the file system
question
A digital signature can provide each of the following benefits EXCEPT _____.
prove the integrity of the message
verify the receiver
verify the sender
enforce nonrepudiation
answer
verify the receiver
question
The Hashed Message Authentication Code (HMAC) _____.
encrypts only the key
encrypts the key and the message
encrypts only the message
encrypts the DHE key only
answer
encrypts the key and the message
question
What is the name of the open source asymmetric cryptography system that runs on Windows, UNIX, and Linux systems, and is compatible with PGP?
GPG
OGP
CGP
GPP
answer
GPG
question
Which solution is ideal for encrypting an entire hard drive of a PC?
EFS
BitLocker
PGP
3DES
answer
BitLocker
question
What type of cryptographic algorithm is considered to be a one-way algorithm, in that its contents can't be used to reveal the original set of data?
hash
key
digest
block
answer
hash
question
Which of the following is NOT a benefit of USB device encryption?
Administrators can initiate a self-destruct command to eliminate data
Administrators can lock a user out of the device during the next connection
Files moved to the USB are automatically encrypted
The USB device can encrypt the hard drive of an attacker when they attempt to access data
pg 208
answer
The USB device can encrypt the hard drive of an attacker when they attempt to access data
question
If using the MD5 hashing algorithm, what is the length to which each message is padded?
32 bits
64 bits
128 bits
512 bits
answer
512bits
question
If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message?
Alice's private key
Alice's private key
Bob's public key
Bob's public key
answer
Alice's public key
question
What is data called that is to be encrypted by inputting it into an cryptographic algorithm?
plaintext
cleartext
opentext
ciphertext
answer
plaintext
question
The Trusted Platform Module (TPM) _____.
allows the user to boot a corrupted disk and repair it
is available only on Windows computers running BitLocker
includes a pseudorandom number generator (PRNG)
provides cryptographic services in hardware instead of software
answer
provides cryptographic services in hardware instead of software
question
Which asymmetric encryption algorithm uses prime numbers?
EFS
quantum computing
ECC
RSA
answer
RSA
question
Which of these is NOT a characteristic of a secure hash algorithm?
Collisions should be rare
The results of a hash function should not be reversed
The hash should always be the same fixed size
A message cannot be produced from the predefined hash
answer
Collisions should be rare
question
Which of these is NOT a basic security protection for information that cryptography can provide?
risk loss
integrity
confidentiality
authenticity
answer
risk loss
question
Elliptic Curve Diffie-Hellman (ECDH) is an example of _____
in-band key exchange
out-of-band key exchange
SHA-1 key managment
AES key certification
answer
in-band key exchange
question
Public key systems that generate random public keys that are different for each session are called _____
Public Key Exchange (PKE)
Elliptic Curve Diffie-Hellman (ECDH)
Diffie-Hellman (DH)
perfect forward secrecy
answer
perfect forward secrecy
question
Which protection is provided by hashing?
authenticity
confidentiality
integrity
availability
answer
integrity
question
Which of these is the strongest symmetric cryptographic algorithm?
Advanced Encryption Standard
Data Encryption Standard
Triple Data Encryption Standard
Rivest Cipher (RC) 1
answer
Advanced Encryption Standard
question
Which type of cryptographic algorithm takes an input string of any length, and returns a string of any requested variable length?
Substitution
Block
Loop
Sponge
answer
Sponge
question
NTRUEncrypt is based on which cryptography method?
Quantum-based
Prim number based
Lattice-based
Elliptic curve cryptography
answer
Lattice-based
question
What is the block cipher algorithm that operates on 64-bit blocks and can have a key length from 32 to 448 bits known as?
RSA
AES
Blowfish
3DES
answer
Blowfish
question
A key that is generated by a symmetric cryptographic algorithm is said to be a:
private key
public key
symmetric key
shared key
answer
private key
question
What is the disadvantage of RSA compared to most symmetrical algorithms?
There is no disadvantage of asymmetrical algorithms
RSA is slower in software but not in hardware
RSA is complicated and slower than other algorithms
RSA doesn't provide nonrepudiation like symmetrical algorithms
answer
RSA is complicated and slower than other algorithms