Question: Which type of network were VPN connections originally designed to tunnel through?
Answer Options:
Encrypted
Public
Private
Protected
Answer: Public
Question: Which three components involved in performing encryption are known to the party that will perform decryption before asymmetric encryption is applied?
Answer Options:
Private key
Plaintext content
Public key
Cryptographic algorithm
Nonce value
Answer: Private key
Public key
Cryptographic algorithm
Question: An administrator has configured a virtual private network (VPN) connection utilizing IPsec transport mode with Encapsulated Security Protocol (ESP) between a server in the corporate office and a client computer in the remote office. In which situation can the packet content be inspected?
Answer Options:
Only in the headquarters’ network while data is in transit
Only in the offsite location’s network while data is in transit
In the headquarters’ and offsite location’s networks after the data has been sent
In devices at headquarters and offsite before being sent and after being received
Answer: In devices at headquarters and offsite before being sent and after being received
Question: Which wireless cellular security standard uses either A5/1 or A5/2 stream ciphers for encrypted communications?
Answer Options:
WPA
GSM
VPN
WEP
Answer: GSM
Question: What does a brute-force attack to break encryption involve?
Answer Options:
Performing an exhaustive search to attempt every possible mapping or key
Analyzing ciphertext to identify text variation and comparing the text to standard English characters
Identifying part of the ciphertext and the corresponding plaintext
Interfering between two parties and sometimes intercepting or modifying data in the communication stream
Answer: Performing an exhaustive search to attempt every possible mapping or key
Question: Employee A needs to send Employee B a symmetric key for confidential communication. Which key is needed to decrypt the symmetric key?
Answer Options:
Employee B’s private key
Employee A’s public key
Employee A’s private key
Employee B’s public key
Answer: Employee B’s private key
Question: What do RC4 and AES have in common?
Answer Options:
Both use stream encryption
Both use block encryption
Both use asymmetric encryption
Both use symmetric encryption
Answer: Both use symmetric encryption
Question: Which protocol indicates a virtual private network (VPN) is using Encapsulating Security Payload (ESP)?
Answer Options:
48
50
51
58
Answer: 50
Question: What makes RC4 cipher unique compared to RC5 and RC6?
Answer Options:
Block
Stream
Symmetric
Asymmetric
Answer: Stream
Question: Employee B sends Employee A a signed message. What does Employee A use to verify the digital signature of the message?
Answer Options:
Employee B’s public key
Employee A’s private key
Employee A’s public key
Employee B’s private key
Answer: Employee B’s public key
Question: Which cipher is polyalphabetic and uses a keyword for encryption?
Answer Options:
Caesar
Bifid
SHA-1
Vigenère
Answer: Vigenère
Question: Employee B wants to exchange a session key with Employee A. Which key is used to encrypt the session key?
Answer Options:
Employee B’s public key
Employee B’s private key
Employee A’s private key
Employee A’s public key
Answer: Employee A’s public key
Question: How does FREAK crack Diffie-Hellman when the keys for exportable software are limited to 512 bits or fewer?
Answer Options:
Looks at the mathematical probability of paired values being used
Takes a list of the most common passwords and tries each entry
Rolls the initialization vector over and reuses the same values
Determines the prime numbers used within the algorithm
Answer: Determines the prime numbers used within the algorithm
Question: An administrator encrypts a disk volume with a symmetric key. Only the administrator should be able to access the data on the volume. The organization has a general use certificate for which management has access to both keys. What should be used to protect the encryption key?
Answer Options:
Administrator private key
Organization private key
Organization public key
Administrator public key
Answer: Administrator public key
Question: Which symmetric encryption technique uses a 112-bit key size and a 64-bit block size?
Answer Options:
IDEA
DES
3DES
AES
Answer: 3DES
Question: Which type of exploit involves looking for similar documents that generate the same hash?
Answer Options:
Differential cryptanalysis
Linear cryptanalysis
Birthday attack
Algebraic attack
Answer: Birthday attack
Question: A security analyst uses a 15-letter shift to encrypt a message. Which cipher is used to encrypt the message?
Answer Options:
Vigenère
Playfair
Caesar
Pigpen
Answer: Caesar