Simulation Lab 1 Answers :
1) Encryption
2) Cipher
3) Either of these
4) All of these
Simulation Lab 2 Answers :
1) 5 and 3
2) 3
3) D
4) A
5) D and N
Simulation Lab 3 Answer :
1) All of these
2) Online Certificate Status Protocol (OCSP)
7
Question
If two segments need to talk to each other in a segmented network, which of the following is required?
Correct
7
Question
Which of the following algorithms are examples of lightweight cryptography? [Choose all that apply]
Correct
7
Question
Which of the following type of vulnerability scan can also attempt to exploit the vulnerabilities?
Correct
Plaintext
is the message or data in its natural format and in readable form.
Hardware-based
encryption uses a device with a processor designed specifically to authenticate users and encrypt data.
Algorithms
are mathematical functions that are used in the encryption and encryption processes. They can be quite simple or extremely complex
Ciphertext
is the altered form of a plaintext message so as to abe unreadble for anyone except the intended recipients.
HTTPS
is a protocol that secures communication and data transfer between a user's web browser and a website.
Asymmetric cryptography is a process that uses a pair of related keys -- one public key and one private key -- to encrypt and decrypt a message and protect it from unauthorized access or use
SSL is a standard security technology for establishing an encrypted link between a server and a client-typically a web server (website) and a browser, or a mail server and a mail client (e.g., Outlook). It is also known as TLS , which is the successor technology of SSL.
Encryption is the process and act of converting the message from its plaintext to ciphertext.
Software-based
encryption refers to programs that use a computer's processing power to encrypt data.
Public key infrastructure
is a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates.
Decryption is the process of converting a ciphertext message back into plaintext through the use of the cryptographic algorithm and key (cryptovariable) that was used to do the original encryption
Symmetric encryption is a type of encryption where only one key (a secret key) is used to both encrypt and decrypt electronic data. The entities communicating via symmetric encryption must exchange the key so that it can be used in the decryption process.
Cryptography can prevent an individual from fraudulently reneging on an action. What is this known as?
Hide Feedback
Correct
Brielle is researching substitution ciphers. She came across a cipher in which the entire alphabet was rotated 13 steps. What type of cipher is this?
Hide Feedback
Correct
Which of the following is FALSE about "security through obscurity"?
Hide Feedback
Correct
What is low latency?
Hide Feedback
Correct
What are public key systems that generate different random public keys for each session?
Hide Feedback
Correct
What is data called that is to be encrypted by inputting it into a cryptographic algorithm?
Hide Feedback
Correct
Which of these is NOT a basic security protection for information that cryptography can provide?
Hide Feedback
Correct
Cicero is researching hash algorithms. Which algorithm would produce the longest and most secure digest?
Hide Feedback
Correct
Which of the following is NOT a symmetric cryptographic algorithm?
Hide Feedback
Correct
Which of the following is not to be decrypted but is only used for comparison purposes?
Hide Feedback
Correct
Which of these is NOT a characteristic of a secure hash algorithm?
Hide Feedback
Correct
Deo has been asked to explain RSA to his colleague. After his explanation, Deo is asked what, if any, weaknesses RSA has. How would Deo respond?
Hide Feedback
Correct
Which of these is the strongest symmetric cryptographic algorithm?
Hide Feedback
Correct
If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message?
Hide Feedback
Correct
Egor wanted to use a digital signature. Which of the following benefits will the digital signature NOT provide?
Hide Feedback
Correct
Basil was reading about a new attack that forces the system to abandon a higher cryptographic security mode of operation and instead fall back to an older and less secure mode. What type of attack is this?
Hide Feedback
Correct
What is a collision?
Hide Feedback
Correct
Which of the following is NOT a characteristic of the Trusted Platform Module (TPM)?
Hide Feedback
Correct
Which of these provides cryptographic services and is external to the device?
Hide Feedback
Correct
Which is an IPsec protocol that authenticates that packets received were sent from the source?
Hide Feedback
Correct
What is the name of the fields in an X.509 digital certificate that are used when the parties negotiate a secure connection?
Hide Feedback
Correct
What entity calls in crypto modules to perform cryptographic tasks?
Hide Feedback
Correct
_____ are symmetric keys to encrypt and decrypt information exchanged during the session and to verify its integrity.
Hide Feedback
Correct
What is the name of the device protected by a digital certificate?
Hide Feedback
Correct
What is the strongest technology that would assure Alice that Bob is the sender of a message?
Hide Feedback
Correct
Olivia is explaining to a friend about digital certificates. Her friend asks what two entities a digital certificate associates or binds together. What would Olivia say?
Hide Feedback
Correct
Which of the following can a digital certificate NOT be used for?
Hide Feedback
Correct
Who verifies the authenticity of a CSR?
Hide Feedback
Correct
A centralized directory of digital certificates is called a(n) _____.
Hide Feedback
Correct
Elton needs his application to perform a real-time lookup of a digital certificate's status. Which technology would he use?
Hide Feedback
Correct
What is the purpose of certificate chaining?
Hide Feedback
Correct
Which of the following is NOT a means by which a newly approved root digital certificate is distributed?
Hide Feedback
Correct
Which block cipher mode of operating requires that both the message sender and receiver access a counter that computes a new value whenever a ciphertext block is exchanged?
Hide Feedback
Correct
Which is the first step in a key exchange?
Hide Feedback
Correct
What is the file extension for a Cryptographic Message Syntax Standard based on PKCS#7 that defines a generic syntax for defining digital signature and encryption?
Hide Feedback
Correct
Juan needs a certificate that must only authenticate that a specific organization has the right to use a particular domain name. What type of certificate does he need?
Hide Feedback
Correct
How is confidentiality achieved through IPsec?
Hide Feedback
Correct
Which refers to a situation in which keys are managed by a third party, such as a trusted CA?
Hide Feedback
Correct
Which is a protocol for securely accessing a remote computer in order to issue a command?
Hide Feedback
Correct
Comments
Post a Comment