Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Media Study
Q:
Which of the following is a type of VPN?
A) Host-to-host
B) Remote access
C) Both A and B
D) Neither A nor B
Q:
Companies transmit over the wireless LANs because WLANs ________.
A) are inexpensive
B) are secure
C) Both A and B
D) Neither A nor B
Q:
Companies transmit over the Internet because the Internet ________.
A) is inexpensive
B) is secure
C) Both A and B
D) Neither A nor B
Q:
A ________ is a cryptographic system that provides secure communication over an untrusted network.
A) virtual private network
B) secure link
C) complete cryptographic system
D) None of the above.
Q:
The first task in establishing a cryptographic system is selecting a cryptographic system standard for the dialogue.
Q:
Quantum key cracking ________.
A) is a way to deliver enormously long keys to communication partners
B) creates a major threat to many traditional cryptographic methods
C) Both A and B
D) Neither A nor B
Q:
Quantum key distribution ________.
A) is a way to deliver enormously long keys to communication partners
B) creates a major threat to many traditional cryptographic methods
C) Both A and B
D) Neither A nor B
Q:
Nonces can be used in ________.
A) all applications
B) client/server applications
C) time-insensitive applications
D) persistent applications
Q:
________ thwart replay attacks by ensuring "freshness" using cutoff values.
A) Time stamps
B) Sequence numbers
C) Nonces
D) All of the above.
Q:
Replay attacks can be thwarted by using ________.
A) time stamps
B) sequence numbers
C) nonces
D) All of the above.
Q:
In a replay attack, the attacker cannot read the contents of the replayed message.
Q:
An attack where an adversary intercepts an encrypted message and transmits it again later is called a ________.
A) replay attack
B) reflex attack
C) reflection attack
D) resend attack
Q:
HMACs provide the cryptographic protection of ________.
A) authentication
B) nonrepudiation
C) Both A and B
D) Neither A nor B
Q:
Which of the following measures do HMACs use?
A) Symmetric key encryption
B) Public key encryption
C) Hashing
D) All of the above
Q:
HMACs provide the cryptographic protection of ________.
A) message authentication
B) message integrity
C) Both A and B
D) Neither A nor B
Q:
A digital ________, by itself, provides authentication.
A) signature
B) certificate
C) Both A and B
D) Neither A nor B
Q:
To check a certificate's revocation status, the verifier can ________.
A) download the CRL from the CA
B) send an OCSP message to the CA
C) Both A and B
D) Neither A nor B
Q:
To ensure that a digital certificate is valid, the receiver of the certificate must check ________.
A) the digital signature
B) the valid period
C) whether the certificate has been revoked
D) All of the above.
Q:
To ensure that a digital certificate is valid, the receiver of the certificate must check ________.
A) the digital signature
B) the valid period
C) Both A and B
D) Neither A nor B
Q:
A digital certificate ________.
A) indicates that the person or firm named in the certificate is reasonably trustworthy
B) gives the subject's public key
C) Both A and B
D) Neither A nor B
Q:
Most CAs are not regulated.
Q:
It is OK for a verifier to receive digital certificates from the sender.
Q:
Which of the following fields are contained on a digital certificate?
A) Public key
B) Digital signature
C) Serial number
D) All of the above
Q:
In public key encryption for authentication, the receiver decrypts with the public key of the sender.
Q:
The sender the uses public key of the recipient in ________.
A) public key encryption for confidentiality
B) public key encryption for authentication
C) Both A and B
D) Neither A nor B
Q:
Most message-by-message authentication methods provide message integrity as a by-products.
Q:
Digital signatures provide ________.
A) message authentication
B) message integrity
C) Both A and B
D) Neither A nor B
Q:
To test the digital signature, the verifier will use sender's public key.
Q:
In checking the digital signature, the verifier ________.
A) decrypts the digital signature it received with the supplicant's public key to get the message digest
B) hashes the plaintext message with the same algorithm used by the sender to get the message digest
C) Both A and B
D) Neither A nor B
Q:
Signing a message digest means encrypting it with the sender's public key.
Q:
In public key encryption, "signing" is the act of ________.
A) adding the password to the challenge message and hashing the two
B) hashing the plain text message
C) encrypting the message digest with its own private key
D) encrypting the message digest with its own public key
Q:
The supplicant creates a digital signature by ________.
A) adding the password to the challenge message and hashing the two
B) hashing the plain text message
C) encrypting the message digest with its own private key
D) encrypting the message digest with its own public key
Q:
The supplicant creates a message digest by ________.
A) adding the password to the challenge message and hashing the two
B) hashing the plaintext message
C) encrypting the message digest with its own private key
D) None of the above.
Q:
Digital signatures are used for ________ authentication.
A) initial
B) message-by-message
C) Both A and B
D) Neither A nor B
Q:
In public key encryption for authentication, the supplicant must prove that it knows ________, which nobody else should be able to know.
A) the supplicant's public key
B) the supplicant's private key
C) the true party's private key
D) the verifier's private key
Q:
The person the supplicant claims to be is the true party.
Q:
In public key encryption for authentication, the verifier decrypts the ciphertext with the verifier's public key.
Q:
In public key encryption for authentication, the verifier decrypts the ciphertext with the supplicant's public key.
Q:
For message-by-message authentication, each message must contain an electronic signature.
Q:
In public key encryption for authentication, the supplicant uses ________ to encrypt.
A) the supplicant's private key
B) the supplicant's public key
C) the verifier's private key
D) the verifier's public key
Q:
An attacker who captures the keying information in Diffie-Hellman key agreement can compute the symmetric session key.
Q:
Which of the following can be used as a keying method?
A) Public key encryption for confidentiality
B) MS-CHAP
C) Both A and B
D) None of the above
Q:
Symmetric session key exchange can be done with public key encryption.
Q:
Julia encrypts a message to David using public key encryption for confidentiality. After encrypting the message, can Julia decrypt it?
Q:
Strong RSA keys are at least ________ bits long.
A) 100
B) 256
C) 512
D) 1,024
Q:
To be strong, ________ keys need to be longer than ________ keys.
A) public, symmetric
B) symmetric, public
C) Public and symmetric keys of about the same length have about equal strength.
D) None of the above
Q:
The most popular public key cipher is RSA.
Q:
The most popular public key encryption cipher is ________.
A) AES
B) DES
C) RSA
D) ECC
Q:
Public key encryption is ________.
A) complex
B) slow
C) expensive
D) All of the above
Q:
When Carol sends a message to Bob, Bob will use ________ to decrypt the message.
A) the private key
B) Carol's private key
C) Bob's private key
D) Carol's public key
Q:
When Joshua sends a message to Larry, Joshua will use ________ to encrypt the message.
A) the public key
B) Joshua's public key
C) Larry's public key
D) Larry's private key
Q:
When Emma sends a message to Lucy, Emma will use the public key to encrypt it.
Q:
MS-CHAP provides mutual authentication.
Q:
Which encryption method does MS-CHAP use?
A) Symmetric key encryption
B) Public key encryption
C) Both A and B
D) Neither A nor B
Q:
In MS-CHAP, the ________ creates the response message.
A) supplicant
B) verifier
C) Both A and B
D) Neither A nor B
Q:
MS-CHAP is used for ________ authentication.
A) initial
B) message-by-message
C) Both A and B
D) Neither A nor B
Q:
Cryptanalysts have found weaknesses in ________.
A) MD5
B) SHA-512
C) Both A and B
D) Neither A nor B
Q:
What is the hash size of SHA-256?
A) 112 bits
B) 128 bits
C) 160 bits
D) 256 bits
Q:
The hash size in SHA-1 is 160 bits.
Q:
The hash size in MD-5 is 160 bits.
Q:
When a hashing algorithm is applied, the hash will ALWAYS have a fixed length.
Q:
Hashing is ________.
A) reversible
B) repeatable
C) Both A and B
D) Neither A nor B
Q:
Hashing is a reversible process.
Q:
In mutual authentication between two parties, ________.
A) there are two verifiers and two supplicants
B) there are two verifiers, but there is only one supplicant
C) there is one verifier, but there are two supplicants
D) None of the above.
Q:
________ are proofs of identity.
A) Certifications
B) Credentials
C) Cartes
D) Verifications
Q:
In authentication, the party trying to provide its identity to the other party is called the applicant.
Q:
In SSL/TLS, a ________ is a specific set of security methods and options.
A) cryptographic system standard
B) cipher suite
C) chosen set
D) tuple
Q:
What usually is the longest stage in a cryptographic system dialogue?
A) Ongoing communication
B) Negotiation of security methods and parameters
C) Keying
D) Mutual authentication
Q:
Electronic signatures usually provide ________.
A) message-by-message authentication
B) message integrity
C) Both A and B
D) Neither A nor B
Q:
What protection do cryptographic systems provide on a message-by-message basis?
A) Message authentication
B) Message integrity
C) Message confidentiality
D) All of the above
Q:
In cryptographic systems, keying takes place during the second handshaking stage.
Q:
When both parties prove their identities to the other, this is called ________.
A) mutual authentication
B) symmetric authentication
C) authentication
D) dual authentication
Q:
Proving your identity to a communication partner is ________.
A) validation
B) identification
C) authentication
D) certification
Q:
Someone who pretends to be someone else is ________.
A) a social engineer
B) a hacker
C) a cryptanalyst
D) an impostor
Q:
In cryptographic systems, the negotiation of security methods and options takes place during the ________ handshaking stage.
A) first
B) second
C) third
D) None of the above
Q:
Packaged sets of cryptographic countermeasures for protecting data transmission are ________.
A) cryptographic standards
B) metacryptographic systems
C) cryptographic systems
D) All of the above
Q:
________ occurs when companies believe they have good security because they are using proprietary ciphers that hackers do not know.
A) Security through obscurity
B) Weakest link ignorance
C) Reasonable protection
D) Hidden security
Q:
Which of the following specifies how to do certification by external parties?
A) COSO
B) CobiT
C) ISO/IEC 27000
D) All of the above have certification by external parties.
Q:
The ISO/IEC 2700 family focuses on ________.
A) corporate governance
B) IT governance
C) IT security governance
D) All of the above about equally
Q:
________ is preferred by U.S. auditors.
A) ISO/IEC 27000 family
B) COSO
C) CobiT
D) PCI-DSS