Professional Documents
Culture Documents
1. Your organization uses the Kerberos protocol to authenticate users on the network. Which statement is
true of the Key Distribution Center (KDC) when this protocol is used?
A.
B.
C.
D.
3. Management has asked you to research encryption and make a recommendation on which encryption
technique to use. During this research, you examine several different cryptosystems. Which parameter
determines their strength?
A.
B.
C.
D.
4. You work for a digital imaging company. As part of the copyright process, all images owner by your
company have a watermark. Which statement is true of this process?
A.
B.
C.
D.
high processing
key management
hardware and software implementation
different keys for encryption and decryption
6. Which service is fulfilled by cryptography by ensuring that a sender cannot deny sending a message
once it is transmitted?
A. confidentiality
B. authenticity
C. integrity
Cryptography
D. non-repudiation
7. You need to determine whether the information in a file has changed. What should you use?
A.
B.
C.
D.
8. Which statement is NOT true of the operation modes of the data encryption standard (DES) algorithm?
A.
B.
C.
D.
Electronic Code Book (ECB) mode operation is best suited for database encryption.
ECB is the easiest and fastest DES mode that can be used.
ECB repeatedly uses produced ciphertext to encipher a message consisting of blocks.
Cipher Block Chaining (CBC) and Cipher Feedback (CFB) mode are best used for
authentication.
9. You are the security administrator for an organization. Management decides that all communication on
the network should be encrypted using the data encryption standard (DES) algorithm. Which statement is
true of this algorithm?
A.
B.
C.
D.
digital certificates
private keys
public keys
serial numbers
11. The security policy of your organization states that all e-mail messages to entities not within the
organization must be digitally signed. Doing this provides all of the following, EXCEPT:
A.
B.
C.
D.
confidentiality
authentication
nonrepudiation
integrity
12. Your organization has decided to use one-time pads to ensure that certain confidential data is
protected. All of the following statements are true regarding this type of cryptosystem, EXCEPT:
A. Each one-time pad can be used only once.
Cryptography
B. The pad must be made up of sequential values.
C. The pad must be as long as the message.
D. The pad must be distributed and stored in a secure manner.
ActiveX
Cross-site scripting (XSS)
Java
Common Gateway Interface (CGI)
15. Which service provided by a cryptosystem turns information into unintelligible data?
A.
B.
C.
D.
nonrepudiation
authorization
integrity
confidentiality
16. What is a list of serial numbers of digital certificates that have not expired, but should be considered
invalid?
A.
B.
C.
D.
CA
CRL
KDC
UDP
Cryptography
D. Cross certification allows users to validate each other's certificate when they are certified
under different certification hierarchies.
19. Recently your company upgraded all client computers to Windows Vista. During this upgrade, you
received several error messages regarding digitally signed drivers. What is the purpose of this type of
driver?
A.
B.
C.
D.
quality assurance
confidentiality
availability
authorization
the algorithm
the secrecy of the key
the length of the data being encrypted
the length of the key
22. You are preparing a proposal for management about the value of using cryptography to protect your
network. Which statement is true of cryptography?
A.
B.
C.
D.
message integrity
message availability
message confidentiality
message replay
24. You have decided to attach a digital timestamp to a document that is shared on the network. Which
attack does this prevent?
Cryptography
A.
B.
C.
D.
a replay attack
a side channel attack
a ciphertext-only attack
a known-plaintext attack
25. What is an algorithm that is used to create a message digest for a file?
A.
B.
C.
D.
plaintext
hash
ciphertext
public key
27. Which cipher type replaces the original text in a message with a different text?
A.
B.
C.
D.
block cipher
stream cipher
substitution cipher
transposition cipher
28. Which characteristic of PGP is different from the use of formal trust certificates?
A.
B.
C.
D.
29. Management decides to use message authentication code (MAC) to protect network messages.
Which type of attack does this prevent?
A.
B.
C.
D.
Cryptography
30. Of which type of encryption algorithm is Diffie-Hellman an example?
A.
B.
C.
D.