Security+ questions 3-17-2009

March 17, 2009

Hello All,

Sorry this has been so long in coming — the chapter was long with lots to remember.

This following is a list of questions of my own creation dealing with Security+; any errors made are my own fault not Sybex’s (the book I am using).

This would be Chapter 7 — Cyrptography Basics, Methods, and Standards.

So on with the questions based on the sections that drove me crazy!
1) What is Steganography?

A) The process of hiding one message in another, such as hiding information inside a picture
B) It is a made up term that does not exist
C) It is the process of character substitution — one character or symbol into another
D) Steganography is a hash value

2) Transposition Ciphers is/are:

A) A form of electronic watermarking
B) when a message is broken down into blocks and those blocks are then scrambled
C) The science of hiding one message inside another
D) A very strong hashing method used by the government

3) What is the primary use of a one-way hash?

A) Confidentiality
B) Authenticity
C) Availability
D) A true one-way hash does not exist — it is just half the process of a two-way hash.

4) Both SHA-1 and MD5 are good hashing algorithms — which of the two is faster?

A) SHA-1 is faster
B) MD5 is faster
C) Both are the same
D) SHA-1 is not a hashing algorithm

5) How many keys does an Asymmetric Algorithm use?

A) 1
B) 2
C) 3
D) 4

6) Which of these asymmetric algorithms are considered the de facto standard?

A) ECC
B) Diffie-Hellman
C) El Gamal
D) RSA

7) Which of these asymmetric algorithms are NOT used to encrypt or decrypt messages? it is used only to send keys securely over an
unsecure network (such as the Internet).

A) RSA
B) ECC
C) Diffie-Hellman
D) El Gamal

8 ) Which of these algorithms has a similar function as RSA but is used in smaller, less intelligent devices such as cell phones or wireless devices?

A) Elliptical Curve Cryptography (ECC)
B) Diffie-Hellman
C) El Gamal
D) RSA

9) The Digital Signature Algorithm (DSA) is based on which algorithm?

A) RSA
B) El Gamal
C) DES
D) 3DES

10) True or False — PKI (Public Key Infrastructure) is a/an asymmetric system

A) True
B) False

11) What is a Certificate Authority (CA) responsible for?

A) Message encryption
B) Issuing certificates
C) Issuing and revoking certificates
D) Issuing, revoking, and distributing certificates

12) A PKI (Public Key Infrastructure) has four key components — name them

A) CA, RA, RSA, and digital certificates
B) CA, RSA, digital certificates, CPS
C) CPS, RSA, RA, and digital certificates
D) Only digital certificates

13) Public Key Cryptography Standards (PKCS) is a set of mandatory standards created by RSA and security leaders. True or False?

A) True
B) False

14) True or false — X.509 v2 is for CRL and the v3 is for certificates

A) True
B) False

15) True or false — S/MIME uses asymmetric algorithms for confidentiality and digital certificates for authentication.

A) True
B) False

16) True or false — PGP uses only asymmetric encryption

A) True
B) False

17) There are two primary protocols used by IPSec — AH (Authentication Header) and ESP (Encapsulating Security Payload). What ports does AH and ESP use?

A) 48, 49
B) 50, 51
C) 52, 53
D) 54, 55

 

 
The answers:

 

 

 

 

 

 

 

1) A
2) B
3) B
4) B
5) B
6) D
7) C
8 ) A
9) B
10) True
11) D
12) A
13) False — voluntary standards
14) True
15) True
16) False
17) B

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: