Module II Certification Quiz

43 Questions | Total Attempts: 3127

SettingsSettingsSettings
Module Quizzes & Trivia

See if I can get this one done before Odie wakes up also.


Questions and Answers
  • 1. 
      Which of the following refers to the ability to be reasonably certain that data is not modified or tampered with:
    • A. 

      Confidentiality

    • B. 

      Integrity

    • C. 

      Authentication

    • D. 

      Non-repudiation

  • 2. 
      Which of the following types of cryptography is typically used to provide an integrity check?
    • A. 

      Symmetric

    • B. 

      Asymmetric

    • C. 

      Public key

    • D. 

      Hash

  • 3. 
      Which of the following describes the validation of a message‚Äôs origin?
    • A. 

      Confidentiality

    • B. 

      Integrity

    • C. 

      Asymmetric encryption

    • D. 

      Non-repudiation

  • 4. 
      Identify the service provided by message authentication code (MAC) hash:
    • A. 

      Integrity

    • B. 

      Fault tolerance

    • C. 

      Key recovery

    • D. 

      Data recovery

  • 5. 
      Which of the following provides the MOST secure form of encryption?
    • A. 

      Diffie-Hellman

    • B. 

      3DES

    • C. 

      AES

    • D. 

      DES

  • 6. 
      Which of the following would be needed to ensure that a user who has received an email cannot claim that the email was not received?
    • A. 

      Non-repudiation

    • B. 

      Data integrity

    • C. 

      Anti-aliasing

    • D. 

      Asymmetric cryptography

  • 7. 
      A security specialist has downloaded a free security software tool from a trusted industry site. The source has published the MD5 hash values for the executable program. The specialist performs a successful virus scan on the download but the MD5 hash is different. Which of the following steps should the specialist take?
    • A. 

      Avoid executing the file and contact the source website administrator

    • B. 

      Re-run the anti-virus program to ensure that it contains no virus execute

    • C. 

      Install the executable program because there was probably a mistake with the MD5 value

    • D. 

      Ignore the MD5 hash values because the values can change during IP fragmentation

  • 8. 
      Encryption is the conversion of data into a form, called a ciphertext, that cannot be easily understood by unauthorized people. Which of he following is considered the weakest encryption?
    • A. 

      SHA

    • B. 

      RSA

    • C. 

      AES

    • D. 

      DES

  • 9. 
      Which option is correct about a hash algorithms ability to avoid the same output from two guessed inputs?
    • A. 

      Collision ability

    • B. 

      Collision metric

    • C. 

      Collision resistance

    • D. 

      Collision strength

  • 10. 
      Which description is true about how to accomplish steganography in graphic files?
    • A. 

      Replacing the most significant bit of each byte

    • B. 

      Replacing the most significant byte of each bit

    • C. 

      Replacing the least significant byte of each bit

    • D. 

      Replacing the least significant bit of each byte

  • 11. 
      Which item will effectively allow for fast, highly secure encryption of a USB flash drive?
    • A. 

      SHA-1

    • B. 

      3DES

    • C. 

      AES256

    • D. 

      MD5

  • 12. 
      Which description is correct concerning the process of comparing cryptographic hash functions of system executables, configuration files, and log files?
    • A. 

      Network based intrusion detection

    • B. 

      Host based intrusion detection

    • C. 

      File integrity auditing

    • D. 

      Stateful packet filtering

  • 13. 
      Encryption is the conversion of data into a form, called a ciphertext that cannot be easily understood by unauthorized people. Which encryption is the strongest by use of mathematical evaluation techniques?
    • A. 

      ROT13

    • B. 

      AES

    • C. 

      DES

    • D. 

      3DES

  • 14. 
      Which algorithms can best encrypt large amounts of data?
    • A. 

      Symmetric key algorithms

    • B. 

      Asymmetric key algorithms

    • C. 

      ECC algorithms

    • D. 

      Hashing algorithms

  • 15. 
      Which method will most effectively verify that a patch file downloaded from a third party has not been modified since the time that the original manufacturer released the patch?
    • A. 

      Download the patch file through a SSL certificate

    • B. 

      Compare the final MD5 hash with the original

    • C. 

      Compare the final LANMAN hash with the original

    • D. 

      Download the patch file over an AES encrypted session

  • 16. 
      Which of the following would be MOST desirable when attacking encrypted data?
    • A. 

      Weak key

    • B. 

      Algorithm used

    • C. 

      Block cipher

    • D. 

      Sniffed traffic

  • 17. 
      Most current encryption schemes are based on:
    • A. 

      Time stamps

    • B. 

      Randomizing

    • C. 

      Digital rights management

    • D. 

      Algorithms

  • 18. 
      The Diffie-Hellman encryption algorithm relies on which of the following?
    • A. 

      Passwords

    • B. 

      Key exchange

    • C. 

      Digital signatures

    • D. 

      Tunneling

  • 19. 
      Which of the following will permit an administrator to find weak passwords on the network?
    • A. 

      A hash function

    • B. 

      A network mapper

    • C. 

      A password generator

    • D. 

      A rainbow table

  • 20. 
      What is steganography primarily used for?
    • A. 

      Hiding information

    • B. 

      Encrypt information

    • C. 

      Data integrity

    • D. 

      Message digest

  • 21. 
      Which encryption algorithms can be used to encrypt and decrypt data?
    • A. 

      MD5

    • B. 

      NTLM

    • C. 

      RC5

    • D. 

      SHA-1

  • 22. 
      Which of the following would allow an administrator to find weak passwords on the network?
    • A. 

      A network mapper

    • B. 

      A hash function

    • C. 

      A rainbow table

    • D. 

      A password generator

  • 23. 
      Which of the following refers to the ability to be reasonably certain that data is not disclosed to unintended persons?
    • A. 

      Non-repudiation

    • B. 

      Confidentiality

    • C. 

      Integrity

    • D. 

      Authentication

  • 24. 
      In order to encrypt credit card data, which will be the most secure algorithm with the least CPU utilization?
    • A. 

      MD5

    • B. 

      SHA-1

    • C. 

      3DES

    • D. 

      AES

  • 25. 
      Hashing is the transformation of a string of characters into a fixed length value or key that represents the original string. Hashing is used to index and retrieve items in a database. Which description is correct when a hashing algorithm generates the same hash for two different messages?
    • A. 

      A deviation occurred

    • B. 

      A hashing chain occurred

    • C. 

      A collision occurred

    • D. 

      A one-way hash occurred

Back to Top Back to top