Check answers here:
Modules 15 – 17: Cryptography Group Exam Answers Full
Quiz-summary
0 of 24 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
Information
Network Security (Version1.0) Modules 15 – 17: Cryptography Group Test Online
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 24 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- Answered
- Review
-
Question 1 of 24
1. Question
1 pointsWhich algorithm can ensure data integrity?Correct
Incorrect
Hint
Data integrity guarantees that the message was not altered in transit. Integrity is ensured by implementing either of the Secure Hash Algorithms (SHA-2 or SHA-3). The MD5 message digest algorithm is still widely in use. -
Question 2 of 24
2. Question
1 pointsWhat is the keyspace of an encryption algorithm?Correct
Incorrect
Hint
The keyspace of an encryption algorithm is the set of all possible key values. Keys with n bits produce a keyspace with 2^ n possible key values. -
Question 3 of 24
3. Question
1 pointsAlice and Bob are using a digital signature to sign a document. What key should Alice use to sign the document so that Bob can make sure that the document came from Alice?Correct
Incorrect
Hint
Alice and Bob are used to explain asymmetric cryptography used in digital signatures. Alice uses a private key to encrypt the message digest. The message, encrypted message digest, and the public key are used to create the signed document and prepare it for transmission. -
Question 4 of 24
4. Question
1 pointsWhich three security services are provided by digital signatures? (Choose three.)Correct
Incorrect
Hint
Digital signatures are a mathematical technique used to provide three basic security services. Digital signatures have specific properties that enable entity authentication and data integrity. In addition, digital signatures provide nonrepudiation of the transaction. In other words, the digital signature serves as legal proof that the data exchange did take place. -
Question 5 of 24
5. Question
1 pointsWhat is another name for confidentiality of information?Correct
Incorrect
Hint
Privacy is another name for confidentiality. Accuracy, consistency, and trustworthiness describe integrity of data. -
Question 6 of 24
6. Question
1 pointsAs data is being stored on a local hard disk, which method would secure the data from unauthorized access?Correct
Incorrect
Hint
Data encryption is the process of converting data into a form where only a trusted, authorized person with a secret key or password can decrypt the data and access the original form. -
Question 7 of 24
7. Question
1 pointsWhat popular encryption algorithm requires that both the sender and receiver know a pre-shared key?Correct
Incorrect
Hint
MD5 is a hashing algorithm that guarantees that no one intercepted the message and altered it. Advanced Encryption Standard (AES) is a popular symmetric encryption algorithm where each communicating party needs to know the pre-shared key. Public key infrastructure (PKI) is an asymmetric encryption algorithm based on the assumption that the two communicating parties have not previously shared a secret key. HMAC is a hash message authentication code that guarantees that the message is not a forgery and actually comes from the authentic source. -
Question 8 of 24
8. Question
1 pointsIn which method used in cryptanalysis does the attacker know a portion of the plaintext and the corresponding ciphertext?Correct
Incorrect
Hint
There are several methods used in cryptanalysis:- Brute-force – The attacker tries every possible key knowing that eventually one of them will work.
- Ciphertext – The attacker has the ciphertext of several messages encrypted but no knowledge of the underlying plaintext.
- Known-Plaintext – The attacker has access to the ciphertext of several messages and knows something about the plaintext underlying that ciphertext.
- Chosen-Plaintext – The attacker chooses which data the encryption device encrypts and observes the ciphertext output.
- Chosen-Ciphertext – The attacker can choose different ciphertext to be decrypted and has access to the decrypted plaintext.
- Meet-in-the-Middle – The attacker knows a portion of the plaintext and the corresponding ciphertext.
-
Question 9 of 24
9. Question
1 pointsMatch the disciplines or roles to the descriptions.Correct
Incorrect
-
Question 10 of 24
10. Question
1 pointsWhat technology supports asymmetric key encryption used in IPsec VPNs?Correct
Incorrect
Hint
IKE, or Internet Key Exchange, is a protocol to support asymmetric encryption algorithms. It is used to securely exchange encryption keys in the setup of IPsec VPNs. -
Question 11 of 24
11. Question
1 pointsWhat are two symmetric encryption algorithms? (Choose two.)Correct
Incorrect
Hint
MD5, HMAC, and SHA are hashing algorithms. -
Question 12 of 24
12. Question
1 pointsWhich two items are used in asymmetric encryption? (Choose two.)Correct
Incorrect
Hint
A token is something that is used to provide two-factor authentication. DES is using an identical key to encrypt and decrypt. Asymmetric encryption uses a private key associated with a public key. -
Question 13 of 24
13. Question
1 pointsWhat are two properties of a cryptographic hash function? (Choose two.)Correct
Incorrect
Hint
A cryptographic hash function should have the following properties:- The input can be any length.
- The output has a fixed length.
- The hash value is relatively easy to compute for any given input.
- The hash is one way and not reversible.
- The hash is collision free, meaning that two different input values will result in different hash values
-
Question 14 of 24
14. Question
1 pointsWhich statement describes asymmetric encryption algorithms?Correct
Incorrect
Hint
DES, 3DES, and AES are examples of symmetric encryption algorithms (also known as shared secret key algorithms). The usual key length for symmetric algorithms is 80-256 bits. Asymmetric algorithms are relatively slow because they are based on difficult computational algorithms. -
Question 15 of 24
15. Question
1 pointsAn IT enterprise is recommending the use of PKI applications to securely exchange information between the employees. In which two cases might an organization use PKI applications to securely exchange information between users? (Choose two.)Correct
Incorrect
Hint
The Public Key Infrastructure (PKI) is a third party-system referred to as a certificate authority or CA. The PKI is the framework used to securely exchange information between parties. Common PKI applications are as follows:- SSL/TLS certificate-based peer authentication
- Secure network traffic using IPsec VPNs
- HTTPS Web traffic
- Control access to the network using 802.1x authentication
- Secure email using the S/MIME protocol
- Secure instant messaging
- Approve and authorize applications with Code Signing
- Protect user data with the Encryption File System (EFS)
- Implement two-factor authentication with smart cards
- Securing USB storage devices
-
Question 16 of 24
16. Question
1 pointsTwo users must authenticate each other using digital certificates and a CA. Which option describes the CA authentication procedure?Correct
Incorrect
Hint
When two users must authenticate each other using digital certificates and CA, both users must obtain their own digital certificate from a CA. They submit a certificate request to a CA, and the CA will perform a technical verification by calling the end user (out-of-band). Once the request is approved, the end user retrieves the certificate over the network (in-band) and installs the certificate on the system. After both users have installed their certificate, they can perform authentication by sending their certificate to each other. Each site will use the public key of the CA to verify the validity of the certificate; no CA is involved at this point. If both certificates are verified, both users can now authenticate each other. -
Question 17 of 24
17. Question
1 pointsThe following message was encrypted using a Caesar cipher with a key of 2:fghgpf vjg ecuvng
What is the plaintext message?Correct
Incorrect
Hint
The Caesar cipher was a simple substitution cipher. In this example, if the key is 2, the letter d was moved two spaces to the right, resulting in an encoded message that used the letter f in place of the letter d. The letter g would be the substitute for the letter e, and so on. So, the resulting plaintext is f=d, g=e, h=f, g=e, p=n, f=d, v=t, j=h, g=e, e=c, c=a, u=s, v=t, n=l, g=e. -
Question 18 of 24
18. Question
1 pointsIn a hierarchical CA topology, where can a subordinate CA obtain a certificate for itself?Correct
Incorrect
Hint
In a hierarchical CA topology, CAs can issue certificates to end users and to subordinate CAs, which in turn issue their certificates to end users, other lower level CAs, or both. In this way, a tree of CAs and end users is built in which every CA can issue certificates to lower level CAs and end users. Only the root CA can issue a self-signing certificate in a hierarchical CA topology. -
Question 19 of 24
19. Question
1 pointsWhat is the purpose for using digital signatures for code signing?Correct
Incorrect
Hint
Code signing is used to verify the integrity of executable files downloaded from a vendor website. Code signing uses digital certificates to authenticate and verify the identity of a website. -
Question 20 of 24
20. Question
1 pointsWhat technology has a function of using trusted third-party protocols to issue credentials that are accepted as an authoritative identity?Correct
Incorrect
Hint
Digital certificates are used to prove the authenticity and integrity of PKI certificates, but a PKI Certificate Authority is a trusted third-party entity that issues PKI certificates. PKI certificates are public information and are used to provide authenticity, confidentiality, integrity, and nonrepudiation services that can scale to large requirements. -
Question 21 of 24
21. Question
1 pointsWhich requirement of secure communications is ensured by the implementation of MD5 or SHA hash generating algorithms?Correct
Incorrect
Hint
Integrity is ensured by implementing either MD5 or SHA hash generating algorithms. Many modern networks ensure authentication with protocols, such as HMAC. Data confidentiality is ensured through symmetric encryption algorithms, including DES, 3DES, and AES. Data confidentiality can also be ensured using asymmetric algorithms, including RSA and PKI. -
Question 22 of 24
22. Question
1 pointsWhat is an example of the one-time pad cipher?Correct
Incorrect
Hint
RC4 is an example of the one-time pad cipher, and it is widely used on the Internet. The Caesar cipher is a simple substitution cipher, and the Vigenère cipher is based on the Caesar cipher. An example of a transposition cipher is the rail fence cipher. -
Question 23 of 24
23. Question
1 pointsA company is developing a security policy for secure communication. In the exchange of critical messages between a headquarters office and a branch office, a hash value should only be recalculated with a predetermined code, thus ensuring the validity of data source. Which aspect of secure communications is addressed?Correct
Incorrect
Hint
Secure communications consists of four elements:- Data confidentiality – guarantees that only authorized users can read the message
- Data integrity – guarantees that the message was not altered
- Origin authentication – guarantees that the message is not a forgery and does actually come from whom it states
- Data nonrepudiation – guarantees that the sender cannot repudiate, or refute, the validity of a message sent
-
Question 24 of 24
24. Question
1 pointsWhat is the purpose of a digital certificate?Correct
Incorrect
Hint
Digital signatures commonly use digital certificates that are used to verify the identity of the originator in order to authenticate a vendor website and establish an encrypted connection to exchange confidential data. One such example is when a person logs into a financial institution from a web browser.
Net_Sec PW
p3rch p3rk1nzDrive 0n
Circle Back
Take 5