1. Question
What encryption algorithm uses the same pre-shared key to encrypt and decrypt data? Select one:
- asymmetric
- hash
- one-time pad
- symmetric
Explanation:
Symmetric encryption algorithms use the same pre-shared key to encrypt and decrypt data.
The correct answer is: symmetric
2. Question
What are three examples of administrative access controls? (Choose three.) Select one or more:
- intrusion detection system (IDS)
- policies and procedures
- hiring practices
- encryption
- background checks
- guard dogs
Explanation:
Administrative access controls are defined by organizations to implement and enforce all aspects of
controlling unauthorized access and include the following:
• Policies
• Procedures
• Hiring practices
• Background checks
• Data classification
• Security training
• Reviews
3. Question
What type of cipher encrypts plaintext one byte or one bit at a time? Select one:
- elliptical
- stream
- enigma
- hash
- block
Explanation:
Stream ciphers encrypt plaintext one byte or one bit at a time, and can be much faster than block
ciphers.
4. Question
What is the term used to describe the science of making and breaking secret codes? Select one:
- impersonation
- cryptology
- factorization
- jamming
- spoofing
Explanation:
Cryptology is the science of making and breaking codes to make sure that cyber criminals cannot
easily compromise protected information.
5. Question
What is the name of the method in which letters are rearranged to create the ciphertext? Select one:
- enigma
- substitution
- one-time pad
- transposition
Explanation:
Ciphertext can be created by using the following:
• Transposition “ letters are rearranged
• Substitution “ letters are replaced• One-time pad “ plaintext combined with a secret key creates a new character, which then combines with the plaintext to produce ciphertext
6. Question
What cryptographic algorithm is used by the NSA and includes the use of elliptical curves for digital signature generation and key exchange? Select one:
- RSA
- ECC
- IDEA
- El-Gamal
- AES
Explanation:
Elliptic curve cryptography (ECC) uses elliptic curves as part of the algorithm for digital signature
generation and key exchange.
7. Question
What term is used to describe the technology that replaces sensitive information with a nonsensitive version? Select one:
- masking
- hiding
- retracting
- whiteout
- blanking
Explanation:
Data masking replaces sensitive information with non sensitive information. After replacement, the
non sensitive version looks and acts like the original.
8. Question
Which two terms are used to describe cipher keys? (Choose two.) Select one or more:
- key randomness
- keylogging
- key space
- key length
Explanation:
The two terms used to describe keys are the following:
• Key length – Also called the key , this is the measure in bits.
• Key space – This is the number of possibilities that a specific key length can
generate. As key length increase, the key space increases exponentially.
9. Question
What encryption algorithm uses one key to encrypt data and a different key to decrypt data? Select one:
- one-time pad
- transposition
- asymmetric
- symmetric
Explanation:
Asymmetric encryption uses one key to encrypt data and a different key to decrypt data.
10. Question
A warning banner that lists the negative outcomes of breaking company policy is displayed each
time a computer user logs in to the machine. What type of access control is implemented? Select one:
- masking
- deterrent
- preventive
- detective
Explanation:
Deterrents are implemented to discourage or mitigate an action or the behavior of a malicious person.
11. Question
Which term describes the technology that protects software from unauthorized access or modification? Select one:
- trademark
- copyright
- access control
- watermarking
Explanation:
Software watermarking inserts a secret message into the program as proof of ownership and
protects software from unauthorized access or modification.
12. Question
Which three devices represent examples of physical access controls? (Choose three.) Select one or more:
- routers
- locks
- servers
- firewalls
- swipe cards
- video cameras
Explanation:
Physical access controls include but are not limited to the following:
• Guards
• Fences
• Motion detectors
• Laptop locks
• Locked doors
• Swipe cards
• Guard dogs• Video cameras
• Mantraps
• Alarms
13. Question
Match the description with the correct term.
S/N | Term | Description |
1 | obfuscation | hiding data within an audio file |
2 | social steganography | making a message confusing so it is harder to understand |
3 | steganalysis | creating a message that says one thing but means something else to a specific audience |
4 | steganography | discovering that hidden information exists within a graphic file |
- obfuscation → making a message confusing so it is harder to understand,
- social steganography → creating a message that says one thing but means something else to a specific audience,
- steganalysis → discovering that hidden information exists within a graphic file,
- steganography → hiding data within an audio file.
14. Question
Which asymmetric algorithm provides an electronic key exchange method to share the secret key? Select one:
- DES
- RSA
- WEP
- hashing
- Diffie-Hellman
Explanation:
Diffie-Hellman provides an electronic exchange method to share a secret key and is used by multiple
secure protocols.
15. Question
What term is used to describe concealing data in another file such as a graphic, audio, or other text file? Select one:
- steganography
- hiding
- masking
- obfuscation
Explanation:
Steganography conceals data in a file such as a graphic, audio, or other text file and is used to
prevent extra attention to the encrypted data because the data is not easily viewed.
16. Question
Which three protocols use asymmetric key algorithms? (Choose three.) Select one or more:
- Secure File Transfer Protocol (SFTP)
- Secure Sockets Layer (SSL)
- Secure Shell (SSH)
- Telnet
- Advanced Encryption Standard (AES)
- Pretty Good Privacy (PGP)
Explanation:
Four protocols use asymmetric key algorithms:
• Internet Key Exchange (IKE)
• Secure Socket Layer (SSL)
• Secure Shell (SSH)
• Pretty Good Privacy (PGP)
17. Question
Which 128-bit block cipher encryption algorithm does the US government use to protect classified information? Select one:
- AES
- Vignere
- 3DES
- Skipjack
- Caesar
Explanation:
The Advanced Encryption Standard (AES) is used to protect classified information by the U.S.
government and is a strong algorithm that uses longer key lengths.
18. Question
Which type of cipher is able to encrypt a fixed-length block of plaintext into a 128-bit block of ciphertext at any one time? Select one:
- stream
- hash
- transform
- symmetric
- block
Explanation:
Block ciphers transform a fixed-length block of plaintext into a block of ciphertext. To decrypt the
ciphertext, the same secret key to encrypt is used in reverse.
19. Question
Match the type of authentication term with the description.
S/N | Term | Description |
1 | a security key fob | Something you are |
2 | a password | Something you have |
3 | a fingerprint scan | Something you know |
- a security key fob → something you have,
- a password → something you know,
- a fingerprint scan → something you are.
Explanation:
Multi-factor authentication uses a minimum of two methods of verification and can include the
following:
• Something you have
• Something you know
• Something you are
20. Question
Which three processes are examples of logical access controls? (Choose three.) Select one or more:
- firewalls to monitor traffic
- fences to protect the perimeter of a building
- swipe cards to allow access to a restricted area
- biometrics to validate physical characteristics
- guards to monitor security screens
- intrusion detection system (IDS) to watch for suspicious network activity
Explanation:
Logical access controls includes but is not limited to the following:
• Encryption
• Smart cards
• Passwords
• Biometrics
• Access Control Lists (ACLs)
• Protocols
• Firewalls
• Intrusion Detection Systems (IDS)