C839 Additional Practice Answers 1 for PDF

Title C839 Additional Practice Answers 1 for
Author Joey Bouse
Course Economic Geography
Institution Missouri Western State University
Pages 12
File Size 265 KB
File Type PDF
Total Downloads 103
Total Views 224

Summary

Just to process time by running a hot dog stand in new york city beaches.
Having mustard is the best part of the stand...


Description

Answer Key 1.

What term from the list below best describes a data concealment method for covert communication that makes use of LSB replacement? Cryptanalysis Steganalysis Steganography Whitening

2.

Which block cipher below uses a block size of 128 bits and key sizes up to 256 bits? DES Blowfish Twofish Tiger

3.

Symmetric encryption is expressed mathematically as: C = E(k,p) P = E(k,c) Me % n y2 = x3 + Ax + B

4.

Hash Value Matching. Bit sizes may be used once, multiple times, or not at all. Hash Name 1. TIGER 2. SHA256 3. FORK256 4. SHA1 5. GOST 6. MD5 7. RIPEMD-160

5.

1. 2. 3. 4. 5. 6. 7.

7.

8.

Choice A. B. C. D. E. F. G.

16 bit 32 bit 64 bit 128 bit 160 bit 192 bit 256 bit

Symmetric Block Cipher to Key and Block Size Matching. Attributes may be used once, multiple times or not at all. Cipher Name

6.

Matched Answer _F___ _G___ _G___ _E___ _G___ _D___ _E___

Matched Answer

AES IDEA DES Blowfish Twofish Skipjack Serpent

_E___ _D___ _A___ _B___ _F___ _C___ _E___

Attribute A. B. C. D. E.

64 bit blocks; 56 bit key 64 bit blocks; 32-448 bit key 64 bit blocks; 80 bit key 64 bit blocks; 128 bit key 128 bit blocks; 128, 192 or 256 bit key F. 128 bit blocks; 1-256 bit key G. 26 bit blocks; 64 bit key

Identify and select the asymmetric encryption algorithms from the list below. (Select 3). RSA

IDEA

MD5

AES

ECC

DSA

RIPEMD-160

OFB

Identify and select the symmetric stream ciphers from the list below. (Select 3). DES

ECC

Blowfish

GOST

FISH

PIKE

RC4

AES

Identify and select the hash algorithms from the list below. (Select 4). AES

MD5

DH

GOST

FORK256

PIKE

RC4

RIPEMD-160

9.

Identify and select three viable options for key exchange from the list below. RSA

DH

MD5

AES

ECDH

SHA256

RIPEMD-160

MQV

10. Identify and select the 32-round symmetric block ciphers from the list below. (Select two. RSA

DH

DSA

AES

Skipjack

Blowfish

Serpent

DES

11. Which asymmetric encryption algorithm leverages characteristics of prime numbers and utilizes variable key lengths (1024-4096)? DSA ECC RSA Serpent 12. Which equation below represents the encryption process for RSA? C = E(k,p) P = E(k,c) Me % n y2 = x3 + Ax + B 13. How many rounds are used in AES encryption? 8, 10, or 12 10, 12, or 14 32 16 14. Of the two processes used in symmetric key cryptography, which involves XORing the plaintext message with the key? Transposition

Clustering

Initialization

Substitution

15. Of the two processes used in symmetric key cryptography, which involves swapping blocks of the text? Transposition

Clustering

Initialization

Substitution

16. An instance where two different pieces of data are hashed separately, but both result in a single identical hash value is described by what term? Collision Clustering Evolution Polybius 17. An instance where different encryption keys generate the same ciphertext from the same plaintext message is described by what term? Columnar rotation Columnar substitution Collision Clustering 18. Symmetric decryption is expressed mathematically as: C = E(k,p) P = E(k,c) Me % n y2 = x3 + Ax + B? 19. Instances where a change in in one bit in the plaintext would affect all the bits of the ciphertext is best described by what term? Avalanche Diffusion 20. Instances where a change in in one bit in the plaintext would affect multiple characters in the ciphertext is best described by what term? Confusion Diffusion

21. What is the standard for digital certificates? RFC 3526 DSA FIPS 197 X.509

22. If timeliness is a priority factor for checking revocation status, which option from the list below would you prefer and why? CRL, because it facilitates verifying certificates in real time OCSP, because it facilitates verifying certificates in real time 23. When looking for an encryption scheme where speed is of utmost importance, which would you prefer from the list below? Symmetric Asymmetric 24. When looking for an encryption solution for the data on your computer where full disk encryption is of utmost importance, which would you select from the list below? Bitlocker EFS 25. What Federal Information Processing Standard pertains to DSA? FIPS 197 FIPS 196 FIPS 180-4 FIPS 179 26. What Federal Information Processing Standard pertains to AES? FIPS 197 FIPS 196 FIPS 180-4 FIPS 179

27. From the list below, which two symmetric block encryption modes turn block ciphers into stream ciphers? OFB CTR ECB RC4 28. With which encryption type would you mostly likely need an accompanying key exchange solution for? Asymmetric Symmetric

29. What term from the list below best represents “one-way” encryption i.e. not reversible? Salt Symmetric DES Hash 30. Which equation below is associated with Elliptic Curve? C = E(k,p) P = E(k,c) Me % n y2 = x3 + Ax + B 31. From the terms below, which are associated with encryption using two keys? (Select 3) Asymmetric

SHA-2

Symmetric

AES

DES

DSA

RSA

Twofish

32. If you are sending an encrypted message to a colleague using symmetric encryption, of the choices below, (1) which key would you use to encrypt the message, and (2) which key would your colleague use to decrypt the message? (1) your colleague’s public key, (2) your colleague’s private key (1) your public key, (2) your private key (1) your private key, (2) your private key (1) your colleague’s private key, (2) your public key

33. If you are sending an encrypted message to a colleague using asymmetric encryption, of the choices below, (1) which key would you use to encrypt the message, and (2) which key would your colleague use to decrypt the message? (1) your colleague’s public key, (2) your colleague’s private key (1) your public key, (2) your private key (1) your private key, (2) your private key (1) your colleague’s private key, (2) your public key

34. From the list below, what term best describes an arbitrary, random or pseudo-random number used only once in cryptographic communication and is then discarded? Key Algorithm Round Nonce 35. What term below best describes an attack in which the attacker only has access to the ciphertext of a message? Chosen ciphertext Ciphertext only Known plaintext Plaintext only 36. According to Kerchoff’s Principle, a cryptosystem will remain secure so long as which component of it is not publicly known? Key Decryption Algorithm Ciphertext Encryption Algorithm

37. What technique should be used in conjunction with substitution to break up letter/word frequency and aid in combatting frequency analysis attacks? Decoding Hashing Signing Transposition

38. What trusted entity associated with certificate management is responsible for issuing, revoking, and managing digital certificates? Certification Authority Registration Authority Certificate Authority Key Distribution Center 39. What symmetric cipher was developed for use in the clipper chip? Skipjack Twofish Blowfish DSA 40. Which term from the list below best describes a number that only shares the number 1 as a common factor with another? Prime Co-Prime Rational Reciprocal 41. What is the binary XOR result the following number sets 10011011 & 11111110? 10011010 01100101 11111111 00000000 42. The Feistel Network used in symmetric block encryption entails the splitting of a block of plaintext prior to the application of respective encryption round and XOR functions. Which cipher from the list below is an “unbalanced” Feistel cipher (i.e. blocks of plaintext are split into unequal parts)? RC4 Skipjack PIKE TIGER

43. From the list below, which term is best described as a fixed-size, random stream, that is added to a block cipher to increase randomness? Feistel Initialization Vector Session Key Induction Vector

44. From the list below, which term is best described as random bits added to a password hash to help with safeguarding passwords in storage? Nonce

IV

Salt

Rounds

45. The Advanced Encryption Standard is a subset of which algorithm? Lucifer Kasiski Fibonacci Rijndael 46. Which software-based stream cipher uses a lagged Fibonacci generator? GOST FISH Blowfish Twofish 47. Which of the following is true of hash encryption? Requires a fixed length input and produces a different fixed length output Requires a fixed length input and produces a variable length output Accepts a variable length input and produces a fixed length output Accepts a variable length input and produces a different variable length output 48. What are the two types of symmetric encryption? Block Strong Fixed Stream

49. Which WiFI encryption standard is based on 802.11i and uses AES with CCMP to provide for enhanced confidentiality, integrity and authentication? WPA WEP WPA-2 Bluetooth

50. What is the binary OR result the following number sets 10011011 & 11111110? 10011010 01100101 11111111 00000000 51. What type of cryptanalysis involves the examination of differences in an input and how that affects the resultant difference in output? Hypothesis cryptanalysis Linear cryptanalysis Pseudo-random cryptanalysis Differential cryptanalysis 52. Identify and select the mono-alphabetic ciphers from the list below. (Select 4) Vigenere

ENIGMA

Atbash

Disk cipher

Ceasar

ROT-13

Scytale

ADFGVX

53. Which cipher entails using a rod of a certain length to create/encrypt a message, and the requiring the message recipient to use an identical sized rod to read/decrypt the message? Scytale Atbash Playfair PIKE

54. Which cipher makes use of a 5x5 table containing a keyword or key phrase and encrypts pairs of letters or digraphs? Scytale

Caesar

Playfair

Atbash

55. Which term from the list below represents the entire cryptographic operation i.e. the algorithm, key, and key management functions? Cryptography Cryptanalysis Cryptology Cryptosystem 56. Which term from the list below represents the total number of possible values of keys in a cryptographic algorithm or other security measure? Key negotiation Key space Cryptovariable Initialization vector 57. What term from the list below best describes a number whose factors are 1 and itself? Prime Co-Prime Rational Pseudo-random 58. From the list below, what term describes a mechanism used to create number streams with random properties? Examples include Lagged Fibonacci and Mersenne Twister. Modulus Operator Hash Algorithm Crypto randomizer Pseudo-random number generator

59. Kerberos components matching Hash Name Matched Answer 1. Ticket _B___ 2. TGS _D___ 3. KDC _A___ 4. TGT _E___ 5. AS _C___ Choices A. Server that provides the initial ticket B. Used to authenticate. Contains the identity of the client, the session key, timestamp, and checksum C. Server that authorizes the principal and connects them to the ticket granting server D. Issues tickets E. The ticket that is granted during the authentication process 60. Wifi attribute matching Hash Name 1. WEP 2. WPA 3. WPA-2 4. WPA-2 Enterprise

Choices A. B. C. D.

Matched Answer _C___ _B___ _A___ _D___

802.11i, uses AES with CCMP Replaces RC4 with TKIP Uses RC4, employs a 40-bit key with a 24-bit IV WPA-802.1x, requires RADUIS, employs EAP for authentication

61. What term below best describes an attack in which the attacker obtains ciphertext corresponding to a set of plaintexts to use in an attempt to derive the key used? Chosen plaintext Ciphertext only Known plaintext Plaintext only...


Similar Free PDFs