cyber security 4 & 5
Cryptography is often used to make a message unreadable.
what is used
to physically hide a message?
Steganography
The Steganography message is called
the what?
Plaintext
Steganography takes the data it is protecting and hides it within a file. The process can utilize many areas of the file.
Which of the choices shown is NOT used?
File name
When using steganography to hide a message you can increase the protection of a message by using cryptography to encrypt the message. Examine the choices provided and select the one that describes encrypted information.
Ciphertext
Digital files all contain hidden information used to describe the content and structure. This information is called what?
Metadata
What are the primes (P & Q) used for the key generation in this lab?
• 5 and 3
With this type of key cryptography, the sender and receiver of a message share a single common key.
Symmetric
Hashing aims to produce what?
A fixed-size bit string
MD5 uses a hash value to create a hash which is typically a 32 character hex number and how many bits?
128
RIPEMD is a suite of cryptographic hash functions developed basing upon what?
MD4
What is PBKDF2 for?
Hashing passwords for storage
Which of the following is true concerning
RC4?
RC4 as the most widely used software stream cipher (it is used in
TLS and WEP) is simple to use with good performance, but security weaknesses are present.
Which of the items in the list is NOT an intended purpose for the certificate examined in the lab?
Time Synchronization
The what
Cryptography Standard
was used to produce the VeriSign Public key examined in the lab?
RSA
What could be considered a weakness of a Digital Certificate?
Does not prove sender is the intended individual
In Active Directory, what does authorization?
LDAP
A Digital signature is a piece of data digest encrypted with what ?
The private key of the signer.
Which of the following may be used as an alternative to CRLs?
OCSP
What is the faster way for browsers to obtain the revocation status of a digital certificate attached to a Web site?
OCSP
The security administrator for Conglomerate.com has been been directed by the ClO to reduce the cost of certificates.
Which of the following is the
FIRST step that should be taken?
Install a CA.
A centralized directory of digital certificates is called?
Certificate Repository (CR)
what is a published set of rules that govern the operation of a PKI.?
certificate policy (CP)
Which digital certificate displays the name of the entity behind the website?
Extended Validation (EV) Certificate
Public key infrastructure
(PKI) is what?
is the management of digital certificates
Which trust model has multiple CAs, one of which acts as a facilitator?
Bridge
what refers to a situation in which keys are managed by a third party, such as a trusted CA?
Key escrow
Which of these is considered the strongest cryptographic transport protocol?
TLS v1.2
What is a value that can be used to ensure that hashed plaintext will not consistently result in the same digest?
salt
What entity calls in crypto modules to perform cryptographic tasks?
Crypto service provider
Which of the following block ciphers XORs each block of plaintext with the previous block of ciphertext before being encrypted?
Cipher Block Chaining (CB)
what are symmetric keys to encrypt and decrypt information exchanged during the session and to verify its integrity?
Session keys
Which of these is NOT part of the certificate life cycle?
authorization
Digital certificates can be used for each of these
ЕХСЕРТ?
to verify the authenticity of the Registration Authorizer
Which of the following is
NOT a method for strengthening a key?
Variability
An entity that issues digital certificates is a what?
Certificate Authority (CA)
Which statement is NOT true regarding hierarchical trust models?
It is designed for use on a large scale.
The strongest technology that would assure Alice that
Bob is the sender of a message is?
digital certificate
what performs a real-time lookup of a digital certificate's status?
Online Certificate Status Protocol
(OCSP)
what is a protocol for securely accessing a remote computer?
Secure Shell (SSH)
A digital certificate associates what?
the user's identity with his public key