Pre-Assessment Intro to Cryptography - D334 10 studiers in 3 days 5.0 (6 reviews) Students also studied Terms in this set (60) Western Governors UniversityD 278 Save C839v5/D334 Additional Practice Teacher 165 terms ShawnD_Preview Introduction to Cryptography - D33...250 terms Square_Bubble Preview C839v5/D334 Algorithms Drill Teacher 51 terms ShawnD_Preview Introdu 120 term Per A business wants to use keys issued by a trusted third party to demonstrate to potential customers that it is a legitimate organization. Which key is used to sign the certificate issued to the business?
- Private key of the root CA
- Public key of the root CA
- Private key of the company
- Public key of the company
- Private key of the root CA
- Public key of the root CA
- Private key of the company
- Public key of the company
Private key of the root CA A business wants to use keys issued by a trusted third party to demonstrate it is a legitimate organization to potential customers. Which key should the business send to potential customers to prove its identity?
Public key of the company What should an administrator use to import and export all items written using X.509 that are part of a chain of trust?
A. CER
- Public Key Cryptography Standard (PKCS) #7
- Public Key Cryptography Standard (PKCS) #12
D. RTF
Public Key Cryptography Standard (PKCS) #12
Which field displays the hash, or digest, of the certificate in an X.509 certificate?
- Subject
- Issuer
- Version
- Thumbprint
- Initialization
- Issued
- Cancellation
- Hold
- Encrypting it with its private key
- Encrypting it with its public key
- Signing it with its private key
- Signing it with its public key
Thumbprint Which certificate management process involves key recovery?
Issued Which task does a root CA perform before publishing its own certificate?
Signing it with its private key Which algorithm is used to generate the thumbprint of a certificate?
A. RSA
B. 3DES
C. AES
D. SHA-1
SHA-1 Large volumes of plaintext need to be encrypted, and the encryption keys need to be securely distributed.Which approach should be used for encryption and distribution?
- Encrypt by using symmetric keys and distribute by
- Encrypt by using asymmetric keys and distribute by
- Encrypt by using symmetric keys and distribute by
- Encrypt by using asymmetric keys and distribute by
- A public key is used for both encryption and
- A private key is used for both encryption and
- A public key is used for encryption, and a private key is
- A private key is used for encryption, and a public key is
using asymmetric keys
using symmetric keys
using symmetric keys
using asymmetric keys Encrypt by using symmetric keys and distribute by using asymmetric keys What is the role of a key in asymmetric encryption and decryption?
decryption.
decryption.
used for decryption.
used for decryption.A public key is used for encryption, and a private key is used for decryption.
A security analyst is validating the integrity and authenticity of a data transaction. Which PKI component is being used?
- Digital certificate
- Digital signature
- Asymmetric encryption
- Symmetric encryption
- Certificate signing request (CSR)
- Certificate policy (CP)
- Certificate revocation list (CRL)
- Certificate authority (CA)
- 40
- 56
Digital signature Which PKI component generates digital certificates?
Certificate authority (CA) What is the maximum length (in bits) of encryption keys used by the WEP protocol?
C. 128
D. 256
40 What is a difference between WPA-Enterprise and WPA- Personal?
- Support for Temporal Key Integrity Protocol
- Support for an authentication server
- Use of a session key
- Use of a 48-bit initialization vector
Support for an authentication server Which cipher is used with WEP?
A. RC5
B. RC4
C. TKIP
D. AES
RC4 How does TKIP improve WPA over WEP?
- Hashes the initialization vector and secret key
- Implements a RADIUS server
- Implements an authentication server
- Creates an AES encryption key
- Only at the headquarters
- Only at the offsite location
- At the headquarters and the offsite location
- Between the headquarters and the offsite location
Hashes the initialization vector and secret key An administrator has configured a virtual private network (VPN) connection utilizing IPsec tunnel mode with Encapsulating Security Payload (ESP) between the corporate office and a remote office. Where can the packets be inspected by intrusion detection systems (IDSs) and virus scanners?
At the headquarters and the offsite location
Which default port must be open for the IPsec key exchange to be successful?
A. UDP 162
B. TCP 389
C. TCP 465
D. UDP 500
UDP 500
Which protocol indicates the virtual private network (VPN) is using Authentication Header (AH)?
- 48
- 50
- 51
- 58
- Bifid
51 Which cipher uses a grid to map letters into numeric values?
B. SHA-1
- Caesar
- Vigenère
- Playfair
- Rail code
- Pigpen
- Vigenère
- Analyzing ciphertext to identify text variation and
- Performing an exhaustive search to attempt every
- Interfering between two parties and sometimes
- Identifying part of the ciphertext and the
- Frequency analysis
- Brute force
- Kasiski examination
- Known plaintext
- Only has factors of itself and 1
- Only has factors of itself and 2
- Evenly divisible by 3.14
- Evenly divisible by 10
Bifid Which cipher uses a five-by-five matrix with nonrepeating characters?
Playfair What does a frequency analysis attack to break encryption involve?
comparing the text to standard English characters
possible mapping or key
intercepting or modifying data in the communication stream
corresponding plaintext Analyzing ciphertext to identify text variation and comparing the text to standard English characters Which technique should a security analyst use to determine the key length in a Vigenère cipher?
Kasiski examination What defines a prime number?
Only has factors of itself and 1