Question 1 An example of an active attack is an attack where someone is eavesdropping on a communication

| October 22, 2018

Question
1

An
example of an active attack is an attack where someone is eavesdropping on a
communication line to capture information being transmitted.
True

False

Question
2

How
can a symmetric encryption algorithm be figured out or “cracked”?
A.
Cryptanalysis
B.
Denial of service
C.
Man in the middle
D.
Brute force
E.
Eavesdropping

1.

A, D

2.

A, B

3.

A, E

4.

B, C

5.

D, E

6.

A, C

Question
3

The
number of passwords that can be generated from the set of characters {a,b,c,d} with
replacement is? (replacement means you can use each character multiple times)

1.

64

2.

24

3.

256

4.

512

5.

1024

2 points
Question
4

The
standard that defines and guides Public Key Infrastructure is:

1.

X.800

2.

X.509

3.

RFC 3280

4.

Document – New Directions in
Cryptography

5.

ASN.1 for PKIX

2 points
Question
5

Assume
there are 256 possible keys in the universe of keys for a particular cipher.
How many keys on average would need to be tried to break the cipher? Blank 1
2 points
Question
6

A
message is sent using a Message Authentication Code (MAC). An attacker
intercepts the message, changes the message and sends it to the original
recipient. The recipient of the message will not detect the change.
True

False

2 points
Question
7

A
block encryption algorithm encrypts fixed size blocks.
True

False

2 points
Question
8

The
number of passwords that can be generated from the set of characters {a,b,c,d}
without replacement is? (without replacement means you can use each character
once and only once)

1.

24

2.

64

3.

128

4.

256

5.

512

2 points
Question
9

Match
the “value” with the technology.

secret
key

Public
key

Private
key

Message
digest

Pseudo
random numbers

Answer

A.

Hash
algorithms

B.

PRNG

C.

Asymmetric
encryption

D.

Symmetric
encryption

7 points
Question
10

A
digital certificate is issued with a digital signature from a certificate
authority. The digital certificate binds together a public key with an
identity.
True

False

2 points
Question
11

The
difference between the DES and 3DES algorithms is?

1.

DES is symmetric encryption. 3DES
is asymmetric encryption.

2.

DES uses 16 subkeys for encryption
and decryption, 3DES uses 3.

3.

DES uses 1 key for encryption and
decryption; 3DES uses 3 keys.

4.

3DES uses a Feistel network, DES
does not.

5.

None of the answers are correct.

2 points
Question
12

Using
a rail fence cipher with depth of 2 decrypt the following ciphertext:
TEATIAMDIH HPRYSTINGT Blank 1
2 points
Question
13

XOR
the two values together.
Select
the correct result.
0110
1011 1111
1101
1100 1100

1.

0100
1000 1100

2.

1011
0111 0011

3.

None of
the selections

4.

1111
1111 1111

5.

0100
1000 1100

2 points
Question
14

An
attribute of randomness that can be used to determine the strength of a
password is known as?

1.

Entropy

2.

Diffusion

3.

Confusion

4.

Maturation

5.

Reversability

2 points
Question
15

The
standard that guides Security Architecture for OSI:

1.

X.800

2.

X.504

3.

FIPS Pub 200

4.

X.895 Security Standard

5.

RFC 2828

2 points
Question
16

A
root digital certificate is typically issued by who?

1.

Registration authority

2.

Certificate authority

3.

Any individual

4.

X800 standards commitee

5.

A secure directory system that
uses LDAP

2 points
Question
17

The
number of different keys used in symmetric encryption is Blank 1
2 points
Question
18

Select
the correct answer. The Diffie Hellman algorithm is used for what?

1.

Public key encryption.

2.

Symmetric encryption

3.

Message Authentication

4.

Key Exchange

5.

Message digest generation

2 points
Question
19

When
creating a digital envelope which of the following steps are done.
A.
The message is encrypted using a one time random symmetric key
B.
The one time random symmetric key is encrypted by using the receivers private
key
C.
The one time random key is made a public key
D.
The message is encrypted by using a one time random asymmetric key
E.
The one time random symmetric key is encrypted with the receivers public key

1.

A, E

2.

A, C

3.

B, E

4.

C, D

5.

A, D

2 points
Question
20

Select
the best answer that defines Security Risk

1.

Threat of attack coupled with
security breach

2.

Threat of attack and vulnerability
to attack

3.

Vulnerability to attack coupled
with an active attack

4.

Threat of active and passive
attack

2 points
Question
21

Using
a Playfair cipher what is the plaintext for the following ciphertext.
RNNEQLDKPCNRMI The keyword you should use is “MONEY”. You are being
asked to decrypt this message. Blank 1
2 points
Question
22

With
a symmetric block cipher the relationship with key size, security and
performance is what?
A.
The larger the key the more secure the algorithm
B.
The larger the key size the slower encryption/decryption performance.
C.
The larger the key the easier to perform cryptanalysis
D.
The smaller the key the more secure the encryption/decryption
E.
The larger the key the faster the encryption/decryption performance.

1.

A, C

2.

A, B

3.

A, B, C

4.

C, D

5.

B, C

2 points
Question
23

A
Security Mechanism is an implementation of a specific program, process or
device that is designed to detect, prevent, or recover from a security attack.
True

False

2 points
Question
24

Match
the cryptology mechanism with what type it is.

DES

AES

Diffie
Hellman

Cipher
block chaining

Cipher
feedback

RC4

Electronic
codebook

SHA1

3DES

MD5

Answer

A.

Symmetric
stream encryption

B.

Mode
of operation

C.

Hashing
algorithm

D.

Key
exchange

E.

Symmetric
block encryption

7 points
Question
25

A
Security Service protects against specific threats according to the
categorization of security threats in the X.503 architecture.
True

False

2 points
Question
26

Assuming
only asymmetric encryption is being used for communication between two parties.
How many different keys are in play for sending one message from person A to
person B? Assume person B reads the message.

1.

2

2.

1

3.

Cannot determine

4.

At least three

2 points
Question
27

Select
the best answer. If the sender uses the recipients public key to encrypt a
message what functionality is provided:

1.

Message integrity

2.

Message confidentiality

3.

Message authentication

4.

Message authentication and message
confidentiality

5.

none of the choices

2 points
Question
28

Using
a rail fence cipher with a depth of 3 encrypt the following message:
The
party is at Fenway in October Blank 1
2 points
Question
29

The
sender of the message in Digital signature encrypts the message digest using
what?

1.

The secret key.

2.

Receivers public key.

3.

Senders private key.

4.

Symmetric key.

5.

MAC value.

2 points
Question
30

A
digital certificate is what?

1.

A
notarized document certifying your identity.

2.

A mail
message sent with a Digital Signature from any third party that certifies the
identity of a person or an entity.

3.

Secret
keys (among other information) used for symmetric encryption.

4.

Public
key (among other information) used for asymmetric encryption.

5.

A mail
message from a registration authority (RA).

2 points
Question
31

Prime
numbers are sometimes used to construct private and public key pairs.
True

False

2 points
Question
32

The
key benefit of the Feistel Cipher is:

1.

The same algorithm can be used for
encryption and decryption.

2.

There are always 16 rounds.

3.

There can be more then 16 rounds.

4.

The algorithm is very difficult to
analyze.

5.

The algorithm can use different
block sizes.

2 points
Question
33

Match
the specific attack with the type of attack it is.

Disruption of Service

Eavesdropping

Masquerade

Traffic
Analysis

Modification
of data

Replay

Answer

A.

Active

B.

Passive

6 points
Question
34

Match
the Feistel mechanism with the corresponding attribute. Use each option once.
Select the best choice.

Confusion
of data
.umassonline.net/webapps/assessment/take/launch.jsp?course_assessment_id=_65003_1&course_id=_31479_1&content_id=_2378818_1&step=null”>Read Answer Items for Question 34

Diffusion
of data
.umassonline.net/webapps/assessment/take/launch.jsp?course_assessment_id=_65003_1&course_id=_31479_1&content_id=_2378818_1&step=null”>Read Answer Items for Question 34

XOR of
data
.umassonline.net/webapps/assessment/take/launch.jsp?course_assessment_id=_65003_1&course_id=_31479_1&content_id=_2378818_1&step=null”>Read Answer Items for Question 34

Round
function
.umassonline.net/webapps/assessment/take/launch.jsp?course_assessment_id=_65003_1&course_id=_31479_1&content_id=_2378818_1&step=null”>Read Answer Items for Question 34

Subkey
.umassonline.net/webapps/assessment/take/launch.jsp?course_assessment_id=_65003_1&course_id=_31479_1&content_id=_2378818_1&step=null”>Read Answer Items for Question 34

Answer

A.

S
(substitution) Box

B.

Uses P
Boxes and S Boxes

C.

Boolean
operation combines keys with data

D.

Derived
from overall key

E.

P
(permutation) Box

5 points
Question
35

Select
the best answer. If the senders private key is used to encrypt a message what
functionality is provided:

1.

Message integrity and
confidentiality

2.

Message confidentiality

3.

Message authentication

4.

Message authentication and message
integrity

5.

Message authentication and message
confidentiality

2 points
Question
36

Match
the specific authentication technique with general type of authentication it
is.

Password
.umassonline.net/webapps/assessment/take/launch.jsp?course_assessment_id=_65003_1&course_id=_31479_1&content_id=_2378818_1&step=null”>Read Answer Items for Question 36

Iris
scanning
.umassonline.net/webapps/assessment/take/launch.jsp?course_assessment_id=_65003_1&course_id=_31479_1&content_id=_2378818_1&step=null”>Read Answer Items for Question 36

Typing
speed
.umassonline.net/webapps/assessment/take/launch.jsp?course_assessment_id=_65003_1&course_id=_31479_1&content_id=_2378818_1&step=null”>Read Answer Items for Question 36

ATM
card
.umassonline.net/webapps/assessment/take/launch.jsp?course_assessment_id=_65003_1&course_id=_31479_1&content_id=_2378818_1&step=null”>Read Answer Items for Question 36

Public
/ Private Key
.umassonline.net/webapps/assessment/take/launch.jsp?course_assessment_id=_65003_1&course_id=_31479_1&content_id=_2378818_1&step=null”>Read Answer Items for Question 36

Answer

A.

Encryption
authentication

B.

Token
authentication

C.

Static
biometric authentication

D.

Active
biometric authentication

E.

Something
a person knows

5 points
Question
37

The
Diffie-Hellman key exchange is vulnerable to a Blank 1 attack.
2 points
Question
38

Using
a Playfair cipher encrypt the following plaintext: THE CAR IS HERE Use HELLO as
the keyword to set up the matrix. Show the answer in digraph form. Blank 1
2 points
Question
39

The
CIA acronym refers to which of the following:

1.

Central Intelligence Association

2.

Confidentiality, Integrity,
Availability

3.

Communication, Integrity,
Accessibility

4.

Cipher, Intelligence, Availability

5.

None of the above

2 points
Question
40

A
secret key used for generating a message authentication code (MAC) should only
be shared between the sender and receiver of a message.
True

False

2 points
Save
and Submit

Order your essay today and save 30% with the discount code: ESSAYHELP
Order your essay today and save 30% with the discount code: ESSAYHELPOrder Now