Chapter 4 quizzes with answer

1. Question
What encryption algorithm uses the same pre-shared key to encrypt and decrypt data? Select one:

  • asymmetric
  • hash
  • one-time pad
  • symmetric

Explanation:
Symmetric encryption algorithms use the same pre-shared key to encrypt and decrypt data.
The correct answer is: symmetric

2. Question
What are three examples of administrative access controls? (Choose three.) Select one or more:

  • intrusion detection system (IDS)
  • policies and procedures
  • hiring practices
  • encryption
  • background checks
  • guard dogs

Explanation:
Administrative access controls are defined by organizations to implement and enforce all aspects of
controlling unauthorized access and include the following:
• Policies
• Procedures
• Hiring practices
• Background checks
• Data classification
• Security training
• Reviews

3. Question
What type of cipher encrypts plaintext one byte or one bit at a time? Select one:

  • elliptical
  • stream
  • enigma
  • hash
  • block

Explanation:
Stream ciphers encrypt plaintext one byte or one bit at a time, and can be much faster than block
ciphers.

4. Question
What is the term used to describe the science of making and breaking secret codes? Select one:

  • impersonation
  • cryptology
  • factorization
  • jamming
  • spoofing

Explanation:
Cryptology is the science of making and breaking codes to make sure that cyber criminals cannot
easily compromise protected information.

5. Question
What is the name of the method in which letters are rearranged to create the ciphertext? Select one:

  • enigma
  • substitution
  • one-time pad
  • transposition

Explanation:
Ciphertext can be created by using the following:
• Transposition “ letters are rearranged
• Substitution “ letters are replaced• One-time pad “ plaintext combined with a secret key creates a new character, which then combines with the plaintext to produce ciphertext

6. Question
What cryptographic algorithm is used by the NSA and includes the use of elliptical curves for digital signature generation and key exchange? Select one:

  • RSA
  • ECC
  • IDEA
  • El-Gamal
  • AES

Explanation:
Elliptic curve cryptography (ECC) uses elliptic curves as part of the algorithm for digital signature
generation and key exchange.

7. Question
What term is used to describe the technology that replaces sensitive information with a nonsensitive version? Select one:

  • masking
  • hiding
  • retracting
  • whiteout
  • blanking

Explanation:
Data masking replaces sensitive information with non sensitive information. After replacement, the
non sensitive version looks and acts like the original.

8. Question
Which two terms are used to describe cipher keys? (Choose two.) Select one or more:

  • key randomness
  • keylogging
  • key space
  • key length

Explanation:
The two terms used to describe keys are the following:
• Key length – Also called the key , this is the measure in bits.
• Key space – This is the number of possibilities that a specific key length can
generate. As key length increase, the key space increases exponentially.

9. Question
What encryption algorithm uses one key to encrypt data and a different key to decrypt data? Select one:

  • one-time pad
  • transposition
  • asymmetric
  • symmetric

Explanation:
Asymmetric encryption uses one key to encrypt data and a different key to decrypt data.

10. Question
A warning banner that lists the negative outcomes of breaking company policy is displayed each
time a computer user logs in to the machine. What type of access control is implemented? Select one:

  • masking
  • deterrent
  • preventive
  • detective

Explanation:
Deterrents are implemented to discourage or mitigate an action or the behavior of a malicious person.

11. Question
Which term describes the technology that protects software from unauthorized access or modification? Select one:

  • trademark
  • copyright
  • access control
  • watermarking

Explanation:
Software watermarking inserts a secret message into the program as proof of ownership and
protects software from unauthorized access or modification.

12. Question
Which three devices represent examples of physical access controls? (Choose three.) Select one or more:

  • routers
  • locks
  • servers
  • firewalls
  • swipe cards
  • video cameras

Explanation:
Physical access controls include but are not limited to the following:
• Guards
• Fences
• Motion detectors
• Laptop locks
• Locked doors
• Swipe cards
• Guard dogs• Video cameras
• Mantraps
• Alarms

13. Question
Match the description with the correct term.

S/NTermDescription
1obfuscationhiding data within an audio file
2social steganographymaking a message confusing so it is harder to understand
3steganalysiscreating a message that says one thing but means something else to a specific audience
4steganographydiscovering that hidden information exists within a graphic file
  • obfuscation → making a message confusing so it is harder to understand,
  • social steganography → creating a message that says one thing but means something else to a specific audience,
  • steganalysis → discovering that hidden information exists within a graphic file,
  • steganography → hiding data within an audio file.

14. Question
Which asymmetric algorithm provides an electronic key exchange method to share the secret key? Select one:

  • DES
  • RSA
  • WEP
  • hashing
  • Diffie-Hellman

Explanation:
Diffie-Hellman provides an electronic exchange method to share a secret key and is used by multiple
secure protocols.

15. Question
What term is used to describe concealing data in another file such as a graphic, audio, or other text file? Select one:

  • steganography
  • hiding
  • masking
  • obfuscation

Explanation:
Steganography conceals data in a file such as a graphic, audio, or other text file and is used to
prevent extra attention to the encrypted data because the data is not easily viewed.

16. Question
Which three protocols use asymmetric key algorithms? (Choose three.) Select one or more:

  • Secure File Transfer Protocol (SFTP)
  • Secure Sockets Layer (SSL)
  • Secure Shell (SSH)
  • Telnet
  • Advanced Encryption Standard (AES)
  • Pretty Good Privacy (PGP)

Explanation:
Four protocols use asymmetric key algorithms:
• Internet Key Exchange (IKE)
• Secure Socket Layer (SSL)
• Secure Shell (SSH)
• Pretty Good Privacy (PGP)

17. Question
Which 128-bit block cipher encryption algorithm does the US government use to protect classified information? Select one:

  • AES
  • Vignere
  • 3DES
  • Skipjack
  • Caesar

Explanation:
The Advanced Encryption Standard (AES) is used to protect classified information by the U.S.
government and is a strong algorithm that uses longer key lengths.

18. Question
Which type of cipher is able to encrypt a fixed-length block of plaintext into a 128-bit block of ciphertext at any one time? Select one:

  • stream
  • hash
  • transform
  • symmetric
  • block

Explanation:
Block ciphers transform a fixed-length block of plaintext into a block of ciphertext. To decrypt the
ciphertext, the same secret key to encrypt is used in reverse.

19. Question
Match the type of authentication term with the description.

S/NTermDescription
1a security key fobSomething you are
2a passwordSomething you have
3a fingerprint scanSomething you know
  • a security key fob → something you have,
  • a password → something you know,
  • a fingerprint scan → something you are.

Explanation:
Multi-factor authentication uses a minimum of two methods of verification and can include the
following:
• Something you have
• Something you know
• Something you are

20. Question
Which three processes are examples of logical access controls? (Choose three.) Select one or more:

  • firewalls to monitor traffic
  • fences to protect the perimeter of a building
  • swipe cards to allow access to a restricted area
  • biometrics to validate physical characteristics
  • guards to monitor security screens
  • intrusion detection system (IDS) to watch for suspicious network activity

Explanation:
Logical access controls includes but is not limited to the following:
• Encryption
• Smart cards
• Passwords
• Biometrics
• Access Control Lists (ACLs)
• Protocols
• Firewalls
• Intrusion Detection Systems (IDS)