31 Questions Cryptography
31 Questions Cryptography
31 Questions Cryptography
2. Which of the following should a technician consider when selecting an encryption method for
data that needs to remain confidential for a specific length of time?
A. The key length of the encryption algorithm
B. The encryption algorithm’s longevity
C. A method of introducing entropy into key calculations
D. The computational overhead of calculating the encryption key Correct Answer: A
3. Which of the following cryptographic concepts would a security engineer utilize while
implementing non-repudiation? (Choose two.)
A. Block cipher
B. Hashing
C. Private key
D. Perfect forward secrecy
E. Salting
F. Symmetric keys
4. A database administrator needs to ensure all passwords are stored in a secure manner, so the
administrator adds randomly generated data to each password before storing. Which of the
following techniques BEST explains this action?
A. Predictability
B. Key stretching
C. Salting
D. Hashing Correct Answer: C
5. A security assessment determines DES and 3DES are still being used on recently deployed
production servers. Which of the following did the assessment identify?
A. Unsecure protocols B. Default settings C. Open permissions D. Weak encryption Correct
Answer: D
6. Which of the following BEST describes the method a security analyst would use to confirm a file
that is downloaded from a trusted security website is not altered in transit or corrupted using a
verified checksum?
A. Hashing B. Salting C. Integrity D. Digital signature Correct Answer: A
7. If a current private key is compromised, which of the following would ensure it cannot be used
to decrypt all historical data?
A. Perfect forward secrecy B. Elliptic-curve cryptography C. Key stretching D. Homomorphic
encryption Correct Answer: A
8. Which of the following provides the BEST protection for sensitive information and data stored
in cloud-based services but still allows for full functionality and searchability of data within the
cloud-based services? A. Data encryption B. Data masking C. Anonymization D. Tokenization
Correct Answer: A
9. To secure an application after a large data breach, an e-commerce site will be resetting all
users’ credentials. Which of the following will BEST ensure the site’s users are not compromised
after the reset?
A. A password reuse policy B. Account lockout after three failed attempts C. Encrypted
credentials in transit D. A geofencing policy based on login history Correct Answer: C
10. Which of the following would MOST likely support the integrity of a voting machine? A.
Asymmetric encryption B. Blockchain C. Transport Layer Security D. Perfect forward secrecy
Correct Answer: D
11. A website developer is working on a new e-commerce website and has asked an information
security expert for the most appropriate way to store credit card numbers to create an easy
reordering process. Which of the following methods would BEST accomplish this goal?
A. Salting the magnetic strip information B. Encrypting the credit card information in transit C.
Hashing the credit card numbers upon entry D. Tokenizing the credit cards in the database
Correct Answer: C
12. A security assessment determines DES and 3DES are still being used on recently deployed
production servers. Which of the following did the assessment identify?
A. Unsecure protocols B. Default settings C. Open permissions D. Weak encryption Correct
Answer: D
13. In which of the following common use cases would steganography be employed?
A. Obfuscation
B. Integrity
C. Non-repudiation
D. Blockchain
C. Their approach uses executable names and not hashes for the whitelist.
21. A server administrator discovers the web farm is using weak ciphers and wants to ensure that only
stronger ciphers are accepted. Which of the following ciphers should the administrator implement in the
load balancer? (Select Two)
A. DES
B. CRC-32
C. SHA-129
D. RC4
E. MD5
23. When connected to a secure WAP, which of the following encryption technologies is MOST likely to
be configured when connecting to WPA2-PSK?
A. MD5
B. WEP
C. AES
D. DES
Which of the following is the MOST likely cause of the hash being found in other areas?
A. Jan Smith is an insider threat
B. There are MD5 hash collisions
C. Shadow copies are present
D. The file is encrypted
25. A company must send sensitive data over a non-secure network via web services. The company
suspects that competitors are actively trying to intercept all transmissions. Some of the information may
be valuable to competitors, even years after it has been sent. Which of the following will help mitigate
the risk in the scenario? A. Use a third party for key escrow
B. Use algorithms that allow for PFS
C. Choose steam ciphers over block ciphers
D. Enable TLS instead of SSL
E. Digitally sign the data before transmission
26. Which of the following algorithms would be used to provide non-repudiation of a file transmission?
A. AES
B. RSA
C. MD5
D. SHA
27. A website developer who is concerned about theft cf the company's user database warns to protect
weak passwords from offline brute-force attacks. Which of the following be the BEST solution?
A. Use a key-stretching technique
B. Lock accounts after five failed logons
C. Hash passwords with the MD5 algorithm
D. Precompute passwords with rainbow tables
28. A technician needs to prevent data loss in a laboratory. The laboratory is not connected to any
external networks. Which of the following methods would BEST prevent data? (Select TWO)
A. File-level encryption
B. Drive encryption
C. USB blocker
D. VPN
E. Network firewall
F. MFA
29. A security analyst is hardening a network infrastructure. The analyst is given the following
requirements;
* Preserve the use of public IP addresses assigned to equipment on the core router.
* Enable "in transport 'encryption protection to the web server with the strongest ciphers.
Which of the following should the analyst implement to meet these requirements? (Select TWO).
A. Configure NAT on the core router
B. Configure VLANs on the core router
C. Enable 3DES encryption on the web server
D. Configure AES encryption on the web server
E. Configure BGP on the core router
F. Enable TLSv2 encryption on the web server
30. Which of the following algorithms has the SMALLEST key size?
A. RSA
B. AES
C. DES
D. Twofish
31. Which of the following BEST helps to demonstrate integrity during a forensic investigation?
A. Event logs
B. Encryption
C. Hashing
D. Snapshots