Identify the letter of the choice that best completes the statement or answers the question




НазваниеIdentify the letter of the choice that best completes the statement or answers the question
страница3/7
Дата конвертации30.10.2012
Размер0.79 Mb.
ТипДокументы
1   2   3   4   5   6   7

CCIS2400 (Security Essentials) Chapter 9 Study Guide


Multiple Choice

Identify the letter of the choice that best completes the statement or answers the question.


____ 1. If Bob is using symmetric key encryption and wants to securely communicate with 20 other users, how many secret keys must he keep and manage?

a.

1

c.

10

b.

5

d.

20



____ 2. Asymmetric algorithms can greatly improve cryptography _____.

a.

security

c.

flexibility

b.

convenience

d.

all of the above



____ 3. When using digital signatures, what key does the receiver use to decrypt the digital signature?

a.

the sender’s private key

c.

the receiver’s private key

b.

the sender’s public key

d.

the receiver’s public key



____ 4. What is the simplest method for a CA to identify the owner of a public key listed in a digital certificate?

a.

a visit to the CA office

c.

e-mail address

b.

fingerprint

d.

home address



____ 5. Garret wants to check the certificate status for users on his network. Where should he access this information?

a.

Certificate Directory

c.

Certificate Repository

b.

Restricted Certificate List

d.

Certificate Revocation List



____ 6. The _____ PKCS standard outlines the syntax of a request format for a certificate request.

a.

PKCS #2

c.

PKCS #8

b.

PKCS #4

d.

PKCS #10



____ 7. Alice is concerned that her company’s employees are being victimized by man-in-the-middle attacks. What should she implement on the network to ensure that this won’t happen?

a.

digital signatures

c.

digital certificates

b.

asymmetric cryptography

d.

symmetric cryptography



____ 8. Currently, PKCS is composed of _____ standards

a.

10

c.

14

b.

12

d.

15



____ 9. Windows Server 2003 supports PKCS #_____.

a.

3

c.

10

b.

7

d.

15



____ 10. In the _____ trust model, the primary or root certificate authority issues and signs the certificates for CAs below it.

a.

hierarchical

c.

third-party

b.

single-point

d.

web of trust



____ 11. Server certificates can be issued from a _____ server to ensure a secure transmission.

a.

Web

c.

mail

b.

FTP

d.

all of the above



____ 12. David is notified that one of the senior employees at XYZ Corporation is taking a leave of absence for six months. What status should he set on this user’s certificate?

a.

revoked

c.

expired

b.

suspended

d.

destroyed



____ 13. In key _____, the private key is actually split, and each half is encrypted.

a.

expiration

c.

escrow

b.

recovery

d.

renewal



____ 14. By default, most keys in a PKI system expire after _____ months of use.

a.

two

c.

four

b.

three

d.

six



____ 15. The M-of-N control technique is used for _____ of certificates.

a.

revocation

c.

suspension

b.

recovery

d.

destruction



____ 16. The _____ key handling procedure makes keys vulnerable to theft or misuse.

a.

expiration

c.

suspension

b.

renewal

d.

recovery



____ 17. ____________ cryptography uses one key to both encrypt and decrypt.

a.

symmetric

c.

PIK

b.

asymmetric

d.

DKH



____ 18. The primary weakness of symmetric cryptography is _________________________.

a.

key management

c.

CPU speed

b.

RAM requirements

d.

HDD space



____ 19. A ____________ is a shorter version of the message itself that is created by the contents of the message and the sender’s private key.

a.

hash algorithm

c.

digital certificate

b.

certificate authority

d.

digital signature



____ 20. Revoked digital certificates are listed in a(n) _____________________.

a.

CRL

c.

509.X

b.

CARA

d.

PKCF



____ 21. A subordinate certification authority server is known as a ____________ server.

a.

RA

c.

CES

b.

CA Proxy

d.

DCA-DAP



CCIS2400 (Security Essentials) Chapter 8 Study Guide


Multiple Choice

Identify the letter of the choice that best completes the statement or answers the question.


____ 1. _____ is the science of transforming information so that it is secure while it is being transmitted or stored.

a.

Steganography

c.

Encryption

b.

Cryptography

d.

Ciphering



____ 2. The process of encrypting and decrypting information is based on a mathematical procedure called a(n) _____.

a.

cipher

c.

algorithm

b.

key

d.

hash



____ 3. When only trusted users are provided with a cipher and a key to decrypt ciphertext _____ is achieved.

a.

confidentiality

c.

integrity

b.

authentication

d.

access control



____ 4. _____ restricts availability to information.

a.

Confidentiality

c.

Nonrepudiation

b.

Integrity

d.

Access control



____ 5. The TCP/IP protocol Simple Network Management Protocol (SNMP) version 2 uses the _____ hash algorithm.

a.

MD4

c.

SHA

b.

MD5

d.

DES



____ 6. Symmetric encryption is also called _____ key cryptography.

a.

private

c.

unique

b.

public

d.

session



____ 7. A _____ substitution cipher maps a single plaintext character to multiple ciphertext characters.

a.

monoalphabetic

c.

homoalphabetic

b.

Single Column

d.

Double Columnar



____ 8. DES encrypts 64-bit plaintext by executing the algorithm _____ times.

a.

4

c.

12

b.

8

d.

16



____ 9. How many key sizes does RC6 have?

a.

1

c.

3

b.

2

d.

4



____ 10. A _____ key is used in public key cryptography.

a.

public

c.

secret

b.

private

d.

both a and b



____ 11. The maximum length of a key in most versions of asymmetric algorithms is 16,638 bits, or _____ characters.

a.

1280

c.

2080

b.

1536

d.

3624



____ 12. The _____ asymmetric algorithm is slower than all other algorithms.

a.

RSA

c.

Elliptic curve cryptography

b.

Diffie-Hellman

d.

DES



____ 13. A _____ is an encrypted hash of a message that is transmitted along with the message.

a.

message digest

c.

cipher

b.

digital signature

d.

hash algorithm



____ 14. Confidentiality can be implemented through _____.

a.

Symmetric cryptography and asymmetric cryptography

b.

Asymmetric cryptography and hashing

c.

Hashing and digital signatures

d.

Symmetric cryptography and hashing



____ 15. EFS uses asymmetric cryptography and a per-_____ encryption key to encrypt and decrypt data.

a.

user

c.

volume

b.

folder

d.

file



____ 16. What is the name of the Windows 2003 Server command liine utility that can be used to encrypt and decrypt files?

a.

EFS.exe

c.

Crypto.exe

b.

Cipher.exe

d.

Secure.exe



____ 17. Which of these is NOT a protection provided by cryptography?

a.

confidentiality

c.

integrity

b.

speed

d.

authentication



____ 18. A(n) _______________ is never intended to be decrypted but is only used for comparison purposes.

a.

hash

c.

algorithm

b.

key

d.

PAM



____ 19. Which of this is NOT an example of how hashing is used?

a.

bank ATM machine

c.

determining the integrity of a message

b.

authenticating UNIX/Linux passwords

d.

encrypting/decrypting e-mail



____ 20. Which of these is NOT a characteristic of a secure hash?

a.

collisions should be rare

c.

the results of a hash function should not be reversed

b.

a message cannot be produced from a predefined hash

d.

the hash should always be the same fixed size



____ 21. The data added to a scetion of text when using the MD algorithm is called _____________.

a.

filler

c.

padding

b.

extender

d.

byte code


1   2   3   4   5   6   7

Похожие:

Identify the letter of the choice that best completes the statement or answers the question iconSection 1 Analytic Question Answers

Identify the letter of the choice that best completes the statement or answers the question iconWritten Answers to questions not answered at Mayor’s Question Time on

Identify the letter of the choice that best completes the statement or answers the question iconWritten Answers arising from the Plenary Assembly Question and Answer Session with Transport for London

Identify the letter of the choice that best completes the statement or answers the question iconNo fee of any kind may be charged for the material; all copied material must clearly identify its source and contain the statement on copyright shown below

Identify the letter of the choice that best completes the statement or answers the question iconFinancial statements Income statement Balance sheet Statement of cash flows Statement of changes in equity Notes to and forming part of the financial report

Identify the letter of the choice that best completes the statement or answers the question iconAppendix 1 London Assembly (Mayor’s Question Time) 12 December 2007 Transcript – Question and Answer Session

Identify the letter of the choice that best completes the statement or answers the question iconPhil265/Rels265 Final Exam 31 Multiple choice or True-False worth 1 mark each 3 Short Answer Questions from choice of 5 worth 3 marks each (paragraph or two in length) Introduction to Philosophy

Identify the letter of the choice that best completes the statement or answers the question iconThe Very Handy Manual: How to Catch and Identify Bees

Identify the letter of the choice that best completes the statement or answers the question icon20 Answers

Identify the letter of the choice that best completes the statement or answers the question iconLetter from the President


Разместите кнопку на своём сайте:
lib.convdocs.org


База данных защищена авторским правом ©lib.convdocs.org 2012
обратиться к администрации
lib.convdocs.org
Главная страница