25/08/2021 Network Security 1.
0 Modules 15 - 17: Cryptography Group Exam Answers
IT Questions Bank Commands Help Resources » IP Calculators »
Donations My account
Search the site
Home CCNA v7 » IT Essentials 7.0 » Security » CyberOps » CCNP v8 »
DevNet Linux » Other courses »
IT Questions Bank CCNA v6 » CCNA v7 » IT Essentials 7.0 » Security »
CCNA CyberOps » CCNP v8 » DevNet Associate Linux » Networking Essentials
IOS Commands Help Resources » Download Cisco Packet Tracer 8 »
IP Subnet Calculators » Donation Contact My account
Network Security 1.0 Modules 15 – 17:
Cryptography Group Exam Answers
May 20, 2021 |
Last Updated: July 3, 2021 |
Network Security 1.0 |
No Comments
Share your ❤️Buy me a ☕
WAREHOUSE WORKER Donate
LEARN MORE
Jobs in Carlisle
JOB OFFER in 1 HR!
Great pay + Enjoy an active job
https://itexamanswers.net/network-security-1-0-modules-15-17-cryptography-group-exam-answers.html 1/14
25/08/2021 Network Security 1.0 Modules 15 - 17: Cryptography Group Exam Answers
Play Now
Poki
Network Security 1.0 Exam
Share Tweet Share Pin it Answers
Network Security v1.0
How to find: Press “Ctrl + F” in the browser and fill in
whatever wording is in the question to find that Modules 1 – 4: Securing
question/answer. If the question is not here, find it in Networks Group Exam
Questions Bank. (Answers)
Modules 5 – 7: Monitoring
NOTE: If you have the new question on this test, and Managing Devices
please comment Question and Multiple-Choice list in Group Exam (Answers)
form below this article. We will update answers for
Modules 8 – 10: ACLs and
you in the shortest time. Thank you! We truly value
Firewalls Group Exam
your contribution to the website.
(Answers)
Modules 11 – 12: Intrusion
Network Security ( Version 1) – Network Prevention Group Exam
Security 1.0 Modules 15 – 17: Cryptography (Answers)
Group Exam Answers Modules 13 – 14: Layer 2
and Endpoint Security
1. Which algorithm can ensure data integrity?
Group Exam (Answers)
RSA
AES Modules 15 – 17:
MD5 Cryptography Group Exam
PKI (Answers)
Modules 18 – 19: VPNs
Explanation: Data integrity guarantees that the message Group Exam (Answers)
was not altered in transit. Integrity is ensured by
Modules 20 – 22: ASA
implementing either of the Secure Hash Algorithms (SHA-
Group Exam (Answers)
2 or SHA-3). The MD5 message digest algorithm is still
widely in use. WAREHOUSE WORKER Network Security 1.0
LEARN MORE
Jobs in Carlisle Practice Final Exam
JOB OFFER in 1 HR!
2. What is the keyspace of Great pay + Enjoy an
an encryption active job
algorithm? Answers
https://itexamanswers.net/network-security-1-0-modules-15-17-cryptography-group-exam-answers.html 2/14
25/08/2021 Network Security 1.0 Modules 15 - 17: Cryptography Group Exam Answers
the set of all possible values used to generate a key
Network Security 1.0
the set of procedures used to calculate asymmetric keys
Final PT Skills Exam
the set of hash functions used to generate a key
(PTSA) Answers
the mathematical equation that is used to create a key
Network Security 1.0
Final Exam Answers
Explanation: The keyspace of an encryption algorithm is
the set of all possible key values. Keys with n bits
produce a keyspace with 2^ n possible key values.
3. Alice and Bob are using a digital signature to sign a
Recent Comments
document. What key should Alice use to sign the
document so that Bob can make sure that the document Joseph on CCNA 200-301
came from Alice? Dumps Full Questions – Exam
Study Guide & Free
private key from Bob Briant on CCNA 200-301 Dumps
private key from Alice Full Questions – Exam Study
public key from Bob Guide & Free
username and password from Alice Joa on CCIE/CCNP 350-401
ENCOR Dumps Full Questions
with VCE & PDF
Explanation: Alice and Bob are used to explain
asymmetric cryptography used in digital signatures. Alice Joa on CCIE/CCNP 350-401
ENCOR Dumps Full Questions
uses a private key to encrypt the message digest. The
with VCE & PDF
message, encrypted message digest, and the public key
ana on CCIE/CCNP 350-401
are used to create the signed document and prepare it for
ENCOR Dumps Full Questions
transmission. with VCE & PDF
4. Which three security services are provided by digital
signatures? (Choose three.)
provides nonrepudiation using HMAC functions
guarantees data has not changed in transit
provides data encryption
authenticates the source
provides confidentiality of digitally signed data
authenticates the destination
Explanation: Digital signatures are a mathematical
technique used to provide three basic security services.
Digital signatures have specific properties that enable
entity authentication and data integrity. In addition, digital
signatures provide nonrepudiation of the transaction. In
other words, the digital signature serves as legal proof
that the data exchange did take place.
WAREHOUSE WORKER
LEARN MORE
Jobs in Carlisle
JOB OFFER in 1 HR!
Great pay + Enjoy an active job
https://itexamanswers.net/network-security-1-0-modules-15-17-cryptography-group-exam-answers.html 3/14
25/08/2021 Network Security 1.0 Modules 15 - 17: Cryptography Group Exam Answers
5. What is another name for confidentiality of
information?
consistency
trustworthiness
accuracy
privacy
Explanation: Privacy is another name for confidentiality.
Accuracy, consistency, and trustworthiness describe
integrity of data.
6. As data is being stored on a local hard disk, which
method would secure the data from unauthorized access?
a duplicate hard drive copy
deletion of sensitive files
two factor authentication
data encryption
Explanation: Data encryption is the process of
converting data into a form where only a trusted,
authorized person with a secret key or password can
decrypt the data and access the original form.
7. What popular encryption algorithm requires that both
the sender and receiver know a pre-shared key?
PKI
MD5
AES WAREHOUSE WORKER
LEARN MORE
HMAC Jobs in Carlisle
JOB OFFER in 1 HR!
Great pay + Enjoy an active job
https://itexamanswers.net/network-security-1-0-modules-15-17-cryptography-group-exam-answers.html 4/14
25/08/2021 Network Security 1.0 Modules 15 - 17: Cryptography Group Exam Answers
Explanation: MD5 is a hashing algorithm that
guarantees that no one intercepted the message and
altered it. Advanced Encryption Standard (AES) is a
popular symmetric encryption algorithm where each
communicating party needs to know the pre-shared key.
Public key infrastructure (PKI) is an asymmetric
encryption algorithm based on the assumption that the
two communicating parties have not previously shared a
secret key. HMAC is a hash message authentication code
that guarantees that the message is not a forgery and
actually comes from the authentic source.
8. In which method used in cryptanalysis does the
attacker know a portion of the plaintext and the
corresponding ciphertext?
meet-in-the-middle
brute-force
chosen-plaintext
ciphertext
Explanation: There are several methods used in
cryptanalysis:
Brute-force – The attacker tries every possible key
knowing that eventually one of them will work.
Ciphertext – The attacker has the ciphertext of several
messages encrypted but no knowledge of the underlying
plaintext.
Known-Plaintext – The attacker has access to the
ciphertext of several messages and knows something
about the plaintext underlying that ciphertext.
Chosen-Plaintext – The attacker chooses which data the
encryption device encrypts and observes the ciphertext
output.
Chosen-Ciphertext – The attacker can choose different
ciphertext to be decrypted and has access to the
decrypted plaintext.
Meet-in-the-Middle – The attacker knows a portion of the
plaintext and the corresponding ciphertext.
9. Match the disciplines or roles to the descriptions.
WAREHOUSE WORKER
LEARN MORE
Jobs in Carlisle
JOB OFFER in 1 HR!
Great pay + Enjoy an active job
https://itexamanswers.net/network-security-1-0-modules-15-17-cryptography-group-exam-answers.html 5/14
25/08/2021 Network Security 1.0 Modules 15 - 17: Cryptography Group Exam Answers
10. What technology supports asymmetric key encryption
used in IPsec VPNs?
3DES
IKE
SEAL
AES
Explanation: IKE, or Internet Key Exchange, is a
protocol to support asymmetric encryption algorithms. It is
used to securely exchange encryption keys in the setup
of IPsec VPNs.
11. What are two symmetric encryption algorithms?
(Choose two.)
3DES
MD5
AES
HMAC
SHA
Explanation: MD5, HMAC, and SHA are hashing
algorithms. WAREHOUSE WORKER
LEARN MORE
Jobs in Carlisle
JOB OFFER in 1 HR!
Great pay + Enjoy an active job
https://itexamanswers.net/network-security-1-0-modules-15-17-cryptography-group-exam-answers.html 6/14
25/08/2021 Network Security 1.0 Modules 15 - 17: Cryptography Group Exam Answers
12. Which two items are used in asymmetric encryption?
(Choose two.)
a token
a TPM
a private key
a DES key
a public key
Explanation: A token is something that is used to
provide two-factor authentication. DES is using an
identical key to encrypt and decrypt. Asymmetric
encryption uses a private key associated with a public
key.
13. What are two properties of a cryptographic hash
function? (Choose two.)
Complex inputs will produce complex hashes.
Hash functions can be duplicated for authentication
purposes.
The hash function is one way and irreversible.
The input for a particular hash algorithm has to have a
fixed size.
The output is a fixed length.
Explanation: A cryptographic hash function should have
the following properties:The input can be any length.
The output has a fixed length.
The hash value is relatively easy to compute for any
given input.
The hash is one way and not reversible.
The hash is collision free, meaning that two different input
values will result in different hash values
14. Which statement describes asymmetric encryption
algorithms?
They have key lengths ranging from 80 to 256 bits.
They include DES, 3DES, and AES.
They are also called shared-secret key algorithms.
They are relatively slow because they are based on
difficult computational algorithms.
WAREHOUSE WORKER
Explanation: DES, 3DES,Jobs
and AES are examples of
in Carlisle LEARN MORE
symmetric encryption algorithms (also known as shared
Great pay + Enjoy an active job
JOB OFFER in 1 HR!
https://itexamanswers.net/network-security-1-0-modules-15-17-cryptography-group-exam-answers.html 7/14
25/08/2021 Network Security 1.0 Modules 15 - 17: Cryptography Group Exam Answers
secret key algorithms). The usual key length for
symmetric algorithms is 80-256 bits. Asymmetric
algorithms are relatively slow because they are based on
difficult computational algorithms.
15. An IT enterprise is recommending the use of PKI
applications to securely exchange information between
the employees. In which two cases might an organization
use PKI applications to securely exchange information
between users? (Choose two.)
HTTPS web service
802.1x authentication
local NTP server
FTP transfers
file and directory access permission
Explanation: The Public Key Infrastructure (PKI) is a
third party-system referred to as a certificate authority or
CA. The PKI is the framework used to securely exchange
information between parties. Common PKI applications
are as follows:
SSL/TLS certificate-based peer authentication
Secure network traffic using IPsec VPNs
HTTPS Web traffic
Control access to the network using 802.1x
authentication
Secure email using the S/MIME protocol
Secure instant messaging
Approve and authorize applications with Code Signing
Protect user data with the Encryption File System (EFS)
Implement two-factor authentication with smart cards
Securing USB storage devices
16. Two users must authenticate each other using digital
certificates and a CA. Which option describes the CA
authentication procedure?
The users must obtain the certificate of the CA and
then their own certificate.
The CA is always required, even after user verification is
complete.
CA certificates are retrieved out-of-band using the PSTN,
and the authentication is done in-band over a network.
After user verification isWAREHOUSE
complete, the CA isWORKER
no longer
LEARN MORE
Jobs in Carlisle
required, even if one of the involved certificates expires. JOB OFFER in 1 HR!
Great pay + Enjoy an active job
https://itexamanswers.net/network-security-1-0-modules-15-17-cryptography-group-exam-answers.html 8/14
25/08/2021 Network Security 1.0 Modules 15 - 17: Cryptography Group Exam Answers
Explanation: When two users must authenticate each
other using digital certificates and CA, both users must
obtain their own digital certificate from a CA. They submit
a certificate request to a CA, and the CA will perform a
technical verification by calling the end user (out-of-
band). Once the request is approved, the end user
retrieves the certificate over the network (in-band) and
installs the certificate on the system. After both users
have installed their certificate, they can perform
authentication by sending their certificate to each other.
Each site will use the public key of the CA to verify the
validity of the certificate; no CA is involved at this point. If
both certificates are verified, both users can now
authenticate each other.
17. The following message was encrypted using a Caesar
cipher with a key of 2:
fghgpf vjg ecuvng
What is the plaintext message?
invade the castle
defend the castle
defend the region
invade the region
Explanation: The Caesar cipher was a simple
substitution cipher. In this example, if the key is 2, the
letter d was moved two spaces to the right, resulting in an
encoded message that used the letter f in place of the
letter d. The letter g would be the substitute for the letter
e, and so on. So, the resulting plaintext is f=d, g=e, h=f,
g=e, p=n, f=d, v=t, j=h, g=e, e=c, c=a, u=s, v=t, n=l, g=e.
18. In a hierarchical CA topology, where can a subordinate
CA obtain a certificate for itself?
from the root CA or another subordinate CA at a
higher level
from the root CA or another subordinate CA at the same
level
from the root CA or from self-generation
from the root CA only
from the root CA or another subordinate CA anywhere in
WAREHOUSE WORKER
the tree Jobs in Carlisle LEARN MORE
JOB OFFER in 1 HR!
Great pay + Enjoy an active job
https://itexamanswers.net/network-security-1-0-modules-15-17-cryptography-group-exam-answers.html 9/14
25/08/2021 Network Security 1.0 Modules 15 - 17: Cryptography Group Exam Answers
Explanation: In a hierarchical CA topology, CAs can
issue certificates to end users and to subordinate CAs,
which in turn issue their certificates to end users, other
lower level CAs, or both. In this way, a tree of CAs and
end users is built in which every CA can issue certificates
to lower level CAs and end users. Only the root CA can
issue a self-signing certificate in a hierarchical CA
topology.
19. What is the purpose for using digital signatures for
code signing?
to establish an encrypted connection to exchange
confidential data with a vendor website
to verify the integrity of executable files downloaded
from a vendor website
to authenticate the identity of the system with a vendor
website
to generate a virtual ID
Explanation: Code signing is used to verify the integrity
of executable files downloaded from a vendor website.
Code signing uses digital certificates to authenticate and
verify the identity of a website.
20. What technology has a function of using trusted third-
party protocols to issue credentials that are accepted as
an authoritative identity?
digital signatures
hashing algorithms
PKI certificates
symmetric keys
Explanation: Digital certificates are used to prove the
authenticity and integrity of PKI certificates, but a PKI
Certificate Authority is a trusted third-party entity that
issues PKI certificates. PKI certificates are public
information and are used to provide authenticity,
confidentiality, integrity, and nonrepudiation services that
can scale to large requirements.
21. Which requirement of secure communications
WAREHOUSE WORKER is
ensured by the implementation LEARN MORE
Jobsof
inMD5 or SHA hash
Carlisle
JOB OFFER in 1 HR!
generating algorithms? Great pay + Enjoy an active job
https://itexamanswers.net/network-security-1-0-modules-15-17-cryptography-group-exam-answers.html 10/14
25/08/2021 Network Security 1.0 Modules 15 - 17: Cryptography Group Exam Answers
nonrepudiation
authentication
integrity
confidentiality
Explanation: Integrity is ensured by implementing either
MD5 or SHA hash generating algorithms. Many modern
networks ensure authentication with protocols, such as
HMAC. Data confidentiality is ensured through symmetric
encryption algorithms, including DES, 3DES, and AES.
Data confidentiality can also be ensured using
asymmetric algorithms, including RSA and PKI.
22. What is an example of the one-time pad cipher?
RC4
rail fence
Caesar
Vigenère
Explanation: RC4 is an example of the one-time pad
cipher, and it is widely used on the Internet. The Caesar
cipher is a simple substitution cipher, and the Vigenère
cipher is based on the Caesar cipher. An example of a
transposition cipher is the rail fence cipher.
23. A company is developing a security policy for secure
communication. In the exchange of critical messages
between a headquarters office and a branch office, a hash
value should only be recalculated with a predetermined
code, thus ensuring the validity of data source. Which
aspect of secure communications is addressed?
data integrity
non-repudiation
data confidentiality
origin authentication
Explanation: Secure communications consists of four
elements: Data confidentiality – guarantees that only
authorized users can read the message
Data integrity – guarantees that the message was not
altered
WAREHOUSE
Origin authentication – guarantees WORKER
that the message is
LEARN MORE
Jobscome
not a forgery and does actually in Carlisle
from whom it states
JOB OFFER in 1 HR!
Great pay + Enjoy an active job
https://itexamanswers.net/network-security-1-0-modules-15-17-cryptography-group-exam-answers.html 11/14
25/08/2021 Network Security 1.0 Modules 15 - 17: Cryptography Group Exam Answers
Data nonrepudiation – guarantees that the sender cannot
repudiate, or refute, the validity of a message sent
24. What is the purpose of a digital certificate?
It guarantees that a website has not been hacked.
It provides proof that data has a traditional signature
attached.
It ensures that the person who is gaining access to a
network device is authorized.
It authenticates a website and establishes a secure
connection to exchange confidential data.
Explanation: Digital signatures commonly use digital
certificates that are used to verify the identity of the
originator in order to authenticate a vendor website and
establish an encrypted connection to exchange
confidential data. One such example is when a person
logs into a financial institution from a web browser.
Download Modules 15 – 17: Cryptography Group
Exam Answers PDF:
Modules 15 – 17 Cryptography DOWNLOAD
Group Exam Answers PDF
1 file(s) 1.16 MB
Related Articles
WAREHOUSE WORKER
LEARN MORE
Jobs in Carlisle
JOB OFFER in 1 HR!
Great pay + Enjoy an active job
https://itexamanswers.net/network-security-1-0-modules-15-17-cryptography-group-exam-answers.html 12/14
25/08/2021 Network Security 1.0 Modules 15 - 17: Cryptography Group Exam Answers
B e the First to Comment!
0 COMMENTS
ITExamAnswers.net Copyright © 2021. Privacy Policy | Contact
WAREHOUSE WORKER
LEARN MORE
Jobs in Carlisle
JOB OFFER in 1 HR!
Great pay + Enjoy an active job
https://itexamanswers.net/network-security-1-0-modules-15-17-cryptography-group-exam-answers.html 13/14
25/08/2021 Network Security 1.0 Modules 15 - 17: Cryptography Group Exam Answers
https://itexamanswers.net/network-security-1-0-modules-15-17-cryptography-group-exam-answers.html 14/14