• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/50

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

50 Cards in this Set

  • Front
  • Back
Which of the following allows an attacker to manipulate files by using the least significant bit(s) to secretly embed data?
a. Steganography
b. Worm
c. Trojan horse
d. Virus
a. Steganography
Which of the following is MOST efficient for encrypting large amounts of data?
a. Hashing algorithms
b. Symmetric key algorithms
c. Asymmetric key algorithms
d. ECC algorithms
b. Symmetric key algorithms
Which of the following is the main objective of steganography?
a. Message digest
b. Encrypt information
c. Hide information
d. Data integrity
c. Hide information
How many keys are utilized with asymmetric cryptography?
a. One
b. Two
c. Five
d. Seven
b. Two
Which of the following would allow for secure key exchange over an unsecured network without a pre-shared key?
a. 3DES
b. AES
c. DH-ECC
d. MD5
c. DH-ECC
Which of the following encryption algorithms is decrypted in the LEAST amount of time?
a. RSA
b. AES
c. 3DES
d. L2TP
b. AES
Which of the following increases the collision resistance of a hash?
a. Salt
b. Increase the input length
c. Rainbow Table
d. Larger key space
a. Salt
Which of the following BEST describes a private key in regards to asymmetric encryption?
a. The key owner has exclusive access to the private key.
b. Everyone has access to the private key on the CA.
c. Only the CA has access to the private key.
d. The key owner and a recipient of an encrypted email have exclusive access to the private key.
a. The key owner has exclusive access to the private key.
Which of the following ensures a user cannot deny having sent a message?
a. Availability
b. Integrity
c. Non-repudiation
d. Confidentiality
c. Non-repudiation
Which of the following allows an attacker to embed a rootkit into a picture?
a. Trojan horse
b. Worm
c. Steganography
d. Virus
c. Steganography
An administrator has been asked to encrypt credit card data. Which of the following algorithms would be the MOST secure with the least CPU utilization?
a. 3DES
b. AES
c. SHA-1
d. MD5
b. AES
Which of the following algorithms is the LEAST secure?
a. NTLM
b. MD5
c. LANMAN
d. SHA-1
c. LANMAN
Which of the following algorithms is MOST closely associated with the signing of email messages?
a. MD5
b. TKIP
c. PGP
d. SHA-1
c. PGP
An executive uses PKI to encrypt sensitive emails sent to an assistant. In addition to encrypting the body of the email, the executive wishes to encrypt the signature so that the assistant can verify that the email actually came from the executive. Which of the following asymmetric keys should the executive use to encrypt the signature?
a. Public
b. Private
c. Shared
d. Hash
b. Private
Which of the following is considered the weakest encryption?
a. AES
b. DES
c. SHA
d. RSA
b. DES
Which of the following encryption schemes is the public key infrastructure based on?
a. Quantum
b. Elliptical curve
c. Asymmetric
d. Symmetric
c. Asymmetric
Which of the following is MOST likely provided by asymmetric key cryptography?
a. Performance
b. A pre-shared key
c. Kiting
d. Confidentiality
d. Confidentiality
All of the following are symmetric key algorithms EXCEPT:
a. ECC.
b. Rijndael.
c. 3DES.
d. RC4.
a. ECC
Which of the following is true about ECC algorithms?
a. It is the algorithm used in PGP.
b. It is implemented in portable devices.
c. It is a private key algorithm.
d. It is CPU intensive.
b. It is implemented in portable devices.
Which of the following algorithms have the smallest key space?
a. IDEA
b. SHA-1
c. AES
d. DES
d. DES
Which of the following is the MOST recent addition to cryptography?
a. AES
b. DES
c. 3DES
d. PGP
a. AES
Which of the following requires a common pre-shared key before communication can begin?
a. Public key infrastructure
b. Symmetric key cryptography
c. Secure hashing algorithm
d. Asymmetric key cryptography
b. Symmetric key cryptography
Which of the following allows for proof that a certain person sent a particular email?
a. Steganography
b. Integrity
c. Trusted Platform Module
d. Non-repudiation
d. Non-repudiation
A user needs to verify that a patch file downloaded from a third party has not been modified since the time that the original manufacturer released the patch. Which of the following is the BEST way to verify that the file has not been modified?
a. Compare the final MD5 hash with the original.
b. Download the patch file over an AES encrypted VPN connection.
c. Compare the final LANMAN hash with the original.
d. Download the patch file through a SSL connection.
a. Compare the final MD5 hash with the original
Which of the following describes the difference between a secure cipher and a secure hash?
a. A hash produces a variable output for any input size, a cipher does not.
b. A cipher produces the same size output for any input size, a hash does not.
c. A cipher can be reversed, a hash cannot.
d. A hash can be reversed, a cipher cannot.
c. A cipher can be reversed, a hash cannot.
Which of the following BEST describes the differences between SHA-1 and MD5?
a. MD5 produces variable length message digests.
b. SHA-1 produces few collisions than MD5.
c. MD5 produces few collisions than SHA-1.
d. SHA-1 produces fixed length message digests.
b. SHA-1 produces few collisions than MD5
The service provided by message authentication code (MAC) hash is:
a. fault tolerance.
b. key recovery.
c. data recovery.
d. integrity.
d. integrity.
A user logs into their network with a smart card. Which of the following keys is used?
a. Cipher key
b. Shared key
c. Public key
d. Private key
d. Private key
Which of the following would BEST allow for fast, highly secure encryption of a USB flash drive?
a. SHA-1
b. MD5
c. 3DES
d. AES256
d. AES256
Which of the following hashing techniques is commonly disabled to make password cracking more difficult?
a. NTLM
b. AES
c. OVAL
d. Kerberos
a. NTLM
A manufacturing corporation has decided to send a highly sensitive message to one of their suppliers. The message is concealed inside a JPEG image of a beach resort. Which of the following is this an example of?
a. Cryptography
b. Digital signature
c. Hashing
d. Steganography
d. Steganography
Which of the following describes the process of comparing cryptographic hash functions of system executables, configuration files, and log files?
a. File integrity auditing
b. Host based intrusion detection
c. Network based intrusion detection
d. Stateful packet filtering
a. File integrity auditing
Which of the following is a cryptographic representation of non-repudiation?
a. Digital signature
b. Internet key exchange
c. Certificate authority
d. Symmetric key
a. Digital signature
Which of the following will provide a 128-bit hash?
a. MD5
b. AES128
c. ROT13
d. SHA-1
a. MD5
Which of the following describes a hash algorithms ability to avoid the same output from two guessed inputs?
a. Collision avoidance
b. Collision resistance
c. Collision strength
d. Collision metric
b. Collision resistance
How many keys are utilized in symmetric cryptography?
a. One
b. Two
c. Three
d. Four
a. One
Which of the following terms is BEST associated with public key infrastructure (PKI)?
a. MD5 hashing
b. Symmetric key
c. Symmetric algorithm
d. Digital signatures
d. Digital signatures
Which of the following encryption algorithms has the largest overhead?
a. AES256
b. 3DES
c. AES
d. RSA
b. 3DES
Which of the following hashing algorithms is the MOST secure?
a. LANMAN
b. SHA-1
c. MD5
d. CHAP
b. SHA-1
Which of the following hashing algorithms is the LEAST secure?
a. SHA-1
b. LANMAN
c. NTLM
d. MD5
b. LANMAN
Which of the following implements the strongest hashing algorithm?
a. NTLMv2
b. NTLM
c. VLAN
d. LANMAN
a. NTLMv2
Which of the following is a cryptographic hash function?
a. RSA
b. SHA
c. RC4
d. ECC
b. SHA
Which of the following encryption algorithms is used for encryption and decryption of data?
a. MD5
b. SHA-1
c. NTLM
d. RC5
d. RC5
Which of the following would a technician use to check data integrity?
a. Digital signature algorithm
b. Encapsulating security protocol
c. Rivest cipher 4
d. Message authentication code
d. Message authentication code
Which of the following are the functions of asymmetric keys?
a. Decrypt, decipher, encode and encrypt
b. Sign, validate, encrypt and verify
c. Decrypt, validate, encode and verify
d. Encrypt, sign, decrypt and verify
d. Encrypt, sign, decrypt and verify
A technician tracks the integrity of certain files on the server. Which of the following algorithms provide this ability?
a. SHA-1
b. 3DES
c. XOR
d. AES
a. SHA-1
Which of the following is an encryption program used to secure email and voice over the Internet?
a. PGP
b. S/MIME
c. ECC
d. Blowfish
a. PGP
Which of the following is used for securing communication between a client and a server?
a. NTLM
b. SHA-1
c. MD5
d. SMTP
a. NTLM
Which of the following symmetric encryption algorithms was utilized FIRST?
a. AES
b. Serpent
c. Whirlpool
d. DES
d. DES
Which of the following are characteristics of a hash function? (Select TWO).
a. One-way
b. Encrypts a connection
c. Ensures data can be easily decrypted
d. Fixed length output
e. Requires a key
a. One-way
d. Fixed length output