1. Refer to the exhibit. Which type of cipher method is depicted?
- stream cipher
- substitution cipher
- transposition cipher
- Caesar cipher
2. What are two objectives of ensuring data integrity? (Choose two.)
- Access to the data is authenticated.
- Data is unaltered during transit.
- Data is available all the time.
- Data is encrypted while in transit and when stored on disks.
- Data is not changed by unauthorized entities.
3. A network security specialist is tasked to implement a security measure that monitors the status of critical files in the data center and sends an immediate alert if any file is modified. Which aspect of secure communications is addressed by this security measure?
- data integrity
- data confidentiality
- origin authentication
4. Which type of attack allows an attacker to use a brute force approach?
- password cracking
- denial of service
- social engineering
- packet sniffing
5. Why would HMAC be used to help secure the data as it travels across various links?
- It is an asymmetric encryption algorithm used when the two communicating parties have not previously shared a secret key.
- It is a hashing algorithm used to guarantee that the message is not a forgery and actually comes from the authentic source.
- It is a hashing algorithm used to encrypt the message and guarantee that no one intercepted the message and altered it.
- It is a popular symmetric encryption algorithm used when each communicating party needs to know the pre-shared key.
6. What is the focus of cryptanalysis?
- developing secret codes
- breaking encrypted codes
- implementing encrypted codes
- hiding secret codes
7. What is cryptology?
- the science of making and breaking secret codes
- the science of creating transposition and substitution ciphers
- the science of guaranteeing that a message is not a forgery and comes from the authentic source
- the science of cracking the code without access to the shared secret key
8. Which objective of secure communications is achieved by encrypting data?
9. What is the purpose of a nonrepudiation service in secure communications?
- to provide the highest encryption level possible
- to ensure that the source of the communications is confirmed
- to confirm the identity of the recipient of the communications
- to ensure that encrypted secure communications cannot be decoded
10. What is an example of the transposition cipher?
- rail fence
11. A web server administrator is configuring access settings to require users to authenticate first before accessing certain web pages. Which requirement of information security is addressed through the configuration?
12. As data is being stored on a local hard disk, which method would secure the data from unauthorized access?
- data encryption
- deletion of sensitive files
- two factor authentication
- a duplicate hard drive copy