WITH 100% CORRECT ANSWERS
Which type of attack is a bit-flipping attack? - Answer- Known plaintext
True or False? There is a single, global public-key infrastructure (PKI). - Answer-
FALSE
True or False? A 192-bit secret key, on average, has 2^191 keys to crack - Answer-
TRUE
We wish to crack an RSA key using brute force. Which of the following techniques will
be most efficient and successful? - Answer- Try to factor N to find P and Q.
PGP implemented _______________, making it so that no single person was
universally trusted to sign certificates. - Answer- a web of trust
In 2008, researchers at Princeton University demonstrated techniques to retrieve RAM
contents after the computer had been powered off. They then extracted drive encryption
keys from RAM and used them to decrypt an encrypted drive. This is called a(n) -
Answer- cold-boot attack
Encryption can help protect volumes in all of the following situations, except: - Answer-
to prevent physical damage to a hard drive
File encryption protects data on a computer against all of the following, except: -
Answer- Trojan crypto.
True or False? Self-rekeying transforms an existing encryption key into a new one using
a pseudorandom number generator. - Answer- TRUE
Secure Sockets Layer (SSL): - Answer- may display a padlock on a Web page to
indicate SSL protection.
Virtual private networking is used primarily for encrypting: - Answer- a connection
between two sites across the internet.
True or False? A network attack in which someone forges network traffic would be
considered an active attack. - Answer- TRUE
, In an SSL data packet, the field that indicates whether the packet carries data, an alert
message, or is negotiating the encryption key is: - Answer- content type.
True or False? The Diffie-Hellman cipher is a full encryption method. - Answer- FALSE
True or False? After changing an encryption key, all backup copies of the protected file
are also protected by the new key. - Answer- FALSE
What is the single most important feature of stream encryption that could prevent
reused key streams? - Answer-
What RSA attack relies on mathematical test to reduce the risk that the chosen number
isn't really a prime number? - Answer- Bogus Prime
When we share a key with two or more people, we refer to that group as being the: -
Answer- Cryptonet
Which of the following represents the best size for a cryptonet? - Answer- The fewest
people who require access to the encrypted data
What was the first web browser to use public key certificates? - Answer- Netscape
Navigator
Encrypting an encryption key using a passphrase is called: - Answer- key wrapping
The U.S. government standards published by NIST recommended that a secret key be
used for no more than _______ years before changing it. - Answer- 2
Section 8.1.1 discusses NIST recommendations for cryptoperiods. Which of the
following best summarizes the recommendations? - Answer- Issue a new key at least
every 2 years and use that key for all subsequent encryption tasks. Use old keys for
decryption only as needed
When encrypting a file, a fully punctuated passphrase should have a minimum of
________ characters. - Answer- 20
True or False? When you visit a website with an "https" prefix in the address, the site
uses encryption on the web data it sends and receives. - Answer- TRUE
True or False? A certificate authority is a trusted third party that issues certificates on
behalf of some organization. - Answer- TRUE
True or False? A keyed hash gives us a way to verify that some of our own data has not
been modified by an attacker or someone who doesn't have the secret key. - Answer-
TRUE