IS5403 Week 3 All Quizezz

  1. Which of the following statements are true for application whitelisting and blacklisting? [Choose all that apply]

If an application or a specific path that contains the executables is blacklisted, then all executables within the defined path are blacklisted

An administrator can blacklist or whitelist applications that the users can run using Software Restriction Policies

2. Which mobile device management method allows the employee to purchase a mobile device, but the organization has complete control over the device?

Choose Your Own Device (CYOD)

3. To prevent the spread of an attack, which of the following methods of isolation can be used? [Choose all that apply]

Isolate the attacker

Isolate the affected systems

4. When implementing segmentation as a proactive measure, which of the following types of segments exist on a network? [Choose all that apply]

Datacenter

Guests

Users

5. If two segments need to talk to each other in a segmented network, which of the following is required?

Firewall

6. How many keys are required in asymmetric encryption?

2

7. What is the key length of the Data Encryption Standard (DES) algorithm?

56-bit

8. In asymmetric key encryption, what is the next step when a client initiates a session with a web server that is configured with a certificate?

The web server sends a certificate to the web browser

9. What is the minimum key size in Elliptical Curve Cryptography (ECC)?

160-bits

10. Which of the following algorithms are examples of lightweight cryptography? [Choose all that apply]

TWINE

OTR

11. Which of the following method of threat hunting includes disrupt, deny, destroy, and degrade actions?

Maneuvering

12. Which of the following is a condition that is shown as a result when it does not exist?

False Positive

13. Which of the following is used for continuous monitoring of logs?

Security information and event management (SIEM)

14. Which of the following is achieved by Security Orchestration, Automation, Response (SOAR)?

Automation

15. Which of the following type of vulnerability scan can also attempt to exploit the vulnerabilities?

Intrusive

16. Which of the following entity in the certificate authority (CA) hierarchy validates the certificate request from a client?

Registration Authority (RA)

17. Before a user requests a certificate from a CA, which of the following tasks must be completed?

Generate private and public keys

18. Which of the following certificates should you use with a Web server for testing purposes?

Self-Signed

19. Which type of certificate file format contains private and public keys and is protected by a password?

Personal information exchange (PFX)

20. A root CA should always be kept online. [TRUE/FALSE]

FALSE

21. Which of the following hides the existence of information?

a. Encryption
b. Decryption
c. Ciphering
d. Steganography

22. Cryptography can prevent an individual from fraudulently reneging on an action. What is this known as?

a. Obfuscation
b. Integrity
c. Nonrepudiation
d. Repudiation

23. Brielle is researching substitution ciphers. She came across a cipher in which the entire alphabet was rotated 13 steps. What type of cipher is this?

a. XOR
b. XAND13
c. Alphabetic
d. ROT13

24. Which of the following is FALSE about “security through obscurity”?

a. It attempts to hide the existence from outsiders.
b. Proprietary cryptographic algorithms are an example.
c. It is essentially impossible.
d. It can only provide limited security

25. What is low latency?

a. The time between when a byte is input into a cryptographic cipher and when the output is obtained.
b. The requirements for an IoT device that is using a specific network.
c. A low-power source requirement of a sensor.
d. The delay between when a substitution cipher decrypts the first block and when it finishes with the last block

26. What are public key systems that generate different random public keys for each session?

a. perfect forward secrecy
b. Elliptic Curve Diffie-Hellman (ECDH)
c. Public Key Exchange (PKE)
d. Diffie-Hellman (DH)

27. What is data called that is to be encrypted by inputting it into a cryptographic algorithm?

a. Plaintext
b. Ciphertext
c. Byte-text
d. Cleartext

28. Which of these is NOT a basic security protection for information that cryptography can provide?

a. Risk
b. Integrity
c. Confidentiality
d. Authenticity

29. Cicero is researching hash algorithms. Which algorithm would produce the longest and most secure digest?

a. MD5
b. SHA6-6
c. SHA3-512
d. SHA-256

30. Which of the following is NOT a symmetric cryptographic algorithm?

a. SHA
b. 3DES
c. DES
d. Blowfish

31. Which of the following is not to be decrypted but is only used for comparison purposes?

a. Key
b. Algorithm
c. Digest
d. Stream

32. Which of these is NOT a characteristic of a secure hash algorithm?

a. A message cannot be produced from a predefined hash.
b. Collisions should occur no more than 15 percent of the time.
c. The hash should always be the same fixed size.
d. The results of a hash function should not be reversed

33. Deo has been asked to explain RSA to his colleague. After his explanation, Deo is asked what, if any, weaknesses RSA has. How would Deo respond?

a. RSA has no known weaknesses.
b. The digest produced by the RSA algorithm is too short to be secure.
c. RSA weaknesses are based on ECC.
d. As computers become more powerful, the ability to compute factoring has increased.

34. Which of these is the strongest symmetric cryptographic algorithm?

a. Triple Data Encryption Standard
b. Data Encryption Standard
c. Advanced Encryption Standard
d. RC1

35. If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message?

a. Bob’s private key
b. Alice’s private key
c. Alice’s public key
d. Bob’s public key

36. Egor wanted to use a digital signature. Which of the following benefits will the digital signature NOT provide?

a. Verify the receiver
b. Verify the sender
c. Prove the integrity of the message
d. Enforce nonrepudiation

37. Basil was reading about a new attack that forces the system to abandon a higher cryptographic security mode of operation and instead fall back to an older and less secure mode. What type of attack is this?

a. Deprecation attack
b. Downgrade attack
c. Pullback attack
d. Obfuscation attack

38. What is a collision?

a. Two algorithms have the same key.
b. Two files produce the same digest.
c. Two ciphertexts have the same length.
d. Two keys are the same length.

39. Which of the following is NOT a characteristic of the Trusted Platform Module (TPM)?

a. It includes a pseudorandom number generator (PRNG).
b. It can easily be transported to another computer.
c. It provides cryptographic services in hardware instead of software.
d. It can generate asymmetric cryptographic public and private keys.

40. Which of these provides cryptographic services and is external to the device?

a. Hardware Security Module (HSM)
b. encrypted hardware-based USB devices
c. self-encrypting hard disk drives (SED)
d. Trusted Platform Module (TPM)

41. Which is an IPsec protocol that authenticates that packets received were sent from the source?

a. DER
b. PXP
c. CER
d. AH

42. What is the name of the fields in an X.509 digital certificate that are used when the parties negotiate a secure connection?

a. CTR
b. Certificate attributes
c. PFX
d. Electronic Code Book (ECB) repositories

43. What entity calls in crypto modules to perform cryptographic tasks?

a. Intermediate CA
b. Certificate Authority (CA)
c. OCSP
d. Crypto service provider

44. _____ are symmetric keys to encrypt and decrypt information exchanged during the session and to verify its integrity.

a. Digital certificates
b. Digital digests
c. Encrypted signatures
d. Session keys

45. What is the name of the device protected by a digital certificate?

a. TLXS
b. CN
c. V2X2
d. RCR

46. What is the strongest technology that would assure Alice that Bob is the sender of a message?

a. Digest
b. Digital signature
c. Digital certificate
d. Encrypted signature

47. Olivia is explaining to a friend about digital certificates. Her friend asks what two entities a digital certificate associates or binds together. What would Olivia say?

a. A private key with a digital signature
b. The user’s symmetric key with the public key
c. The user’s identity with their public key
d. The user’s public key with their private key

48. Which of the following can a digital certificate NOT be used for?

a. To encrypt channels to provide secure communication between clients and servers
b. To verify the authenticity of the CA
c. To encrypt messages for secure email communications
d. To verify the identity of clients and servers on the Web

49. Who verifies the authenticity of a CSR?

a. Certificate authority
b. Certificate signatory
c. Signature authority
d. Registration authority

50. A centralized directory of digital certificates is called a(n) _____.

a. Authorized digital signature (ADS)
b. Digital signature approval List (DSAP)
c. Certificate repository (CR)
d. Digital signature permitted authorization (DSPA

51. Elton needs his application to perform a real-time lookup of a digital certificate’s status. Which technology would he use?

a. Real-Time CA Verification (RTCAV)
b. Certificate Revocation List (CRL)
c. Online Certificate Status Protocol (OCSP)
d. Staple

52. What is the purpose of certificate chaining?

a. To lookup the name of intermediate RA
b. To group and verify digital certificates
c. To hash the private key
d. To ensure that a web browser has the latest root certificate updates

53. Which of the following is NOT a means by which a newly approved root digital certificate is distributed?

a. Pinning
b. OS updates
c. Web browser updates
d. Application updates

54. Which block cipher mode of operating requires that both the message sender and receiver access a counter that computes a new value whenever a ciphertext block is exchanged?

a. CD
b. CN
c. CTR
d. CXL

55. Which is the first step in a key exchange?

a. The web browser sends a message (“ClientHello”) to the server.
b. The web server sends a message (“ServerHello”) to the client.
c. The web browser verifies the server certificate.
d. The browser generates a random value (“pre-master secret”).

What is the file extension for a Cryptographic Message Syntax Standard based on PKCS#7 that defines a generic syntax for defining digital signature and encryption?

a. .P7B
b. .cer
c. .P12
d. .xdr

Other Links:

Statistics Quiz

Networking Quiz

See other websites for quiz:

Check on QUIZLET

Check on CHEGG






Leave a Reply

Your email address will not be published. Required fields are marked *