Deck 3: Security Through Authentication and Encryption
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/86
Play
Full screen (f)
Deck 3: Security Through Authentication and Encryption
1
When an SSL communication session begins between two computers, the computers first exchange certificates to authenticate the receiver and sender.
False
2
Session authentication works by giving each frame or packet an identification or sequence number.
True
3
In stream cipher, a specific key size is used for encryption.
False
4
The original version of DES used a 56-bit encryption key combined with 8-bit parity.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
5
Triple DES is a standard adopted by the U.S. government to replace AES.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
6
A random generator starts with a base or seed number and generates the same sequence of random numbers time after time.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
7
Today, Kerberos is the most commonly used form of security for communications and transactions over the Web.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
8
Message Digest 4 takes the original data and adds padded spaces until the length of the data section is 456 bytes.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
9
The purpose of EFS is to protect folder and file contents on a hard disk, in case a hard disk is stolen from a server or workstation, or a portable computer is lost or stolen.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
10
Sniffer software turns the NIC on its host computer into a virtual listening ear, capturing the network traffic that goes across that NIC on a particular network segment.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
11
Secret key encryption uses a public key and a private key.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
12
When a network consists of Windows 2000 or later operating systems, Kerberos is the preferred logon authentication method.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
13
The ethereal sniffer software only functions on Linux/UNIX computers.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
14
The public key/private key method uses an encryption algorithm developed by Joan Daemen and Vincent Rijmen.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
15
A secret key is used to both encrypt and decrypt data.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
16
TLS uses private-key symmetric data encryption and the TLS Handshake Protocol for secure communications.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
17
In TCP/IP communications using IPv4 , the authentication header is placed after the traditional IP header field in a packet and before the TCP (or UDP) field.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
18
Authentication makes data unintelligible to everyone except its intended recipients.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
19
When the hashing method of encryption is used, each password has a unique digital signature.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
20
CFS can be used for remote file access through the NFS used by Netware systems.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following cipher command-line parameters decrypts the contents of the specified folder and sets the folder so that any files added to the folder are not encrypted?
A) /?
B) /e
C) /d
D) /n
A) /?
B) /e
C) /d
D) /n
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
22
What type of encryption is used for remote connections into Windows 2000 Server and Windows Server 2003?
A) DES
B) PPP
C) PPTP
D) MPPE
A) DES
B) PPP
C) PPTP
D) MPPE
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
23
What needs to be installed in order for Windows 95 and Windows 98 to use NTLM v2?
A) Service pack 1
B) Directory Service Client
C) NTLM v2 client install
D) Nothing
A) Service pack 1
B) Directory Service Client
C) NTLM v2 client install
D) Nothing
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
24
Which version of hashing algorithm takes 8-bit (one-byte) chunks and creates an encrypted message that is padded until its length can be divided by 16?
A) MD2
B) MD4
C) MD5
D) SHA-1
A) MD2
B) MD4
C) MD5
D) SHA-1
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
25
When was the RSA encryption method created?
A) 1967
B) 1977
C) 1987
D) 1997
A) 1967
B) 1977
C) 1987
D) 1997
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
26
Which of the following sniffer application can be used in Windows-based operating systems?
A) The Sniffer
B) windump
C) Sniffit
D) Both a and b
E) a, b, and c
A) The Sniffer
B) windump
C) Sniffit
D) Both a and b
E) a, b, and c
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
27
Which of the following cipher command-line parameters provides the account employing cipher with a new encryption key?
A) /n
B) /u
C) /k
D) /x
A) /n
B) /u
C) /k
D) /x
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
28
Which of the following encryption algorithms is considered to be the most secure?
A) MD5
B) DES
C) RSA
D) 3DES
A) MD5
B) DES
C) RSA
D) 3DES
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
29
Which of the following cipher command-line parameters copies encryption key and certificate data to a file that is encrypted for use by the cipher user?
A) /?
B) /k
C) /e
D) /x
A) /?
B) /k
C) /e
D) /x
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
30
_____ is an authenticating server for EAP.
A) IAS
B) IIS
C) ISA
D) RADIUS
A) IAS
B) IIS
C) ISA
D) RADIUS
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
31
What encryption method does Red Hat Linux use by default?
A) RSA
B) DES
C) DES3
D) PAM
A) RSA
B) DES
C) DES3
D) PAM
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
32
_____ is the use of a secret code or other means to disguise data that is stored on a computer or transported across a network.
A) Encryption
B) Authentication
C) Hashing
D) Ciphering
A) Encryption
B) Authentication
C) Hashing
D) Ciphering
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
33
What command can be used from the command prompt window to configure EFS?
A) hash
B) efsconfig
C) msconfig
D) cipher
A) hash
B) efsconfig
C) msconfig
D) cipher
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
34
Which of the following operating systems recognizes the original NTLM logon authentication?
A) Windows 3.11
B) Windows 95
C) Windows Server 2003
D) Both a and b
E) a, b, and c
A) Windows 3.11
B) Windows 95
C) Windows Server 2003
D) Both a and b
E) a, b, and c
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
35
What is the RSA key size used by MPPE when it is configured for strongest encryption?
A) 40 bits
B) 54 bits
C) 128 bits
D) 254 bits
A) 40 bits
B) 54 bits
C) 128 bits
D) 254 bits
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following encryption techniques is employed in UNIX/Linux systems to enable encryption in file systems, using DES, 3DES, and other encryption techniques?
A) RSA
B) PAM
C) CFS
D) AES
A) RSA
B) PAM
C) CFS
D) AES
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
37
When following the ISO _____ format, a digital certificate includes a basic set of encrypted information.
A) X10
B) X.502
C) X.509
D) X 802.3
A) X10
B) X.502
C) X.509
D) X 802.3
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
38
Which version of hashing algorithm uses a mathematical formula to reduce a message to 160 bits and then hashes a digital signature to go with the message?
A) MD2
B) MD4
C) MD5
D) SHA-1
A) MD2
B) MD4
C) MD5
D) SHA-1
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
39
_____ authentication works by giving each frame or packet an identification or sequence number. This ensures the accuracy of ongoing communications and the authenticity of the communications source.
A) Network
B) Session
C) System
D) Frame
A) Network
B) Session
C) System
D) Frame
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
40
What encryption method is often used to create a digital signature?
A) Secret key
B) Hashing
C) DES
D) CFS
A) Secret key
B) Hashing
C) DES
D) CFS
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
41

A) Enforce user logon restrictions
B) Maximum lifetime for a service ticket
C) Maximum lifetime for a user ticket
D) Maximum lifetime for user ticket renewal
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
42

A) Enforce user logon restrictions
B) Maximum lifetime for a service ticket
C) Maximum lifetime for user ticket renewal
D) Maximum tolerance for computer clock synchronization
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
43
Is MD4 incorporated into Microsoft's MS-CHAP v2 hashing algorithm?
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
44

A) EFS
B) MPPE
C) DES
D) CFS
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
45
Which authentication method is a physical device that enables the generation of a unique password each time a user logs on to a server or network?
A) SSH
B) Security token
C) Digital certificate
D) Session
A) SSH
B) Security token
C) Digital certificate
D) Session
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
46
Which authentication method is used in Internet and network communications, and employs a handshaking protocol for authentication plus RSA for encryption?
A) EAP
B) TLS
C) SSH
D) SSL
A) EAP
B) TLS
C) SSH
D) SSL
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
47
Is the maximum size of the private key in AES 256 bits in length?
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
48
_____ is a set of IP-based secure communications and encryption standards created by the IETF, and was developed to provide secure network communications.
A) SSL
B) IPSec
C) PPTP
D) LDAP
A) SSL
B) IPSec
C) PPTP
D) LDAP
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
49
Which authentication method is used on networks and in remote communications, typically employing Remote Authentication Dial-in User Servers and is compatible with many encryption methods?
A) SSL
B) Kerberos
C) EAP
D) TLS
A) SSL
B) Kerberos
C) EAP
D) TLS
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
50
Are user passwords in Red Hat Linux encrypted using 3DES and stored in the /etc/passwd file?
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
51
What does SSH use to authenticate a communications session that uses passwords?
A) Digital certificates
B) RSA
C) EAP
D) Both a and b
E) Both a and c
A) Digital certificates
B) RSA
C) EAP
D) Both a and b
E) Both a and c
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
52
What size of keys can be used with SSL authentication?
A) 40 bit only
B) 40 bit and 128 bit
C) 40 bit, 56 bit, and 128 bit
D) 40 bit and 56 bit
A) 40 bit only
B) 40 bit and 128 bit
C) 40 bit, 56 bit, and 128 bit
D) 40 bit and 56 bit
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
53
With which version(s) of IP is IPSec compatible?
A) IPv4
B) IPv5
C) IPv6
D) Both a and c
E) Both a and b
A) IPv4
B) IPv5
C) IPv6
D) Both a and c
E) Both a and b
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
54
Why is SSH particularly suited to UNIX/Linux systems?
A) It uses native code
B) It uses pipes
C) It is based on the UNIX kernel
D) None of the above
A) It uses native code
B) It uses pipes
C) It is based on the UNIX kernel
D) None of the above
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
55
At what TCP/IP layer does IPSec secure communications?
A) Transport
B) Application
C) Network
D) Physical
A) Transport
B) Application
C) Network
D) Physical
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
56
What authentication method was designed using SSL as a model and is supported by the IETF as an Internet standard for secure communications?
A) EAP
B) SSL+
C) TLS
D) IPSec
A) EAP
B) SSL+
C) TLS
D) IPSec
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
57
Which authentication method authenticates by using tickets to verify client and server communications, and employs private-key encryption?
A) Digital certificates
B) Secure Sockets Layer
C) Kerberos
D) Security Token
A) Digital certificates
B) Secure Sockets Layer
C) Kerberos
D) Security Token
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
58
Which authentication method employs a unique set of digital information or a digital signature with a communication or a file as a means to verify the source and uses public-key asymmetrical encryption?
A) SSL
B) TLS
C) Digital certificates
D) Kerberos
A) SSL
B) TLS
C) Digital certificates
D) Kerberos
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
59
Did the original version of DES use a 56-bit encryption key combined with 8-bit parity?
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
60
Was AES originally developed for the U.S. National Security Agency?
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
61
When following the ISO X.509 format, what basic set of encrypted information does a digital certificate include?
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
62
Does the Encrypting File System (EFS) employ public- and private-key asymmetrical encryption and a trapdoor function to manipulate prime numbers?
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
63
List six of the common authentication methods in use today.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
64
List the four hashing algorithms typically used.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
65
List eight different encryption techniques that are designed to help protect stored or transmitted data.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
66
When Windows 2000 Server or Windows Server 2003 is contacted by a client using IPSec configured in the Client (____________________) role, it will respond by using IPSec communication.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
67
____________________ encryption can work well on a computer for files that are only accessed by an authorized account, but it is difficult to achieve secrecy over a network using this method.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
68
____________________ is the science of creating secret messages.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
69
In session authentication, is each packet given a sequence number when it is constructed at the source computer?
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
70
The DES, AES, and MPPE encryption methods are all forms of the ____________________ encryption method, but use different block sizes, key sizes, and algorithms.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
71
The ____________________ field in the ESP is used in the same way as in the AH, to store the Integrity Check Value.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
72
The ____________________ field in the AH uses a special counter to activate anti-replay so that the receiver can determine if it has already received a packet.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
73
____________________ authentication method is an application-independent form of authentication that is modeled after SSL and uses RSA encryption.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
74
____________________ authenticates by using tickets to verify client and server communications, and employs private-key encryption.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
75
Deploying _________________________ with NAT can interfere with the security established by IPSec.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
76
Does each security token have a unique identification number built into it, so that the authentication server can verify the security token before issuing a password?
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
77
In a(n) ____________________ attack every character combination is used in an attempt to determine the password of an account.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
78
Was SSH developed by Netscape to provide authentication security for TCP/IP applications such as FTP and Telnet?
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
79
Does Microsoft's MPPE use a 40-bit RSA encryption key for its basic encryption?
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
80
List and provide the key lengths for the three different flavors of RSA used by MPPE.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck