Which of the following encryption algorithms is a stream cipher?
RC5.
AES
PGP.
RC4.
Which of the following is an asymmetric cryptographic cipher?
3DES
AES
RC4
RSA
When visiting an e-commerce site, which of the following cryptographic technologies is NORMALLY used?
BitLocker.
SSL/TLS
WPA2
DRM
Which technology is TYPICALLY used to encrypt communications over a public wireless network?
Telnet
VPN
TETRA
WEP
Smart cards are TYPICALLY used as a form of what?
Cryptocurrency
Copy protection
Two-factor authentication
Document encryption
What is a brute force attack?
Using zombies to send large amounts of network traffic
Trying all possible password combinations
Encrypting users’ files and asking for a payment in return
Sniffing unencrypted packets with Wireshark.
Which of the following is an example of a replay attack?
Capturing a banking transaction and re-sending it at a later date
Logging into a website multiple times with many different passwords
Poisoning an ARP cache to impersonate a server
Monitoring a card reader for voltage fluctuations when a door is opened
What is an attack based on information gained from the physical implementation of a cryptosystem called?
Sniffer attack
Brute-force-attack
Cryptanalytic attack
Side-channel attack
Which of the following encryption algorithms is obsolete?
Twofish
MD5
PGP
DES
Which of the following hashing algorithms is no longer recommended?
SHA2
AES128
SHA1
AES256
Which stage of key management is TYPICALLY associated with an OTP device that has expired and is no longer required?
Revocation
Destruction
Regeneration
Redeployment
In the generation stage of the key lifecycle, there is a requirement that a third party may need access to the key. Which of the following COULD be implemented?
Key escrow
Shared credentials
Intermediate CA
Pre-shared key
Which of the following is a limitation of using symmetric encryption
Symmetric keys are very resource intensive
Encryption keys must be communicated to both parties securely
Symmetric keys are not trusted by all browsers
A key revocation list must be implemented and tested
When managing keys, which of the following is TYPICALLY a limitation of using asymmetric encryption?
The availability of a certificate authority
Sharing the private keys securely
A revocation process is not possible
Not supported for web browsing
Entropy in a computer system may be used for which of the following purposes?
To detect intrusion attempts by their signature
To verify passwords at login
To create session keys
To scan attachments for threats
There is a business requirement to enable full disk encryption on all company PCs. Which of the following technologies COULD be used?
Fingerprint scanner
Password manager
Two-factor authentication
BitLocker
A technologist sends confidential information over WhatsApp. Which of the following PRIMARILY prevents a third party from reading the message?
Official App Store / Google Play app
Secure Hash Algorithm
A secure wireless network
End-to-end encryption
Which of the following is a KEY consideration when importing cryptography?
Must use the latest algorithms
Import licenses
Contractual agreements
Written approval from the vendor
Which regulation requires cyber responders and security researchers to obtain an export license prior to exchanging essential information to fix a newly identified security vulnerability?