Cryptography #cryptographyquestions
1. An employee tries to mask his identity by programmatically changing the From field to "a-nony-mouse" in an email. He uses periodic intervals to send the email to the entire company promoting a product he is selling online. An investigation reveals who sent the message. What capability of cryptography was used to confirm the sender's identity? 2. A company is exploring a variety of symmetric key algorithms to use in an app. Which of the following statements best describes a possible concern? 3. Barrabi mined Bitcoin years ago that is now worth millions of dollars. He encrypted the password but can't remember the key he used to encrypt it. Upon employing the services of Barnum, a skilled security professional, he was eventually able to determine the key. Which of the following best explains what Barnum did or used to determine the key 4. An attacker is scanning wireless networks and discovers that one of them is set up to support the two most recent protocols. What type of attack is the malicious actor most likely to launch to try to breach the security settings of the wireless device? 5. Pasua encrypts a message using a public key and the recipient decrypts the message using the corresponding private key. What conclusions can you draw based on these actions? 6. A fifth-grade teacher shows the class a message encrypted using ROT13. After explaining how it works, the teacher challenges them to decrypt the message, which they easily accomplish. The teacher then repeats the process with the XOR cipher. Which of the following statements is true? Select two. 7. Alpha and Beta are having a conversation in English. Gamma, who is a gifted conversationalist and tends to monopolize conversations, approaches Alpha and Beta. As soon as Alpha and Beta see Gamma, they start speaking in Spanish, but Gamma does not understand. What did Alpha and Beta just do? 8. Bodhi is leading a team responsible for writing the specifications of a new hashing algorithm. What factor does the team need to keep in mind to ensure it is secure? Select three. 9. Adelli sends an image file containing a secret message to her sister as an attachment. Adelli gives her sister instructions over the phone on how to read the message. The sister follows the instructions and reads the message. Which of the following techniques did Adelli use? 10. Which of the following statements best describes the benefits of cryptography? Select 11. Which key combination would the recipient of a message use to confirm the integrity of the message as well as the authenticity of the sender? 12. How does Blockchain use cryptography to ensure the integrity of data? 13. Which of the following statements correctly describes the differences or similarities between a stream cipher and a block cipher? 14. You need to explain to the CEO of a company the differences between symmetric and asymmetric cryptography algorithms. Which one of the following statements are you most likely to convey? 15. Salvadori wants to send a message halfway around the world via email. He would like to convey the hash corresponding to the message over the phone to the recipient. Which of the following hash algorithms should Salvadori use? Select three. 16. Rico sends a message to Lola. However, based on how the message was sent, Lola cannot verify it was sent from Rico, but she can verify it has not been altered. What could Rico have done that would have enabled Lola to verify the sender? Select two. 17. Which of the following statements best describes a challenge, if any, associated with securing low-powered devices with very fast response times? 18. After a recent breach in your industry, you are asked to ensure the databases your company uses are encrypted. They also request performance degradation be kept to a minimum. Which database encryption method are you most likely to implement? 19. A group of scientists are trying to vigorously protect a major discovery that will potentially lead to a series of breakthrough products. They all sign a special nondisclosure agreement and commit to not revealing the information to others outside of the department. What approach have the scientists agreed to employ? 20. Which of the following statements properly expresses the characteristics of AES and Blowfish? Select three. 21. Weymouth works at a computer repair shop. A customer brings a hard drive claiming their computer crashed and they would like to restore the information on the drive. Weymouth installs the drive in a computer case as a secondary drive but is not able to access the data. Which of the following is a probable cause? Select two. 22. Which of the following statements is true regarding hashing? 23. Which of the following statements best describes the critical factor that allows cryptographic algorithms to be effective? 24. Which of the following represents a true statement regarding software and hardware encryption? Select three
Download
0 formatsNo download links available.