Cybersecurity Quiz: Encryption, Authentication, and Audit

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What tool is required to diagnose which network adapter is causing a broadcast storm on the LAN?

  • Firewall
  • Intrusion detection system
  • Protocol analyzer (correct)
  • Port scanner

Which of the following is Anthony’s private key pair in the scenario described?

  • (7,20)
  • (6,33)
  • (7,33) (correct)
  • (6,20)

What type of authentication model allows users to enter their credentials once to access multiple server resources?

  • Virtual private network
  • Single sign-on (correct)
  • Federated identity management
  • Three-factor authentication

What is the term for installing agents on client computers to monitor them from a server program?

<p>SCCM (A)</p> Signup and view all the answers

Which of the following is a stream cipher used for encryption?

<p>RC4 (B)</p> Signup and view all the answers

What is used to secure Layer 2 Tunneling Protocol (L2TP) sessions?

<p>IPsec (C)</p> Signup and view all the answers

Which of the following access control models is the weakest?

<p>Discretionary access control (D)</p> Signup and view all the answers

Which encryption type has the shortest key length?

<p>DES (D)</p> Signup and view all the answers

Which of the following cryptographic techniques uses the bitwise XOR operation to combine the keystream with the plaintext?

<p>One-time pad (D)</p> Signup and view all the answers

Which of the following is a type of multifactor authentication?

<p>Username and password (A)</p> Signup and view all the answers

Which access control model is typically used in firewalls?

<p>Rule-based access control (B)</p> Signup and view all the answers

Which of the following is considered a 'something you are' factor in authentication?

<p>Thumbprint (D)</p> Signup and view all the answers

Which encryption algorithm would provide the best balance between security and performance for encrypting credit card data?

<p>AES (D)</p> Signup and view all the answers

What remote authentication protocol was developed by Cisco?

<p>TACACS+ (D)</p> Signup and view all the answers

After identifying risks during an audit, what should be the next step?

<p>Develop a risk mitigation plan (A)</p> Signup and view all the answers

What security feature keeps users in a standard user mode, even if they are part of the administrators group?

<p>User Account Control (UAC) (C)</p> Signup and view all the answers

Which statement about digital certificates is true?

<p>Certificates bind a public key with a user identity. (A)</p> Signup and view all the answers

Which encryption algorithm is a common standard that can work with a 256-bit key size?

<p>AES (B)</p> Signup and view all the answers

What is the primary function of a block cipher?

<p>To encrypt data in fixed-size blocks (B)</p> Signup and view all the answers

In which scenario would a symmetric key algorithm be used instead of a PKI?

<p>Encrypting data with the same key for sender and receiver (B)</p> Signup and view all the answers

Which network protocol is designed for secure file transfer between computers?

<p>SSH (B)</p> Signup and view all the answers

What is the primary purpose of hashing algorithms like MD5?

<p>To verify the integrity of data (D)</p> Signup and view all the answers

Which authentication protocol is considered more secure than PAP because it encrypts usernames and passwords?

<p>CHAP (C)</p> Signup and view all the answers

What is the primary advantage of using a hybrid cipher over a block cipher or stream cipher alone?

<p>Combining the strengths of both symmetric and asymmetric encryption (C)</p> Signup and view all the answers

Which security control is implemented to prevent the use of stolen certificates?

<p>CRL (Certificate Revocation List) (C)</p> Signup and view all the answers

Which type of security control do computer security audits fall under?

<p>Detective (C)</p> Signup and view all the answers

What is the value of the shared secret key that Alice and Bob will use for further encryption, given the following Diffie-Hellman key agreement parameters?

<p>6 (A)</p> Signup and view all the answers

What is the purpose of authentication in an organization's IT systems?

<p>To grant rights to use the organization's IT assets, systems, applications, and data to a specific user. (C)</p> Signup and view all the answers

Flashcards are hidden until you start studying

Study Notes

Network Troubleshooting

  • A protocol analyzer is required to diagnose which network adapter is causing a broadcast storm on the LAN.

Cryptography

Key Pairs

  • Anthony's private key pair for SSL consists of two prime numbers, p = 3 and q = 11, and e = 3.

Authentication

  • Single sign-on (SSO) is an authentication model where users can enter their credentials one time and access multiple server resources.
  • Federated identity management is not the same as SSO.

Network Management

  • NMS (Network Management System) involves installing agents on client computers and monitoring them from a central server.

Security Controls

  • Administrative security controls deal with policies, procedures, security awareness training, and disaster recovery plans.

Cryptography

  • RC4 is a stream cipher.
  • L2TP sessions are secured using IPsec.

Block Ciphers

  • A block cipher encrypts 128 bits of data at a time before sending it across the network.

PKI Certificates

  • E-commerce, web logins, and VPNs use PKI.
  • E-mail and other communications may not use PKI.

Network Protocols

  • SSH is used for secure data transfer between computers.

Data Integrity

  • Compare the final MD5 hash with the original to verify that a download from the Internet has not been modified.

Authentication

  • PAP is insecure because usernames and passwords are sent as clear text.
  • RADIUS provides authentication, authorization, and accounting services.

Encryption

  • DES is a weak encryption type.
  • One-time pad combines the keystream with the plaintext message using the bitwise XOR operator to produce the ciphertext.

Access Control

  • Multifactor authentication uses two or more types of authentication.
  • Role-based access control is used in firewalls.

Authentication Factors

  • Something the user is (e.g., thumbprint) is a type of authentication factor.

Digital Certificates

  • An X.509 certificate contains the issuer's name, certificate version, and public key information, but not the owner's symmetric key.
  • A CRL is digitally signed by the CA to ensure authenticity.

Group Management

  • Tom can add users to a group more efficiently using various tools.

Encryption Algorithms

  • AES is a secure algorithm with low CPU utilization.

Remote Authentication

  • TACACS+ was developed by Cisco.

Auditing

  • After risk has been scanned for, analyzed, and calculated, a plan should be developed to mitigate risk.

User Account Control

  • User account control keeps users in a standard user mode, even if they are administrators.

Cryptography

  • Certificates are digitally signed electronic documents that bind a private key with a user identity.
  • AES is a common encryption standard used today that can work with a 256-bit block size.
  • In cryptography, the key is essential to determine the output of a cipher.

PKI

  • Most PKIs do not use a web of trust model.

Auditing

  • Computer security audits fall under detective security controls.

Key Agreement

  • Diffie-Hellman key agreement method can be used to agree on a shared secret key between Alice and Bob.
  • The shared secret key is 5 in the given scenario.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Use Quizgecko on...
Browser
Browser