• If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below.
Xin chào ! Nếu đây là lần đầu tiên bạn đến với diễn đàn, xin vui lòng danh ra một phút bấm vào đây để đăng kí và tham gia thảo luận cùng VnPro.

Announcement

Collapse
No announcement yet.

Cryptographic Systems

Collapse
This is a sticky topic.
X
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Cryptographic Systems

    Here you will find answers to Cryptographic Systems Questions



    Question 1
    Please choose the correct matching relationships between the cryptography algorithms and the type of algorithm.
    1 3DES 2 RSA 3 Diffie-Hellman 4 AES 5 IDEA 6 Elliptical Curve A. Symmetric – 1, 2 and 3
    Asymmetric – 4, 5 and 6
    B. Symmetric – 1, 4 and 5
    Asymmetric – 2, 3 and 6
    C. Symmetric – 2, 4 and 5
    Asymmetric – 1, 3 and 6
    D. Symmetric – 2, 5 and 6
    Asymmetric – 1, 3 and 4


    Answer: B
    Question 2
    What is the objective of Diffie-Hellman?
    A. used for asymmetric public key encryption
    B. used between the initiator and the responder to establish a basic security policy
    C. used to verify the identity of the peer
    D. used to establish a symmetric shared key via a public key exchange process


    Answer: D
    Question 3
    Which description about asymmetric encryption algorithms is correct?
    A. They use different keys for decryption but the same key for encryption of data
    B. They use the same key for encryption and decryption of data
    C. They use different keys for encryption and decryption of data
    D. They use the same key for decryption but different keys for encryption of data


    Answer: C
    Question 4
    Regarding constructing a good encryption algorithm, what does creating an avalanche effect indicate?
    A. Changing only a few bits of a plain-text message causes the ciphertext to be completely different
    B. Changing only a few bits of a ciphertext message causes the plain text to be completely different
    C. Altering the key length causes the plain text to be completely different
    D. Altering the key length causes the ciphertext to be completely different


    Answer: A
    Question 5
    Stream ciphers run on which of the following?
    A. Individual blocks, one at a time, with the transformations varying during the encryption
    B. Individual digits, one at a time, with the transformations varying during the encryption
    C. Fixed-length groups of digits called blocks
    D. Fixed-length groups of bits called blocks


    Answer: B
    Question 6
    Which description is true about ECB mode?
    A. ECB mode uses the same 64-bit key to serially encrypt each 56-bit plain-text block.
    B. In ECB mode, each 56-bit plain-text block is exclusive ORed (XORed) bitwise with the previous ciphertext block.
    C. ECB mode uses the same 56-bit key to serially encrypt each 64-bit plain-text block.
    D. In ECB mode, each 64-bit plain-text block is exclusive ORed (XORed) bitwise with the previous ciphertext block.


    Answer: C
    Explanation
    ECB mode serially encrypts each 64-bit plaintext block using the same 56-bit key. If two identical plaintext blocks are encrypted using the same key, their ciphertext blocks are the same. Therefore, an attacker could identify similar or identical traffic flowing through a communications channel, and use this information. The attacker could then build a catalogue of messages, which have a certain meaning, and replay them later, without knowing their real meaning. For example, an attacker might capture a login sequence of someone with administrative privilege whose traffic is protected by DES-ECB and then replay it. That risk is undesirable so CBC mode was invented to mitigate this risk.
    (Reference: Implementing Cisco IOS Network Security Self Study)
    Question 7
    Which example is of a function intended for cryptographic hashing?
    A. SHA-135
    B. MD65
    C. XR12
    D. MD5


    Answer: D
    Question 8
    What is the MD5 algorithm used for?
    A. takes a variable-length message and produces a 168-bit message digest
    B. takes a fixed-length message and produces a 128-bit message digest
    C. takes a variable-length message and produces a 128-bit message digest
    D. takes a message less than 2A64 bits as input and produces a 160-bit message digest


    Answer: C
    Question 9
    Which algorithm was the first to be found suitable for both digital signing and encryption?
    A. SHA-1
    B. MD5
    C. HMAC
    D. RSA


    Answer: D
    Question 10
    Before a Diffie-Hellman exchange may begin, the two parties involved must agree on what?
    A. Two nonsecret keys
    B. Two secret numbers
    C. Two secret keys
    D. Two nonsecret numbers


    Answer: D
    Question 11
    Which item is the correct matching relationships associated with IKE Phase?
    1 Perform a Diffie-Hellman exchange 2 Establish Ipsec SAs 3 Negotiate Ipsec security policies 4 Negotiate IKE policy sets and authenticate peers 5 Perform an optional Diffie-Hellman exchange A.IKE Phase 1 – 1 and 2
    IKE Phase 2 – 3, 4 and 5
    B. IKE Phase 1 – 1 and 4
    IKE Phase 2 – 2, 3 and 5
    C. IKE Phase 1 – 2 and 3
    IKE Phase 2 – 1, 4 and 5
    D. IKE Phase 1 – 2 and 4
    IKE Phase 2 – 1, 3 and 5


    Answer: B
    Question 12
    Which three are distinctions between asymmetric and symmetric algorithms? (Choose all that apply)
    A. Asymmetric algorithms are based on more complex mathematical computations.
    B. Only symmetric algorithms have a key exchange technology built in.
    C. Only asymmetric algorithms have a key exchange technology built in.
    D. Asymmetric algorithms are used quite often as key exchange protocols for symmetric algorithms.


    Answer: A C D
    Question 13
    For the following statements, which one is the strongest symmetrical encryption algorithm?
    A. 3DES
    B. DES
    C. AES
    D. Diffie-Hellman


    Answer: C
    Question 14
    Which Public Key Cryptographic Standards (PKCS) defines the syntax for encrypted messages and messages with digital signatures?
    A. PKCS #12
    B. PKCS #10
    C. PKCS #8
    D. PKCS #7


    Answer: D
    Phạm Minh Tuấn

    Email : phamminhtuan@vnpro.org
    Yahoo : phamminhtuan_vnpro
    -----------------------------------------------------------------------------------------------
Trung Tâm Tin Học VnPro
149/1D Ung Văn Khiêm P25 Q.Bình thạnh TPHCM
Tel : (08) 35124257 (5 lines)
Fax: (08) 35124314

Home page: http://www.vnpro.vn
Support Forum: http://www.vnpro.org
- Chuyên đào tạo quản trị mạng và hạ tầng Internet
- Phát hành sách chuyên môn
- Tư vấn và tuyển dụng nhân sự IT
- Tư vấn thiết kế và hỗ trợ kỹ thuật hệ thống mạng

Network channel: http://www.dancisco.com
Blog: http://www.vnpro.org/blog
Working...
X