Self Test

A Quick Answer Key follows the Self Test questions. For complete questions, answers, and epxlanations to the Self Test questions in this chapter as well as the other chapters in this book, see the Self Test Appendix.

1. 

Encryption involves taking ordinary data and manipulating it so that it is not readable except by the desired party. The resulting secret message created in an encryption process is called?

  1. The one-time pad

  2. Ciphertext

  3. Message digest

  4. Digital signature

 answer b is correct. the resulting encrypted data is called the ciphertext. answer a is incorrect because a one-time pad is a type of secret key. answers c and d are incorrect because message digests and digital signatures do not include the data that is encrypted, but are produced dependent on that data.

2. 

Which of the following is not a symmetric algorithm?

  1. RSA

  2. IDEA

  3. DES

  4. AES

 answer a is correct. rsa is a public key system, not a symmetric algorithm. answers b , c , and d are incorrect because all are symmetric, or private key algorithms.

3. 

You are designing a high-speed encryption system for data communications. You believe that the best performance will be achieved through the use of a stream cipher. Which of the following do you select for your application?

  1. MAC

  2. MD5

  3. RC4

  4. RSA

 answer c is correct. rc4 is a stream cipher. answer a is incorrect because a mac is a message authentication code. answer b is incorrect because md5 stands for message digest 5; message digests are not stream ciphers. answer d is incorrect because rsa stands for rives, shamir and adleman, the names of the creators of the rsa key exchange algorithm as well as other encryption processes and algorithms.

4. 

Your boss would like to evaluate a VPN solution from a new vendor and asks for your opinion regarding the strength of the system. You reply that the strength of an encryption process should rely on:

  1. The strength of the encryption algorithm used

  2. The secrecy of the algorithm used

  3. The speed of the encryption process

  4. The use of ASICs for hardware encryption

 answer a is correct. the use or choice of strong keys of sufficient length is also important, as are other issues such as the secrecy of those keys, passphrase(s), and other factors. answer b is incorrect because a strong encryption process should not depend on the encryption algorithm remaining secret. answer c is incorrect because the speed of an encryption implementation may be important, but is unrelated to the inherent strength. answer d is incorrect because the choice or use of hardware solutions such as asics is independent of the strength of the encryption process. encryption strength should be equal regardless of a hardware or software implementation.

5. 

Digital signatures are created by?

  1. Block ciphers

  2. MACs

  3. Hashing functions

  4. Cryptanalysis

 answer c is correct. digital signatures are created through the use of hashing functions. answer a is incorrect because block ciphers are not involved with digital signatures. answer b is incorrect because mac stands for message authentication code answer d is incorrect because cryptanalysis is the attempt to resolve plaintext from ciphertext.

6. 

In a PKI system certificates are issued by:

  1. The client

  2. The government

  3. The CA

  4. The ORA

 answer c is correct. certificate authorities issue and revoke certificates in pki systems. answer a is incorrect because clients may possess certificates, but do not issue them. answer b is incorrect because the government is a non sequitur in this question. answer d is incorrect because an ora verifies certificate holders, their identities, and public keys in a pki system.

7. 

Your manager asks you how she knows if her digitally signed messages have been altered. You reply that if a single bit changes in a message with a digital signature then:

  1. The signature will match with the addition of a single bit

  2. The signature will not match and will not validate the message

  3. The message will be unreadable

  4. The sender will be unknown

 answer b is correct. even a single bit changed will result in the digital signature not matching. this will alert the recipient to the change. answer a is incorrect because bits cannot be added to a signature - they are a fixed size. answer c is incorrect because the message will still be readable. answer d is incorrect because the signature will not affect knowledge of the sender.

8. 

Key escrow involves which of the following options?

  1. Key storage on read-only media

  2. The placement of a private key with a trusted third party

  3. Destruction of keys after use

  4. Sharing of keys between trusted users

 answer b is correct. key escrow involves creation of a back door for recovery of keys. answers a , c , and d are incorrect.

9. 

Management has heard much regarding a vendor's use of Kerberos authentication in their product, and she wants to know what Kerberos is. You reply that it is:

  1. A public key authentication protocol

  2. An encryption algorithm for authentication protocols

  3. A vendor-specific authentication system

  4. A secret key authentication protocol

 answer d is correct. kerberos is a secret key authentication protocol. answers a , b , and c are incorrect because kerberos is not vendor specific and is not an algorithm.

10. 

Your database administrator would like his project's data encrypted and it includes an entire hard disk partition. What is the best choice for bulk data encryption?

  1. A one-time pad

  2. A private key system

  3. An asymmetric encryption system

  4. A hashing algorithm

 answer b is correct. a private key system will provide the performance needed to encrypt large amounts of data. answer a is incorrect because a one-time pad would require a key the size of the data set, thereby doubling the entire storage requirement, and is impractical. answer c is incorrect because asymmetric systems are considered too slow for large encryption tasks. answer d is incorrect because hashing would be a non-productive method of encrypting data for storage.

11. 

Security for public key exchanges can be provided by:

  1. Courier

  2. Known plaintext

  3. Known ciphertext

  4. Digital certificates

 answer d is correct. digital certificates provide means to authenticate the sender of a public key. in a pki system, a key distribution center can serve both functions. answer a is incorrect because, while a courier might carry a key, this answer bears little relation to modern data cryptography. also, couriers may not be trustworthy. answer b and answer c are incorrect because they are types of cryptographic attacks.

12. 

What is the definition of steganography?

  1. The hiding of ciphertext within plaintext

  2. The conversion of plaintext to ciphertext

  3. Hiding text data within images or other data types

  4. A cryptanalysis procedure

 answer c is correct. steganography involves hiding messages in images or other non-text data. answer a is incorrect because hiding ciphertext within plaintext does not accurately describe the process. answer b is incorrect because the conversion of plaintext to ciphertext is simply described as encryption. answer d is incorrect because steganography is not a cryptanalysis procedure.

13. 

For a recipient to decrypt a message you sent to them via a PKI system, you must do which of the following?

  1. Nothing

  2. Share your secret key

  3. Manually send your public key

  4. Manually create a session key

 answer a is correct. the pki system handles the work for the recipient and the sender. answer b is incorrect because you never want to share your secret key. answer c is incorrect because the ca will have your public key; you do not need to send it. answer d is incorrect because if the communication requires a session key, the application will handle this function.

14. 

What is a cryptovariable?

  1. The time delay in sending encrypted data

  2. The variation in the stream of ciphertext

  3. The variation in the key size used

  4. The secret key

 answer d is correct. a cryptovariable is the secret key used to encrypt data. answers a and b are incorrect because cryptovariables are not related to time delays, or variations in the ciphertext. answer c is incorrect because variations in the key size used changes the key space.

Answers

1. 

þ Answer B is correct. The resulting encrypted data is called the ciphertext.

ý Answer A is incorrect because a one-time pad is a type of secret key. Answers C and D are incorrect because message digests and digital signatures do not include the data that is encrypted, but are produced dependent on that data.

2. 

þ Answer A is correct. RSA is a public key system, not a symmetric algorithm.

ý Answers B, C, and D are incorrect because all are symmetric, or private key algorithms.

3. 

þ Answer C is correct. RC4 is a stream cipher.

ý Answer A is incorrect because a MAC is a message authentication code. Answer B is incorrect because MD5 stands for Message Digest 5; message digests are not stream ciphers. Answer D is incorrect because RSA stands for Rives, Shamir and Adleman, the names of the creators of the RSA key exchange algorithm as well as other encryption processes and algorithms.

4. 

þ Answer A is correct. The use or choice of strong keys of sufficient length is also important, as are other issues such as the secrecy of those keys, passphrase(s), and other factors.

ý Answer B is incorrect because a strong encryption process should not depend on the encryption algorithm remaining secret. Answer C is incorrect because the speed of an encryption implementation may be important, but is unrelated to the inherent strength. Answer D is incorrect because the choice or use of hardware solutions such as ASICs is independent of the strength of the encryption process. Encryption strength should be equal regardless of a hardware or software implementation.

5. 

þ Answer C is correct. Digital signatures are created through the use of hashing functions.

ý Answer A is incorrect because block ciphers are not involved with digital signatures. Answer B is incorrect because MAC stands for Message Authentication Code Answer D is incorrect because cryptanalysis is the attempt to resolve plaintext from ciphertext.

6. 

þ Answer C is correct. Certificate Authorities issue and revoke certificates in PKI systems.

ý Answer A is incorrect because clients may possess certificates, but do not issue them. Answer B is incorrect because the government is a non sequitur in this question. Answer D is incorrect because an ORA verifies certificate holders, their identities, and public keys in a PKI system.

7. 

þ Answer B is correct. Even a single bit changed will result in the digital signature not matching. This will alert the recipient to the change.

ý Answer A is incorrect because bits cannot be added to a signature - they are a fixed size. Answer C is incorrect because the message will still be readable. Answer D is incorrect because the signature will not affect knowledge of the sender.

8. 

þ Answer B is correct. Key escrow involves creation of a back door for recovery of keys.

ý Answers A, C, and D are incorrect.

9. 

þ Answer D is correct. Kerberos is a secret key authentication protocol.

ý Answers A, B, and C are incorrect because Kerberos is not vendor specific and is not an algorithm.

10. 

þ Answer B is correct. A private key system will provide the performance needed to encrypt large amounts of data.

ý Answer A is incorrect because a one-time pad would require a key the size of the data set, thereby doubling the entire storage requirement, and is impractical. Answer C is incorrect because asymmetric systems are considered too slow for large encryption tasks. Answer D is incorrect because hashing would be a non-productive method of encrypting data for storage.

11. 

þ Answer D is correct. Digital certificates provide means to authenticate the sender of a public key. In a PKI system, a key distribution center can serve both functions.

ý Answer A is incorrect because, while a courier might carry a key, this answer bears little relation to modern data cryptography. Also, couriers may not be trustworthy. Answer B and Answer C are incorrect because they are types of cryptographic attacks.

12. 

þ Answer C is correct. Steganography involves hiding messages in images or other non-text data.

ý Answer A is incorrect because hiding ciphertext within plaintext does not accurately describe the process. Answer B is incorrect because the conversion of plaintext to ciphertext is simply described as encryption. Answer D is incorrect because steganography is not a cryptanalysis procedure.

13. 

þ Answer A is correct. The PKI system handles the work for the recipient and the sender.

ý Answer B is incorrect because you never want to share your secret key. Answer C is incorrect because the CA will have your public key; you do not need to send it. Answer D is incorrect because if the communication requires a session key, the application will handle this function.

14. 

þ Answer D is correct. A cryptovariable is the secret key used to encrypt data.

ý Answers A and B are incorrect because cryptovariables are not related to time delays, or variations in the ciphertext. Answer C is incorrect because variations in the key size used changes the key space.



SSCP Systems Security Certified Practitioner Study Guide
SSCP Study Guide and DVD Training System
ISBN: 1931836809
EAN: 2147483647
Year: 2003
Pages: 135

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net