Podcast
Questions and Answers
Mike is sending David an encrypted message using a symmetric encryption algorithm. What key should he use to encrypt the message?
Mike is sending David an encrypted message using a symmetric encryption algorithm. What key should he use to encrypt the message?
- Mike's private key
- David's public key
- Shared secret key (correct)
- Mike's public key
Shahla recently discovered an attack where the attacker managed to force a network user to use weak encryption and was then able to decrypt that content. What term best describes this attack?
Shahla recently discovered an attack where the attacker managed to force a network user to use weak encryption and was then able to decrypt that content. What term best describes this attack?
- Downgrade (correct)
- Collision
- Homomorphic encryption
- Birthday attack
Norm is using full-disk encryption technology to protect the contents of laptops against theft. What goal of cryptography is he attempting to achieve?
Norm is using full-disk encryption technology to protect the contents of laptops against theft. What goal of cryptography is he attempting to achieve?
- Non-repudiation
- Authentication
- Confidentiality (correct)
- Integrity
Brian discovers that a user suspected of stealing sensitive information is posting many image files to a message board. What technique might the individual be using to hide sensitive information in those images?
Brian discovers that a user suspected of stealing sensitive information is posting many image files to a message board. What technique might the individual be using to hide sensitive information in those images?
Which one of the following statements about cryptographic keys is incorrect?
Which one of the following statements about cryptographic keys is incorrect?
What type of cipher operates on one character of text at a time?
What type of cipher operates on one character of text at a time?
Vince is choosing a symmetric encryption algorithm for use in his organization. He would like to choose the strongest algorithm from these choices. What algorithm should he choose?
Vince is choosing a symmetric encryption algorithm for use in his organization. He would like to choose the strongest algorithm from these choices. What algorithm should he choose?
Kevin is configuring a web server to use digital certificates. What technology can he use to allow clients to quickly verify the status of those certificates without contacting a remote server?
Kevin is configuring a web server to use digital certificates. What technology can he use to allow clients to quickly verify the status of those certificates without contacting a remote server?
Acme Widgets has 10 employees and they all need the ability to communicate with one another using a symmetric encryption system. The system should allow any two employees to securely communicate without other employees eavesdropping. If an 11th employee is added to the organization, how many new keys must be added to the system?
Acme Widgets has 10 employees and they all need the ability to communicate with one another using a symmetric encryption system. The system should allow any two employees to securely communicate without other employees eavesdropping. If an 11th employee is added to the organization, how many new keys must be added to the system?
Referring to the scenario in question 9, if Acme Widgets switched to an asymmetric encryption algorithm, how many keys would be required to add the 11th employee?
Referring to the scenario in question 9, if Acme Widgets switched to an asymmetric encryption algorithm, how many keys would be required to add the 11th employee?
What type of digital certificate provides the greatest level of assurance that the certificate owner is who they claim to be?
What type of digital certificate provides the greatest level of assurance that the certificate owner is who they claim to be?
Glenn recently obtained a wildcard certificate for *.mydomain.com. Which one of the following domains would not be covered by this certificate?
Glenn recently obtained a wildcard certificate for *.mydomain.com. Which one of the following domains would not be covered by this certificate?
Which one of the following servers is almost always an offline CA in a large PKI deployment?
Which one of the following servers is almost always an offline CA in a large PKI deployment?
Which one of the following certificate formats is closely associated with Windows binary certificate files?
Which one of the following certificate formats is closely associated with Windows binary certificate files?
What type of security solution provides a hardware platform for the storage and management of encryption keys?
What type of security solution provides a hardware platform for the storage and management of encryption keys?
What type of cryptographic attack attempts to force a user to reduce the level of encryption that they use to communicate with a remote server?
What type of cryptographic attack attempts to force a user to reduce the level of encryption that they use to communicate with a remote server?
David would like to send Mike a message using an asymmetric encryption algorithm. What key should he use to encrypt the message?
David would like to send Mike a message using an asymmetric encryption algorithm. What key should he use to encrypt the message?
When Mike receives the message that David encrypted for him, what key should he use to decrypt the message?
When Mike receives the message that David encrypted for him, what key should he use to decrypt the message?
If David wishes to digitally sign the message that he is sending Mike, what key would he use to create the digital signature?
If David wishes to digitally sign the message that he is sending Mike, what key would he use to create the digital signature?
When Mike receives the digitally signed message from David, what key should he use to verify the digital signature?
When Mike receives the digitally signed message from David, what key should he use to verify the digital signature?
Flashcards
Shared Secret Key
Shared Secret Key
A secret key used by both the sender and receiver to encrypt and decrypt messages.
Downgrade Attack
Downgrade Attack
An attack forcing a user to use weak encryption to decrypt content.
Confidentiality
Confidentiality
Protecting data from unauthorized disclosure.
Steganography
Steganography
Signup and view all the flashcards
Stream Cipher
Stream Cipher
Signup and view all the flashcards
AES Encryption
AES Encryption
Signup and view all the flashcards
Certificate Stapling
Certificate Stapling
Signup and view all the flashcards
Symmetric Key Addition
Symmetric Key Addition
Signup and view all the flashcards
Asymmetric Key Addition
Asymmetric Key Addition
Signup and view all the flashcards
EV Certificate
EV Certificate
Signup and view all the flashcards
Wildcard Certificate Limitations
Wildcard Certificate Limitations
Signup and view all the flashcards
Root CA
Root CA
Signup and view all the flashcards
PFX Certificate
PFX Certificate
Signup and view all the flashcards
HSM
HSM
Signup and view all the flashcards
Downgrade Attack
Downgrade Attack
Signup and view all the flashcards
Encrypt with Public Key
Encrypt with Public Key
Signup and view all the flashcards
Decrypt with Private Key
Decrypt with Private Key
Signup and view all the flashcards
Sign with Private Key
Sign with Private Key
Signup and view all the flashcards
Verify with Public Key
Verify with Public Key
Signup and view all the flashcards
Full-Disk Encryption
Full-Disk Encryption
Signup and view all the flashcards