Diffie-Hellman is not an encryption algorithm.
1) True
2) False - Answers True
One of Diffie-Hellman's limitations is no authorization
1) True
2) False - Answers False
Two of the most important symmetric encryption algorithms are:
1) Triple-DES
2) Diffie-Hellman
3) DES
4) None of the above
5) RSA - Answers Triple-DES, DES
In your PKI lab, the root certificate included the private and public key
1) True
2) False - Answers False
Discretionary Access Control (DAC) is determined by the...
1) Individual
2) Group
3) Data owner
4) Manager
5) Data Custodian - Answers Data Owner
A Symmetric block encryption algorithm takes in 512-bits as an input and outputs?
1) 2048-bits
2) 1024-bits
3) 512-bits
4) 256-bits - Answers 512-bits
Which are the 3 types of Intrusion Detection Systems (IDS)?
1) Host-Based, Local Network-Based, Distributed/Hybrid
2) Heuristic-Based, Local Network-Based, Distributed/Hybrid
3) Host-Based, Network-Based, Distributed/Hybrid
4) Hyper-V-Based, Local Network-Based, Distributed/Hybrid - Answers Host-Based, Network-Based,
Distributed/Hybrid
Which model deals with no readdown?
1) Bibe Model
2) Bell-LaPadule
3) Biba model
4) Bell-LaPadula - Answers Biba Model
Most controls systems should not be set to deny by default.
1) True
2) False - Answers False
TOR is completely bulletproof
1) True
2) False - Answers False
In Steganography the _____________ of the picture may be the message
1) Pixel
2) MSB
3) Bit
4) LSB
5) Header - Answers LSB
Diffie-Hellman makes use of Asymmetric encryption
1) True
2) False - Answers True
During a common attack methodology, privilege escalation means?
1) Being able to Remote into another server
2) Having a Top Secret Clearance
, 3) Being able to run Powershell
4) Being able to do all of the same functions as an Administrator - Answers Being able to do all of the
same functions as an Administrator
Eavesdropping is known as what type of attack?
1) Difficult
2) Passive
3) Easy
4) Moderate - Answers Passive
If you give access to someone; you should be able to take it away
1) True
2) False - Answers True
DoS stands for Denial-of-State
1) True
2) False - Answers False
Which of the following are block cipher examples? (Check all that apply)
1) Blowfish
2) DES
3) AES
4) 3DES
5) Diffie-Hellman
6) RSA - Answers DES, 3-DES
Select ALL correct answers(s). UDP Three-Way connection handshake is
1) None of the above
2) ACK
3) SYN
4) SYN-ACK - Answers ACK, SYN, SYN-ACK
Preventing access to a file, user or directory is part of which access control?
1) Denying Access
2) Defining Access
3) Revoking Access
4) Limiting Access
5) Allowing Access
6) Revising Access - Answers Denying Access
Script-kiddies are the hardest to defend against
1) True
2) False - Answers False
Email encryption uses SSL/TLS
1) True
2) False - Answers True
Select ALL correct answers(s). The 3 different levels of intruders are...
1) Foreman
2) Journeyman
3) Master
4) Senior
5) Intermediate
6) Apprentice - Answers Journeyman, Master, Apprentice
I am not a Robot, is part of which control
1) Discretionary Access Control
2) Rule-Based Access Control
3) Mandatory Access Control
4) Required Access Control
5) Role-Based Access Control
6) Attribute-Based Access Control - Answers Attribute-Based Access Control
The principal of least privilege allows full access to everyone
1) True
2) False - Answers False
UDP protocol is mainly used for - Answers Video streaming