D334 Intro to Cryptography PA

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/27

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

28 Terms

1
New cards

Which certificate management process involves key recovery? 
A: Initialization
B: Issued
C: Cancellation
D: Hold

B

2
New cards

Which algorithm is used to generate the thumbprint of a certificate? 
A: RSA

B: 3DES

C: AES

D: SHA-1

D

3
New cards

Large volumes of plaintext need to be encrypted, and the encryption keys need to be securely distributed.

Which approach should be used for encryption and distribution?
A: Encrypt by using symmetric keys and distribute by using asymmetric keys
B: Encrypt by using asymmetric keys and distribute by using symmetric keys
C: Encrypt by using symmetric keys and distribute by using symmetric keys
D: Encrypt by using asymmetric keys and distribute by using asymmetric keys

A

4
New cards

What should an administrator use to import and export all items written using X.509 that are part of a chain of trust? 
A: CER
B:  Public Key Cryptography Standard (PKCS) #7
C: Public Key Cryptography Standard (PKCS) #12
D: RTF

C

5
New cards

What is the maximum length (in bits) of encryption keys used by the WEP protocol?
A: 40
B: 56
C: 128
D: 256

A

6
New cards

What is a difference between WPA-Enterprise and WPA-Personal? 
A: Support for Temporal Key Integrity Protocol
B: Support for an authentication server
C: Use of a session key
D: Use of a 48-bit initialization vector

B

7
New cards

Which cipher is used with WEP? 
A: RC5
B: RC4
C: TKIP
D: AES

B

8
New cards

How does TKIP improve WPA over WEP?
A: Implements a RADIUS server
B: Implements a RADIUS server
C: Implements an authentication server
D: Creates an AES encryption key

A

9
New cards

Which mode encrypts each group with the same key, leaving each group independent of the others?
A: ECB
B: CBC

C: CFB
D: OFB

A

10
New cards

Which information protection method has an 80-bit key and operates on 64-bit data blocks? 
A: Skipjack
B: IDEA
C: DES
D: Twofish

A

11
New cards

How many transformation rounds does AES use with a 192-bit key? 
A: 10
B: 12
C: 14
D: 16

B

12
New cards

How many transformation rounds does AES use with a 128-bit key? 
A: 10
B: 12
C: 14
D: 16

A

13
New cards

Which cipher uses a grid to map letters into numeric values? 
A: Bifid
B: SHA-1
C: Caesar
D: Vigenere

A

14
New cards

What does a frequency analysis attack to break encryption involve? 
A: Analyzing ciphertext to identify text variation and comparing the text to standard English characters
B: Performing an exhaustive search to attempt every possible mapping or key
C: Interfering between two parties and sometimes intercepting or modifying data in the communication stream
D: Identifying part of the ciphertext and the corresponding plaintext

A

15
New cards


Which technique should a security analyst use to determine the key length in a Vigenère cipher?
A: Frequency Analysis
B: Brute Force
C: Kasiski examination
D: Known plaintext

C

16
New cards

What is the length (in bits) of an MD5 hash output? 
A: 32
B: 64
C: 128
D: 256

C

17
New cards

How many characters are used in an LM hash password? 
A: 7
B: 8
C: 14
D: 16

C

18
New cards

A Windows credential is identified as follows: user:FDA95FBABC199D22LLD3B435B51876KK:199DDFD4EF0E9CD9KMNC6FE771IL124B8:::

What is used to store this password?
A: MD5
B: Bcrypt
C: SHA-512
D: NTLM

D

19
New cards

What is an example of a symmetric algorithm? 
A: RSA
B: AES
C: SHA
D: MD5

B

20
New cards

Which two components involved in performing encryption are known to the party that will perform decryption before symmetric encryption is applied?

Choose 2 answers.

A: Cryptographic algorithm
B: Cryptographic key
C: Plaintext content
D: Initialization vector
E: Nonce value

A, B

21
New cards

Which symmetric encryption technique uses a 56-bit key size and a 64-bit block size? 
A: AES
B: DES
C: 3DES
D: IDEA

B

22
New cards

Which wireless security standard uses a 128-bit RC4 stream cipher for encrypted communications? 
A: WPA
B: WEP
C: VPN
D: GSM

A

23
New cards

What should be used when large amounts of data need to be encrypted and decrypted for secure storage based on groupings of 128, 192, or 256 bits? 
A: Symmetric stream
B: Symmetric block
C: Asymmetric public key
D: Asymmetric private key

B

24
New cards

Why is symmetric stream used to encrypt video when speed is a major concern?
A: It signs files and encrypts that hash of the file to verify integrity and authenticity.
B: It encrypts and decrypts data in blocks of characters at a time with a complex algorithm.
C: It encrypts a small amount of information, which is decrypted with a private key.
D: It uses the same key to encrypt and decrypt large amounts of media.

D

25
New cards

Which mechanism mitigates a copy-and-paste attack when using AES? 
A: Electronic Code Book (ECB)
B: Output feedback (OFB) loop
C: Message digest 6 (MD6)
D: Secure Hash Algorithm 1 (SHA-1)

B

26
New cards


How is information about Bitcoin transactions stored? 
A: Command and control center
B: Platform as a service in the cloud
C: Infrastructure as a service in the cloud
D: Distributed peer-to-peer network

D

27
New cards

What is one of the primary characteristics of a blockchain in the context of Bitcoin?
A: Adding blocks to a blockchain is computationally expensive.
B: The security of the chain in a blockchain is independent of its length.
C: Transactions between each block are chained.
D: Transactions within each block are chained.

A

28
New cards

What is the length (in bits) of the private key used to sign transactions and associated with an individual wallet in the context of Bitcoin? 
A: 64
B: 128
C: 256
D: 512

C