IT 417 ch8 Security Test Bank
IT 417 ch8 Security Test Bank
IT 417 ch8 Security Test Bank
TRUE/FALSE
4. The permutation cipher simply rearranges the values within a block to create
the ciphertext.
5. Julius Caesar was associated with an early version of the transposition cipher.
6. You cannot combine the XOR operation with a block cipher operation.
7. To perform the Caesar cipher encryption operation, the pad values are added
to numeric values that represent the plaintext that needs to be encrypted.
8. One encryption method made popular by spy movies involves using the text
in a book as the key to decrypt a message.
13. The asymmetric encryption systems use a single key to both encrypt and
decrypt a message.
14. The AES algorithm was the first public key encryption algorithm.
15. Two hundred and eighty five computers can crack a 56-bit key in one year;
ten times as many would do it in a little over a month.
16. PKI systems are based on public key cryptosystems and include digital
certificates and certificate authorities.
17. Nonrepudiation means that customers or partners can be held accountable for
transactions, such as online purchases, which they cannot later deny.
19. When an asymmetric cryptographic process uses the sender’s private key to
encrypt a message, the sender’s public key must be used to decrypt the message.
20. The most common hybrid system is based on the Diffie-Hellman key
exchange, which is a method for exchanging private keys using public key encryption.
22. SSL builds on the encoding format of the Multipurpose Internet Mail
Extensions protocol and uses digital signatures based on public key cryptosystems to secure
e-mail.
24. The application header protocol provides secrecy for the content of a network
communication.
25. The encapsulating security payload protocol provides secrecy for the contents
of network communications as well as system-to-system authentication and data integrity
verification.
26. The SHTTP security solution provides six services: authentication by digital
signatures, message encryption, compression, e-mail compatibility, segmentation, and key
management.
30. Once the attacker has successfully broken an encryption, he or she may
launch a replay attack, which is an attempt to resubmit a recording of the deciphered
authentication to gain entry into a secure source.
MODIFIED TRUE/FALSE
ANS: F, Decryption
ANS: F, algorithm
ANS: F, decipher
5. Hash algorithms are public functions that create a hash value by converting
variable-length messages into a single fixed-length value. _________________________
6. Encryption methodologies that require the same secret key to encipher and
decipher the message are using what is called public key encryption.
_________________________
ANS: F, private
ANS: F, Triple
9. Symmetric encryption uses two different but related keys, and either key can
be used to encrypt or decrypt the message. _________________________
ANS: F, Asymmetric
10. A(n) registration authority issues, manages, authenticates, signs, and revokes
users’ digital certificates, which typically contain the user name, public key, and other
identifying information. _________________________
ANS: F, certificate
13. The number of horizontal and vertical pixels captured and recorded is known
as the image’s depth. _________________________
ANS: F, resolution
15. Privacy Enhanced Mail was proposed by the Internet Engineering Task Force
and is a standard that uses 3DES symmetric key encryption and RSA for key exchanges and
digital signatures. _________________________
16. Secure Multipurpose Internet Mail Extensions builds on the encoding format
of the Multipurpose Internet Mail Extensions protocol and uses digital signatures based on
public key cryptosystems to secure e-mail. _________________________
17. Secure HTTP provides the Internet communication services between client
and host without consideration for encryption of the data that is transmitted between client
and server. _________________________
ANS: F, Standard
19. In transport mode the entire IP packet is encrypted and is then placed as the
content portion of another IP packet. _________________________
ANS: F, tunnel
20. ESP in transport mode can be used to establish a virtual private network,
assuring encryption and authentication between networks communicating via the Internet.
_________________________
ANS: F, tunnel
23. An attacker may obtain duplicate texts, one in ciphertext and one in plaintext,
and thus reverse-engineer the encryption algorithm in a known-plaintext attack scheme.
_________________________
24. In a(n) word attack, the attacker encrypts every word in a dictionary using the
same cryptosystem as used by the target. _________________________
ANS: F, dictionary
ANS: F, replay
MULTIPLE CHOICE
2. ____ is the entire range of values that can possibly be used to construct an
individual key.
a. Code c. Algorithm
b. Keyspace d. Cryptogram
ANS: B PTS: 1 REF: 354
5. Bit stream methods commonly use algorithm functions like the exclusive OR
operation (____).
a. XOR c. NOR
b. EOR d. OR
ANS: A PTS: 1 REF: 354
6. More advanced substitution ciphers use two or more alphabets, and are
referred to as ____ substitutions.
a. multialphabetic c. polyalphabetic
b. monoalphabetic d. polynomic
ANS: C PTS: 1 REF: 354
9. SHA-1 produces a(n) ____-bit message digest, which can then be used as an
input to a digital signature algorithm.
a. 48 c. 160
b. 56 d. 256
ANS: C PTS: 1 REF: 362
10. A method of encryption that requires the same secret key to encipher and
decipher the message is known as ____ encryption.
a. asymmetric c. public
b. symmetric d. private
ANS: B PTS: 1 REF: 364
13. The ____ algorithm was the first public key encryption algorithm developed
(in 1977) and published for commercial use.
a. DES c. MAC
b. RSA d. AES
ANS: B PTS: 1 REF: 372
15. The CA periodically distributes a(n) ____ to all users that identifies all
revoked certificates.
a. CRL c. MAC
b. RA d. AES
ANS: A PTS: 1 REF: 376
17. Digital signatures should be created using processes and products that are
based on the ____.
a. DSS c. SSL
b. NIST d. HTTPS
ANS: A PTS: 1 REF: 376
19. The ____ is responsible for the fragmentation, compression, encryption, and
attachment of an SSL header to the cleartext prior to transmission.
a. Standard HTTP c. S-HTTP
b. SFTP d. SSL Record
Protocol
ANS: D PTS: 1 REF: 382
20. ____ was developed by Phil Zimmermann and uses the IDEA Cipher for
message encoding.
a. PEM c. S/MIME
b. PGP d. SSL
ANS: B PTS: 1 REF: 382
22. ____ is a hybrid cryptosystem that combines some of the best available
cryptographic algorithms and has become the open-source de facto standard for encryption
and authentication of e-mail and file storage applications.
a. PGP c. AH
b. DES d. ESP
ANS: A PTS: 1 REF: 388
23. ____ attacks are a collection of brute-force methods that attempt to deduce
statistical relationships between the structure of the unknown key and the ciphertext that is the
output of the cryptosystem.
a. Timing c. Correlation
b. Dictionary d. Man-in-the-middle
ANS: C PTS: 1 REF: 391
24. In a ____ attack, the attacker eavesdrops during the victim’s session and uses
statistical analysis of patterns and inter-keystroke timings to discern sensitive session
information.
a. replay c. correlation
b. timing d. dictionary
ANS: B PTS: 1 REF: 391
25. ____ is the protocol used to secure communications across any IP-based
network such as LANs, WANs, and the Internet.
a. PEM c. IPSec
b. SSH d. SET
ANS: C PTS: 1 REF: 393
COMPLETION
ANS: cryptology
ANS: Cryptography
ANS: Cipher
ANS: encipher
ANS: steganography
ANS: substitution
ANS: monoalphabetic
ANS:
transposition
permutation
ANS: exclusive
10. Also known as the one-time pad, the ____________________ cipher, which
was developed at AT&T, uses a set of characters only one time for each encryption process.
ANS: Vernam
ANS: digest
12. Hashing functions do not require the use of keys, but it is possible to attach a
message ____________________ code.
ANS: authentication
ANS: Hash
14. One of the most widely known cryptographic algorithms is the Data
____________________ Standard, which was developed by IBM and is based on the
company’s Lucifer algorithm.
ANS: Encryption
ANS: Advanced
ANS: public
ANS: trapdoor
ANS: certificates
ANS: registration
ANS: signatures
ANS: certificate
ANS:
Secure Socket
Secure Sockets
ANS: transport
ANS: payload
ANS: timing
ESSAY
1. Describe how hash functions work and what they are used for.
ANS:
Hash functions are mathematical algorithms that generate a message summary or digest to
confirm the identity of a specific message and to confirm that there have not been any
changes to the content. While they do not create a ciphertext, hash functions confirm message
identity and integrity, both of which are critical functions in e-commerce. Hashing functions
do not require the use of keys, but it is possible to attach a message authentication code
(MAC)—a key-dependent, one-way hash function—that allows only specific recipients
(symmetric key holders) to access the message digest.
ANS:
Symmetric Encryption - Encryption methodologies that require the same secret key to
encipher and decipher the message are using what is called private key encryption or
symmetric encryption. Symmetric encryption methods use mathematical operations that can
be programmed into extremely fast computing algorithms so that the encryption and
decryption processes are executed quickly by even small computers. The primary challenge of
symmetric key encryption is getting the key to the receiver, a process that must be conducted
out of band (meaning through a channel or band other than the one carrying the ciphertext) to
avoid interception.
Another category of encryption techniques is asymmetric encryption. While symmetric
encryption systems use a single key to both encrypt and decrypt a message, asymmetric
encryption uses two different but related keys, and either key can be used to encrypt or
decrypt the message. Asymmetric encryption can be used to provide elegant solutions to
problems of secrecy and verification. This technique has its highest value when one key is
used as a private key, which means that it is kept secret (much like the key of symmetric
encryption), known only to the owner of the key pair, and the other key serves as a public key,
which means that it is stored in a public location where anyone can use it.
ANS:
Digital certificates are public-key container files that allow computer programs to validate the
key and identify to whom it belongs. The certificate is often issued and certified by a third
party, usually a certificate authority. A digital signature attached to the certificate’s container
file certifies the file’s origin and integrity. A certificate authority (CA) issues, manages,
authenticates, signs, and revokes users’ digital certificates, which typically contain the user
name, public key, and other identifying information.