Module 20 Cryptography
Module 20 Cryptography
Diffie-Hellman (DH) groups determine the strength of the key used in the key exchange process.
Which of the following is the correct bit size of the Diffie-Hellman (DH) group 5?
A. 768 bit key B. 1536 bit key C. 2048 bit key D. 1025 bit key
After gaining access to the password hashes used to protect access to a web-based application, the
knowledge of which cryptographic algorithms would be useful to gain access to the application?
Anyone can send an encrypted message to Bob but only Bob can read it. Using PKI, when Alice
wishes to send an encrypted message to Bob, she looks up Bob’s public key in a directory, uses it
to encrypt the message, and sends it off. Bob then uses his private key to decrypt the message and
read it. No one listening in can decrypt the message. Thus, although many people may know the
public key of Bob and use it to verify Bob’s signatures, they cannot discover Bob’s private key and
use it to forge digital signatures. This is referred to as the principle of:
Which property ensures that a hash function will not produce the same hashed value for two
different messages?
Which of the following is optimized for confidential communications, such as bidirectional voice
and video?
What is the primary drawback of using Advanced Encryption Standard (AES) algorithm with a 256-
bit key to share sensitive data?
A. Due to the key size, the time it will take to encrypt and decrypt the message hinders efficient
communication.
B. To get messaging programs to function with this algorithm requires complex configurations.
C. It has been proven to be a weak cipher; therefore, should not be trusted to protect sensitive data.
D. It is a symmetric key algorithm, meaning each recipient must receive the key through a
different channel than the message.
When setting up a wireless network, an administrator enters a preshared key for security. Which
of the following is true?
A. The key entered is a symmetric key used to encrypt the wireless data.
B. The key entered is a hash that is used to prove the integrity of the wireless data.
C. The key entered is based on the Diffie-Hellman method.
D. The key is an RSA key used to encrypt the wireless data.
Which of the following defines the role of a root certificate authority (CA) in a public key
infrastructure (PKI)?
A. The root CA is the recovery agent used to encrypt data when a user's certificate is lost.
B. The root CA stores the user's hash value for safekeeping.
C. The CA is the trusted root that issues certificates.
D. The root CA is used to encrypt e-mail messages to prevent unintended disclosure of data.
A network security administrator is worried about potential man-in-the-middle attacks when users
access a corporate website from their workstations. Which of the following is the best
remediation against this type of attack?
Company A and Company B have just merged and each has its own public key infrastructure (PKI).
What must the certificate authorities (CAs) establish so that the private PKIs for Company A and
Company B trust one another and each private PKI can validate digital certificates from the other
company?
A. Poly key exchange B. Cross certification C. Poly key reference D. Cross-site exchange
Which of the PKI components is responsible for issuing and verifying digital certificate?
To send a PGP-encrypted message, which piece of information from the recipient must the sender
have before encrypting the message?
Which of the following describes a component of public key infrastructure (PKI) where a copy of a
private key is stored to provide third-party access and to facilitate recovery operations?
Steve is the new CISO for a global corporation; he hired Dayna as a security consultant to do a
security assessment. Steve wants to protect the corporate webpage with encryption and asks
Dayna about the procedure to do that. Which of the following is the correct option?
A. You need to use digital certificates. B. You need to use digital signature.
C. You need to use quantum encryption. D. You need to use Blowfish encryption.
For messages sent through an insecure channel, a properly implemented digital signature gives the
receiver reason to believe the message was sent by the claimed sender. While using a digital
signature, the message digest is encrypted with which key?
Which of the following contains a public key and the identity of the owner and the corresponding
private key is kept secret by the certification authorities?
A certificate authority (CA) generates a key pair that will be used for encryption and decryption of
e-mails. The integrity of the encrypted e-mail is dependent on the security of which of the
following?
Cryptography Attacks
Which of the following cryptography attack methods is usually performed without the use of a
computer?
An attacker sniffs encrypted traffic from the network and is subsequently able to decrypt it. Which
cryptanalytic technique can the attacker use now in his attempt to discover the encryption key?
An attacker has captured a target file that is encrypted with public key cryptography. Which of the
attacks below is likely to be used to crack the target file?
An attacker tries to recover the plaintext of a message without knowing the required key in
advance. For this he may first try to recover the key, or may go after the message itself by trying
every possible combination of characters. Which code breaking method is he using?
In which of the following attacks, can an attacker obtain ciphertexts encrypted under two different
keys and gather plaintext and matching ciphertext?
An attacker breaks an n bit key cipher into 2 n/2 number of operations in order to recover the key.
Which cryptography attack is he performing?
Out of the following attacks, which attack is a physical attack that is performed on a cryptographic
device/cryptosystem to gain sensitive information?
Which of the following attacks mainly affects any hardware/software using an ANSI X9.31 random
number generator (RNG)?
Out of the following, identify the attack that is used for cracking a cryptographic algorithm using
multiple keys for encryption.
Which cipher encrypts the plain text digit (bit or byte) one by one?
The fundamental difference between symmetric and asymmetric key cryptographic systems is that
symmetric key cryptography uses__________________?
Which of the following processes of PKI (public key infrastructure) ensures that a trust relationship
exists and that a certificate is still valid for specific operations?