Question: Which type of network were VPN connections originally designed to tunnel through?

Answer Options:
Encrypted
Public
Private
Protected

Answer: Public

 

Question: Which three components involved in performing encryption are known to the party that will perform decryption before asymmetric encryption is applied?

Answer Options:
Private key
Plaintext content
Public key
Cryptographic algorithm
Nonce value

Answer: Private key
Public key
Cryptographic algorithm

 

Question: An administrator has configured a virtual private network (VPN) connection utilizing IPsec transport mode with Encapsulated Security Protocol (ESP) between a server in the corporate office and a client computer in the remote office. In which situation can the packet content be inspected?

Answer Options:
Only in the headquarters’ network while data is in transit
Only in the offsite location’s network while data is in transit
In the headquarters’ and offsite location’s networks after the data has been sent
In devices at headquarters and offsite before being sent and after being received

Answer: In devices at headquarters and offsite before being sent and after being received

 

Question: Which wireless cellular security standard uses either A5/1 or A5/2 stream ciphers for encrypted communications?

Answer Options:
WPA
GSM
VPN
WEP

Answer: GSM

 

Question: What does a brute-force attack to break encryption involve?

Answer Options:
Performing an exhaustive search to attempt every possible mapping or key
Analyzing ciphertext to identify text variation and comparing the text to standard English characters
Identifying part of the ciphertext and the corresponding plaintext
Interfering between two parties and sometimes intercepting or modifying data in the communication stream

Answer: Performing an exhaustive search to attempt every possible mapping or key

 

Question: Employee A needs to send Employee B a symmetric key for confidential communication. Which key is needed to decrypt the symmetric key?

Answer Options:
Employee B’s private key
Employee A’s public key
Employee A’s private key
Employee B’s public key

Answer: Employee B’s private key

 

Question: What do RC4 and AES have in common?

Answer Options:
Both use stream encryption
Both use block encryption
Both use asymmetric encryption
Both use symmetric encryption

Answer: Both use symmetric encryption

 

Question: Which protocol indicates a virtual private network (VPN) is using Encapsulating Security Payload (ESP)?

Answer Options:
48
50
51
58

Answer: 50

 

Question: What makes RC4 cipher unique compared to RC5 and RC6?

Answer Options:
Block
Stream
Symmetric
Asymmetric

Answer: Stream

 

Question: Employee B sends Employee A a signed message. What does Employee A use to verify the digital signature of the message?

Answer Options:
Employee B’s public key
Employee A’s private key
Employee A’s public key
Employee B’s private key

Answer: Employee B’s public key

 

Question: Which cipher is polyalphabetic and uses a keyword for encryption?

Answer Options:
Caesar
Bifid
SHA-1
Vigenère

Answer: Vigenère

 

Question: Employee B wants to exchange a session key with Employee A. Which key is used to encrypt the session key?

Answer Options:
Employee B’s public key
Employee B’s private key
Employee A’s private key
Employee A’s public key

Answer: Employee A’s public key

 

Question: How does FREAK crack Diffie-Hellman when the keys for exportable software are limited to 512 bits or fewer?

Answer Options:
Looks at the mathematical probability of paired values being used
Takes a list of the most common passwords and tries each entry
Rolls the initialization vector over and reuses the same values
Determines the prime numbers used within the algorithm

Answer: Determines the prime numbers used within the algorithm

 

Question: An administrator encrypts a disk volume with a symmetric key. Only the administrator should be able to access the data on the volume. The organization has a general use certificate for which management has access to both keys. What should be used to protect the encryption key?

Answer Options:
Administrator private key
Organization private key
Organization public key
Administrator public key

Answer: Administrator public key

 

Question: Which symmetric encryption technique uses a 112-bit key size and a 64-bit block size?

Answer Options:
IDEA
DES
3DES
AES

Answer: 3DES

 

Question: Which type of exploit involves looking for similar documents that generate the same hash?

Answer Options:
Differential cryptanalysis
Linear cryptanalysis
Birthday attack
Algebraic attack

Answer: Birthday attack

 

Question: A security analyst uses a 15-letter shift to encrypt a message. Which cipher is used to encrypt the message?

Answer Options:
Vigenère
Playfair
Caesar
Pigpen

Answer: Caesar