Security+ Chapter 5

24 July 2022
4.7 (114 reviews)
35 test answers

Unlock all answers in this set

Unlock answers (31)
question
The art of secret writing that enables an individual to hide the contents of a message from all but the intended recipient is called - Steganography - Cryptanalysis - Cryptography - Key management
answer
Cryptography
question
A corporate spy copies proprietary information into a text file and then hides the text file in an image file. The image file is then posted on the company's web site for others who know where to look to extract the information. This is the example of the use of - Social engineering - Steganography - Cryptography - Cryptanalysis
answer
Steganography
question
Agents intercept a message that is encrypted. They use various techniques to try and decipher the plain text message. This is an example of - Desteganographying - Decrypting - Uncrypting - Cryptanalysis
answer
Cryptanalysis
question
The ROT13 cipher is an example of a - Shift cipher - Substitution cipher - Transposition cipher - Vigenère cipher
answer
Shift cipher
question
The Vigenère cipher works as a - Asymmetric encryption cipher - Transposition and substitution cipher - Polyalphabetic transposition cipher - Polyalphabetic substitution cipher
answer
Polyalphabetic substitution cipher
question
The cipher that replaces each letter of the alphabet with a different letter (not in sequence) is a - Shift cipher - Substitution cipher - Transposition cipher - Vigenère ciphe
answer
Substitution cipher
question
Encrypting a message by simply rearranging the order of the letters is a function of the - Shift cipher - Substitution cipher - Transposition cipher - Vigenère cipher
answer
Substitution cipher
question
Keyspace refers to - The location where keys are stored - The number of keys needed to encrypt or decrypt a message - All possible key values - The portion of the algorithm that the key connects with to encrypt or decrypt a message
answer
All possible key values
question
An attacker is able to decrypt a message by finding a key that was not securely stored and should have been revoked. The is the result of - Poor key management - A weak key - A weak algorithm - A small keyspace
answer
Poor key management
question
A special mathematical function that performs one-way encryption is called - Asymmetric encryption - Transposition cipher - Hashing function - Multiple encryption
answer
Hashing function
question
Hashing algorithms can be compromised - By a collision attack - By reverse engineering the hash - With a differential cryptanalysis - With a linear cryptanalysis
answer
By a collision attack
question
Which of the following is NOT a hashing algorithm - SHA1 - MD2 - SHA3 - MD5
answer
SHA3
question
The encryption method based on the idea of using a shared key for encryption and decryption of data is - Hashing function - Symmetric encryption - Asymmetric encryption - Elliptical curve encryption
answer
Symmetric encryption
question
The encryption method base on the idea of two keys, one that is public and one that is private is - Hashing function - Symmetric encryption - Asymmetric encryption - Elliptical curve encryption
answer
Asymmetric encryption
question
All of the following are asymmetric encryption algorithms EXCEPT: - RSA - 3DES - ECC - ElGamal
answer
3DES
question
All of the following are symmetric encryption algorithms EXCEPT: - ECC - Blowfish - AES - DES
answer
ECC
question
Cryptographic algorithms are used for all of the following EXCEPT: - Confidentiality - Integrity - Availability - Authentication
answer
Availability
question
Keeping a copy of an encryption key with a trusted third party is known as - CYA - Key escrow - Key redundancy - Key management
answer
Key escrow
question
What application of encryption verifies that a document was sent by the person it says it is from? - Digital rights management - Asymmetric encryption - Cryptographic hash - Digital signatures
answer
Digital signatures
question
When a message sent by a user is digitally signed with a private key, the person will not be able to deny sending the message. This application of encryption is an example of - Authentication - Nonrepudiation - Confidentiality - Auditing
answer
Nonrepudiation
question
Alice sends an e-mail that she encrypts with a shared key, which only she and Bob have. Upon receipt Bob decrypts the email and reads it. This application of encryption is an example of - Confidentiality - Integrity - Authentication - Nonrepudiation
answer
Confidentiality
question
Alice sends Bob a message along with an MD5 hash of the message. Upon receipt, Bob runs the MD5 hashing algorithm and finds that the hash matches the one sent by Alice. This application of encryption is an example of - Authentication - Nonrepudiation - Integrity - Confidentiality
answer
Integrity
question
Bob connects to a company web site. His browser indicates that the digital certificate of the web site is valid. This application of encryption is an example of - Authentication - Nonrepudiation - Integrity - Confidentiality
answer
Authentication
question
The process for protecting intellectual property from unauthorized used is called - Key escrow - Anti-pirating management - Digital signatures - Digital rights management
answer
Digital rights management
question
All of the following are cryptographic applications EXCEPT: - PGP - FreeOTFE - StegDetect - GnuPG
answer
StegDetect
question
Cryptography is the process of attempting to return an encrypted message to its original form. True or False
answer
False
question
Decryption is the process of creating ciphertext from plaintext. True or False
answer
False
question
The Vigenère cipher is a polyalphabetic substitution cipher. True or False
answer
True
question
Hashing functions are special mathematical functions that performs a two-way encryption. True or False
answer
False
question
A collision attack is type of denial-of-service flooding attack that causes the number of collisions on the network to increase and thus bring down the network. True or False
answer
False
question
The benefit of SHA-1 over MD5 is that it is resistant to a collision attack. True or False
answer
False
question
DES, AES, RSA, and ECC are all examples of symmetric encryption. True or False
answer
False
question
Cryptography can be used to protect confidentiality and integrity as well be used to implement nonrepudiation, authentication, key escrow, digital signatures, and digital rights management. True or False
answer
True
question
The strength of a symmetric encryption is based on the secrecy of the algorithm, but the key can be public. True or False
answer
False
question
Hiding a text file in a jpg file is an example of steganography. True or False
answer
True