Computer Science  >  EXAM  >  CSIA Cybersecurity Exam 2 With Complete Solution (All)

CSIA Cybersecurity Exam 2 With Complete Solution

Document Content and Description Below

Hiding an object, such as a diary, to prevent others from finding it is an example of: - ANSWER Security through Obscurity An algorithm is a type of: - ANSWER Procedure An encryption algorithm t ... hat uses the same key for both encryption and decryption is: - ANSWER Symmetric The type of cipher that rearranges the test of a message is called: - ANSWER Transposition To use symmetric cryptography, the sender and receiver must share: - ANSWER A secret key The Enigma was: - ANSWER A rotor machine Gilbert Vernam's bit combination operation for encrypting digital teletype transfer is now referred to as: - ANSWER Exclusive or (XOR) TRUE or FALSE The Vigenère cipher uses a series of shifts to encrypt every letter in a message. - ANSWER True TRUE or FALSE The Advanced Encryption Standard (AES) is stronger than the Data Encryption Standard (DES). - ANSWER True TRUE or FALSE Microsoft Windows Professional editions include an encryption feature. - ANSWER True File encryption on the computer's hard drive involves what risk? - ANSWER -Access to low-level data written to the hard drive -Access by a Trojan Horse -Access by a separately booted OS TRUE or FALSE The effort nicknamed DESCHALL used a collection of tens of thousands of computers to crack a DES message by trial and error in 7 months. - ANSWER FALSE it was in 5 months TRUE or FALSE Microsoft's built in encryption protects the user's file against a Trojan Horse. - ANSWER False TRUE or FALSE For encryption to work there must always be a matching decryption algorithm. - ANSWER True The process of decrypting a code is: - ANSWER Cryptanalysis TRUE or FALSE An encryption application program, from a user's point of view, protects a file with a memorized password. - ANSWER True A cryptonet: - ANSWER is two or more people who share an encryption key the following are common ways to handle new encryption keys: - ANSWER -Memorize them -Write them down -Save them to a storage device and download as needed NOT -transfer them via instant messenger An Advanced Encryption Standard (AES) key may not be _____ bits in length A. 16 B. 128 C. 192 D. 256 - ANSWER 16 bits When encrypting a file, a fully punctuated passphrase should have a minimum of ____ characters. - ANSWER 20 Encrypting an encryption key using a passphrase is called: - ANSWER Key wrapping Using the Diffie-Hellman algorithm: - ANSWER both participants in the exchange must have a public/private key pair Digital signatures are often used to provide: - ANSWER Nonrepudiation- Nonrepudiation is the assurance that someone cannot deny something. Typically, nonrepudiation refers to the ability to ensure that a party to a contract or a communication cannot deny the authenticity of their signature on a document or the sending of a message that they originated. To repudiate means to deny. A public-key certificate generally does not contain: - ANSWER a private key To avoid problems with reused encryption keys, you can: - ANSWER combine the key with a nonce TRUE or FALSE After changing an encryption key, all backup copies of the protected file are also protected by the new key. - ANSWER False TRUE or FALSE The shorter the encryption key, the more difficult it is to crack - ANSWER False TRUE or FALSE In cryptography, an internal key exists inside the encryption process and disappears when the process is not running. - ANSWER True TRUE or FALSE When you visit a website with an "https" prefix in the address, the site is secure. - ANSWER True TRUE or FALSE An attacker can modify a file without changing the file's hash value. - ANSWER False TRUE or FALSE A digital signature uses symmetric keys to sign or verify digital data. - ANSWER False TRUE or FALSE A certificate authority is a trusted third party that issues certificates on behalf of some organization - ANSWER True The U.S. government standards published by NIST recommended data with a particular secret key be used for no more than _____ years before changing it. 1,2,3, or 4 years? - ANSWER 2 years Encryption can help protect volumes in the following situations: - ANSWER -When a storage device is lost or stolen -When an eavesdropper looks at the volume without the operating system in place -When discarding a hard drive or other device without wiping it NOT -To prevent physical damage to a hard drive Access Control protects data on a computer against: - ANSWER Hostile users File encryption protects data on a computer against: - ANSWER -Hostile users -Trojans -External files -Lost control -Theft -Recycling Volume encryption protects data on a computer against: - ANSWER -External Files -Lost Control -Theft -Recycling When encrypting data with a block cipher, each repetition is called: - ANSWER a round The following are best practices or proper recommendations for choosing an encryption algorithm: - ANSWER -Use evaluated cryptographic products if using a certified algorithm -Use AES if at all possible -Do not use "private label" algorithms that have not been published and reviewed by the cryptographic community -Check recent news and research results in the crypto community A shortcoming of block ciphers is: - ANSWER encrypting data that has block-sized patterns A self-encrypting drive locks data on the hard disk by: - ANSWER erasing the encryption key when the drive is unplugged or reset The following are properties of persistent key storage: - ANSWER -It uses nonvolatile storage -It can wrap the key using a passphrase -It can store the key on a removable storage device NOT -It uses volatile storage Volume encryption risks include: - ANSWER -Untrustworthy encryption -Encryption integrity -Leaking the plaintext -Data integrity TRUE or FALSE The underlying code of the Rijndael algorithm was leaked to the public in 1994, allowing for successful attacks against data encrypted with Rijndael. - ANSWER False This is the RC4 story with Ron Rivest TRUE or FALSE Changing a single bit of a block cipher's input affects the entire output block. - ANSWER TRUE TRUE or FALSE Cipher block chaining (CBC) is a widely used cipher mode that requires plaintext to be a multiple of the cipher's block size. - ANSWER True TRUE or FALSE A tweakable cipher includes a third input, a nonce-like value that modifies the encryption without the cost of changing the encryption key - ANSWER True Apple Mac OS-X and all editions of Microsoft Windows provide full-disk encryption. - ANSWER False not all editions of windows includes the full-disk encryption There are four strategies for cleaning a hard drive of personal data. Which on will actually make the data un-recoverable? - ANSWER -Run a "disk wipe" program (These are the other 3 strategies) -Delete personal files and "empty the trash" -Reformat the hard drive -Reinstall the operating system TRUE or FALSE A block cipher encrypts data in fixed-sized blocks - ANSWER True AES supports exactly which three key sizes? - ANSWER 128 bits 192 bits 256 bits In the 1970s, the ______ was the only organization in the U.S. government with cryptographic expertise. - ANSWER NSA TRUE or FALSE Ron Rivest developed the RC4 algorithm in the late 1990s. - ANSWER It was the late 1980s [Show More]

Last updated: 3 years ago

Preview 1 out of 10 pages

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)
Preview image of CSIA Cybersecurity Exam 2 With Complete Solution document

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Reviews( 0 )

$8.00

Buy Now

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Instant download

Can't find what you want? Try our AI powered Search

57
0

Document information


Connected school, study & course


About the document


Uploaded On

Sep 21, 2022

Number of pages

10

Written in

All

Seller


Profile illustration for Nancylect
Nancylect

Member since 3 years

102 Documents Sold

Reviews Received
9
2
1
0
4
Additional information

This document has been written for:

Uploaded

Sep 21, 2022

Downloads

 0

Views

 57

Document Keyword Tags

Recommended For You

Get more on EXAM »

$8.00
What is Scholarfriends

Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.

We are here to help

We're available through e-mail, Twitter, and live chat.
 FAQ
 Questions? Leave a message!


Copyright © Scholarfriends · High quality services·