Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
50 Cards in this Set
- Front
- Back
Which of the following allows an attacker to manipulate files by using the least significant bit(s) to secretly embed data?
a. Steganography b. Worm c. Trojan horse d. Virus |
a. Steganography
|
|
Which of the following is MOST efficient for encrypting large amounts of data?
a. Hashing algorithms b. Symmetric key algorithms c. Asymmetric key algorithms d. ECC algorithms |
b. Symmetric key algorithms
|
|
Which of the following is the main objective of steganography?
a. Message digest b. Encrypt information c. Hide information d. Data integrity |
c. Hide information
|
|
How many keys are utilized with asymmetric cryptography?
a. One b. Two c. Five d. Seven |
b. Two
|
|
Which of the following would allow for secure key exchange over an unsecured network without a pre-shared key?
a. 3DES b. AES c. DH-ECC d. MD5 |
c. DH-ECC
|
|
Which of the following encryption algorithms is decrypted in the LEAST amount of time?
a. RSA b. AES c. 3DES d. L2TP |
b. AES
|
|
Which of the following increases the collision resistance of a hash?
a. Salt b. Increase the input length c. Rainbow Table d. Larger key space |
a. Salt
|
|
Which of the following BEST describes a private key in regards to asymmetric encryption?
a. The key owner has exclusive access to the private key. b. Everyone has access to the private key on the CA. c. Only the CA has access to the private key. d. The key owner and a recipient of an encrypted email have exclusive access to the private key. |
a. The key owner has exclusive access to the private key.
|
|
Which of the following ensures a user cannot deny having sent a message?
a. Availability b. Integrity c. Non-repudiation d. Confidentiality |
c. Non-repudiation
|
|
Which of the following allows an attacker to embed a rootkit into a picture?
a. Trojan horse b. Worm c. Steganography d. Virus |
c. Steganography
|
|
An administrator has been asked to encrypt credit card data. Which of the following algorithms would be the MOST secure with the least CPU utilization?
a. 3DES b. AES c. SHA-1 d. MD5 |
b. AES
|
|
Which of the following algorithms is the LEAST secure?
a. NTLM b. MD5 c. LANMAN d. SHA-1 |
c. LANMAN
|
|
Which of the following algorithms is MOST closely associated with the signing of email messages?
a. MD5 b. TKIP c. PGP d. SHA-1 |
c. PGP
|
|
An executive uses PKI to encrypt sensitive emails sent to an assistant. In addition to encrypting the body of the email, the executive wishes to encrypt the signature so that the assistant can verify that the email actually came from the executive. Which of the following asymmetric keys should the executive use to encrypt the signature?
a. Public b. Private c. Shared d. Hash |
b. Private
|
|
Which of the following is considered the weakest encryption?
a. AES b. DES c. SHA d. RSA |
b. DES
|
|
Which of the following encryption schemes is the public key infrastructure based on?
a. Quantum b. Elliptical curve c. Asymmetric d. Symmetric |
c. Asymmetric
|
|
Which of the following is MOST likely provided by asymmetric key cryptography?
a. Performance b. A pre-shared key c. Kiting d. Confidentiality |
d. Confidentiality
|
|
All of the following are symmetric key algorithms EXCEPT:
a. ECC. b. Rijndael. c. 3DES. d. RC4. |
a. ECC
|
|
Which of the following is true about ECC algorithms?
a. It is the algorithm used in PGP. b. It is implemented in portable devices. c. It is a private key algorithm. d. It is CPU intensive. |
b. It is implemented in portable devices.
|
|
Which of the following algorithms have the smallest key space?
a. IDEA b. SHA-1 c. AES d. DES |
d. DES
|
|
Which of the following is the MOST recent addition to cryptography?
a. AES b. DES c. 3DES d. PGP |
a. AES
|
|
Which of the following requires a common pre-shared key before communication can begin?
a. Public key infrastructure b. Symmetric key cryptography c. Secure hashing algorithm d. Asymmetric key cryptography |
b. Symmetric key cryptography
|
|
Which of the following allows for proof that a certain person sent a particular email?
a. Steganography b. Integrity c. Trusted Platform Module d. Non-repudiation |
d. Non-repudiation
|
|
A user needs to verify that a patch file downloaded from a third party has not been modified since the time that the original manufacturer released the patch. Which of the following is the BEST way to verify that the file has not been modified?
a. Compare the final MD5 hash with the original. b. Download the patch file over an AES encrypted VPN connection. c. Compare the final LANMAN hash with the original. d. Download the patch file through a SSL connection. |
a. Compare the final MD5 hash with the original
|
|
Which of the following describes the difference between a secure cipher and a secure hash?
a. A hash produces a variable output for any input size, a cipher does not. b. A cipher produces the same size output for any input size, a hash does not. c. A cipher can be reversed, a hash cannot. d. A hash can be reversed, a cipher cannot. |
c. A cipher can be reversed, a hash cannot.
|
|
Which of the following BEST describes the differences between SHA-1 and MD5?
a. MD5 produces variable length message digests. b. SHA-1 produces few collisions than MD5. c. MD5 produces few collisions than SHA-1. d. SHA-1 produces fixed length message digests. |
b. SHA-1 produces few collisions than MD5
|
|
The service provided by message authentication code (MAC) hash is:
a. fault tolerance. b. key recovery. c. data recovery. d. integrity. |
d. integrity.
|
|
A user logs into their network with a smart card. Which of the following keys is used?
a. Cipher key b. Shared key c. Public key d. Private key |
d. Private key
|
|
Which of the following would BEST allow for fast, highly secure encryption of a USB flash drive?
a. SHA-1 b. MD5 c. 3DES d. AES256 |
d. AES256
|
|
Which of the following hashing techniques is commonly disabled to make password cracking more difficult?
a. NTLM b. AES c. OVAL d. Kerberos |
a. NTLM
|
|
A manufacturing corporation has decided to send a highly sensitive message to one of their suppliers. The message is concealed inside a JPEG image of a beach resort. Which of the following is this an example of?
a. Cryptography b. Digital signature c. Hashing d. Steganography |
d. Steganography
|
|
Which of the following describes the process of comparing cryptographic hash functions of system executables, configuration files, and log files?
a. File integrity auditing b. Host based intrusion detection c. Network based intrusion detection d. Stateful packet filtering |
a. File integrity auditing
|
|
Which of the following is a cryptographic representation of non-repudiation?
a. Digital signature b. Internet key exchange c. Certificate authority d. Symmetric key |
a. Digital signature
|
|
Which of the following will provide a 128-bit hash?
a. MD5 b. AES128 c. ROT13 d. SHA-1 |
a. MD5
|
|
Which of the following describes a hash algorithms ability to avoid the same output from two guessed inputs?
a. Collision avoidance b. Collision resistance c. Collision strength d. Collision metric |
b. Collision resistance
|
|
How many keys are utilized in symmetric cryptography?
a. One b. Two c. Three d. Four |
a. One
|
|
Which of the following terms is BEST associated with public key infrastructure (PKI)?
a. MD5 hashing b. Symmetric key c. Symmetric algorithm d. Digital signatures |
d. Digital signatures
|
|
Which of the following encryption algorithms has the largest overhead?
a. AES256 b. 3DES c. AES d. RSA |
b. 3DES
|
|
Which of the following hashing algorithms is the MOST secure?
a. LANMAN b. SHA-1 c. MD5 d. CHAP |
b. SHA-1
|
|
Which of the following hashing algorithms is the LEAST secure?
a. SHA-1 b. LANMAN c. NTLM d. MD5 |
b. LANMAN
|
|
Which of the following implements the strongest hashing algorithm?
a. NTLMv2 b. NTLM c. VLAN d. LANMAN |
a. NTLMv2
|
|
Which of the following is a cryptographic hash function?
a. RSA b. SHA c. RC4 d. ECC |
b. SHA
|
|
Which of the following encryption algorithms is used for encryption and decryption of data?
a. MD5 b. SHA-1 c. NTLM d. RC5 |
d. RC5
|
|
Which of the following would a technician use to check data integrity?
a. Digital signature algorithm b. Encapsulating security protocol c. Rivest cipher 4 d. Message authentication code |
d. Message authentication code
|
|
Which of the following are the functions of asymmetric keys?
a. Decrypt, decipher, encode and encrypt b. Sign, validate, encrypt and verify c. Decrypt, validate, encode and verify d. Encrypt, sign, decrypt and verify |
d. Encrypt, sign, decrypt and verify
|
|
A technician tracks the integrity of certain files on the server. Which of the following algorithms provide this ability?
a. SHA-1 b. 3DES c. XOR d. AES |
a. SHA-1
|
|
Which of the following is an encryption program used to secure email and voice over the Internet?
a. PGP b. S/MIME c. ECC d. Blowfish |
a. PGP
|
|
Which of the following is used for securing communication between a client and a server?
a. NTLM b. SHA-1 c. MD5 d. SMTP |
a. NTLM
|
|
Which of the following symmetric encryption algorithms was utilized FIRST?
a. AES b. Serpent c. Whirlpool d. DES |
d. DES
|
|
Which of the following are characteristics of a hash function? (Select TWO).
a. One-way b. Encrypts a connection c. Ensures data can be easily decrypted d. Fixed length output e. Requires a key |
a. One-way
d. Fixed length output |