Data Security Test 4 Trivia Questions

40 Questions | Total Attempts: 71

SettingsSettingsSettings
Please wait...
Data Security Quizzes & Trivia

Zzz 11-14


Questions and Answers
  • 1. 
    What is data called that is to be encrypted by inputting into an encryption algorithm?
    • A. 

      Plaintext

    • B. 

      Cleartext

    • C. 

      Opentext

    • D. 

      Ciphertext

  • 2. 
    Which of the following is not a basic security protection over information that cryptography can provide?
    • A. 

      Confidentiality

    • B. 

      Stop loss

    • C. 

      Integrity

    • D. 

      Authenticity

  • 3. 
    The areas of a file in which steganography can hide data include all of the following except ________.
    • A. 

      In data that is used to describe the content or structure of the actual data

    • B. 

      In the directory structure of the file system

    • C. 

      In the file header fields that describe the file

    • D. 

      In areas that contain the content data itself

  • 4. 
    Proving that a user sent an email message is known as ________.
    • A. 

      Repudiation

    • B. 

      Integrity

    • C. 

      Nonrepudiation

    • D. 

      Availability

  • 5. 
    Symmetric cryptographic algorithms are also called _______.
    • A. 

      Private key cryptography

    • B. 

      Cipherkey cryptography

    • C. 

      Public/private key cryptography

    • D. 

      Public key cryptography

  • 6. 
    A(n) _______ is not decrypted, but is only used for comparison purposes.
    • A. 

      Stream

    • B. 

      Hash

    • C. 

      Algorithm

    • D. 

      Key

  • 7. 
    Each of the following is a characteristic of a secure hash algorithm except ________.
    • A. 

      Collisions should be rare

    • B. 

      The results of a hash function should not be reversed

    • C. 

      The hash should always be the same fixed size

    • D. 

      A message cannot be produced from a predefined hash

  • 8. 
    Hashing would not be used in which of the following examples?
    • A. 

      Bank automatic teller machine (ATM)

    • B. 

      Encrypting and decrypting email attachments

    • C. 

      Verifying a user password entered on a Linux system

    • D. 

      Determining the integrity of a message

  • 9. 
    _______ encrypts a hash with a shared secret key.
    • A. 

      Key_hash

    • B. 

      WEP

    • C. 

      MDRIPE

    • D. 

      Hashed Message Authentication Code (HMAC)

  • 10. 
    Which of the following is a protection provided by hashing?
    • A. 

      Authenticity

    • B. 

      Confidentiality

    • C. 

      Integrity

    • D. 

      Availability

  • 11. 
    _______ is a hash that uses two different and independent parallel chains of computation, the results of which are then combined at the end of the process.
    • A. 

      DES

    • B. 

      AES

    • C. 

      RC4

    • D. 

      RIPEMD

  • 12. 
    Which of the following is the strongest symmetric cryptographic algorithm?
    • A. 

      Advanced Encryption Standard

    • B. 

      Data Encryption Standard

    • C. 

      Triple Data Encryption Standard

    • D. 

      Rivest Cipher (RC) 1

  • 13. 
    If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, the key he uses to encrypt the message is _______.
    • A. 

      Alice’s private key

    • B. 

      Alice’s public key

    • C. 

      Bob’s public key

    • D. 

      Bob’s private key

  • 14. 
    A digital signature can provide each of the following benefits except _______.
    • A. 

      Prove the integrity of the message

    • B. 

      Verify the receiver

    • C. 

      Verify the sender

    • D. 

      Enforce nonrepudiation

  • 15. 
    Which of the following asymmetric cryptographic algorithms is the most secure?
    • A. 

      MEC-2

    • B. 

      RSA

    • C. 

      MD-17

    • D. 

      SHA-2

  • 16. 
    Which of the following asymmetric cryptographic algorithms uses prime numbers?
    • A. 

      EFS

    • B. 

      Quantum computing

    • C. 

      ECC

    • D. 

      RSA

  • 17. 
    ______ uses lattice-based cryptography and may be  more resistant to quantum computing attacks.
    • A. 

      NTRUEncrypt

    • B. 

      ECC

    • C. 

      RC4

    • D. 

      SHA-512

  • 18. 
    The Trusted Platform Module (TPM) _______.
    • A. 

      Allows the user to boot a corrupted disk and repair it

    • B. 

      Is only available on Windows computers running BitLocker

    • C. 

      Includes a pseudorandom number generator (PRNG)

    • D. 

      Provides cryptographic services in hardware instead of software

  • 19. 
    Which of the following has an onboard key generator and key storage facility, accelerated symmetric and asymmetric encryption, and can back up sensitive material in encrypted form?
    • A. 

      Trusted Platform Module (TPM)

    • B. 

      Self-encrypting hard disk drives (HDDs)

    • C. 

      Encrypted hardware-based USB devices

    • D. 

      Hardware Security Module (HSM)

  • 20. 
    The Microsoft Windows LAN Manager hash _______.
    • A. 

      Is weaker than NTLMv2

    • B. 

      Is part of BitLocker

    • C. 

      Is required to be present when using TPM

    • D. 

      Is identical to MD-4

  • 21. 
    The strongest technology that would assure Alice that Bob is the sender of a message is a(n) _______.
    • A. 

      Digital signature

    • B. 

      Encrypted signature

    • C. 

      Hash

    • D. 

      Digital certificate

  • 22. 
    A digital certificate associates ________.
    • A. 

      A private key with a digital signature

    • B. 

      the user’s identity with their public key

    • C. 

      A user’s private key with public key

    • D. 

      A user’s public key with their private key

  • 23. 
    Digital certification can be used for each of the following except ________.
    • A. 

      To verify the authenticity of the Registration Authorizer

    • B. 

      To verify the identity of clients and servers on the Web

    • C. 

      To encrypt messages for secure email communications

    • D. 

      To encrypt channels to provide secure communications between clients and servers

  • 24. 
    An entity that issues digital certificates is a _______.
    • A. 

      Certificate Signatory (CS)

    • B. 

      Signature Authority (SA)

    • C. 

      Digital Signer (DS)

    • D. 

      Certificate Authority (CA)

  • 25. 
    A centralized directory of digital certificates is called a(n) ________.
    • A. 

      Digital Signature Approval List (DSAP)

    • B. 

      Digital Signature Permitted Authorization (DSPA)

    • C. 

      Authorized Digital Signature (ADS)

    • D. 

      Certificate Repository (CR)

  • 26. 
    Each of the following is a field of an X.509 certificate except _________.
    • A. 

      Validity period

    • B. 

      CA expiration code

    • C. 

      Serial number

    • D. 

      Signature

  • 27. 
    To ensure a secure cryptographic connection between a Web browser and a Web server, a(n) ______would be used
    • A. 

      Email Web certificate

    • B. 

      Server digital certificate

    • C. 

      Personal digital certificate

    • D. 

      Web digital certificate

  • 28. 
    A digital certificate that turns the address bar green is a(n) _________.
    • A. 

      X.509 Certificate

    • B. 

      Advanced Web Server Certificate (AWSC)

    • C. 

      Extended Validation SSL Certificate

    • D. 

      Personal Web-Client Certificate

  • 29. 
    The ______ -party trust model supports CA.
    • A. 

      First

    • B. 

      Second

    • C. 

      Third

    • D. 

      Fourth

  • 30. 
    Public-Key Cryptography Standards (PKCS) ________.
    • A. 

      Are used to create public keys only

    • B. 

      Define how hashing algorithms are created

    • C. 

      Have been replaced by PKI

    • D. 

      Are widely accepted in the industry

  • 31. 
    Each of the following is true regarding a hierarchical trust model except _________.
    • A. 

      It assigns a signal hierarchy with one master CA

    • B. 

      It is designed for use on a large scale

    • C. 

      The master CA is called the root

    • D. 

      The root signs all digital certificate authorities with a single key

  • 32. 
    Dual-sided digital certificates ________.
    • A. 

      Are used in military and financial settings when it is necessary for the client to authenticate back to the server

    • B. 

      Are the same as dual-key digital certificates

    • C. 

      Are required under PKCS #1

    • D. 

      Require a special browser

  • 33. 
    Which of the following is not where keys can be stored?
    • A. 

      In hashes

    • B. 

      On the user’s local system

    • C. 

      Embedded in digital certificates

    • D. 

      In tokens

  • 34. 
    Public key infrastructure (PKI) ________.
    • A. 

      Creates private key cryptography

    • B. 

      Requires the use of an RA instead of a CA

    • C. 

      Generates public/private keys automatically

    • D. 

      Is the management of digital certificates

  • 35. 
    A(n) ______ is a published set of rules that govern the operation of a PKI.
    • A. 

      Certificate policy (CP)

    • B. 

      Certificate practice statement (CPS)

    • C. 

      Signature resource guide (SRG)

    • D. 

      Enforcement certificate (EF)

  • 36. 
    Which of the following is not part of the certificate life cycle?
    • A. 

      Authorization

    • B. 

      Creation

    • C. 

      Expiration

    • D. 

      Revocation

  • 37. 
    _______refers to a situation in which keys are managed by a third party, such as a trusted CA.
    • A. 

      Remote key administration

    • B. 

      Trusted key authority

    • C. 

      Key authorization

    • D. 

      Key escrow

  • 38. 
    _______ is a protocol for security accessing a remote computer.
    • A. 

      Secure Shell (SSH)

    • B. 

      Secure Sockets Layer (SSL)

    • C. 

      Secure Hypertext Transport Protocol (SHTTP)

    • D. 

      Transport layer Security (TLS)

  • 39. 
    What is the cryptographic transport protocol that is used most often to secure Web transactions?
    • A. 

      SHTTP

    • B. 

      PPPTPoE

    • C. 

      HTTPS

    • D. 

      MD-17

  • 40. 
    Which transport encryption algorithm is integrated as part of IPv6?
    • A. 

      IPsec

    • B. 

      SSH

    • C. 

      SSL/TLS

    • D. 

      RSA