An organisation has introduced a system requiring the use of one-time passwords. Which of the following principles is being applied?
Confidentiality
Availability
Integrity
Validation
An organisation is undertaking data validation prior to the information being used in a financial package. Which of the following principles is being applied?
Obfuscation
Integrity
Confidentiality
Hashing
An organisation is using a RAID 10 hot swappable array on a file server. Which of the following principles is being applied?
Confidentiality
Substitution
Integrity
Availability
Hashing uses a one-way mathematical function to create a sum of the inputted plaintext. Which of the following is a benefit of this process?
It proves ownership of a public key
It verifies the authenticity of the message
It is used to identify if changes have been made to data
It is used to identify if changes have been made to data
An organisation is using Encrypted File System (EFS). Which of the following is a risk associated with using EFS?
The public key is shared with all end users to allow decryption of the information
Digital certificates are used to distribute data requiring the allocation of additional resources
Digital certificates are used to distribute data requiring the allocation of additional resources
Digital signatures are used to verify the authenticity of the message placing additional strain on systems
Which of the following pieces of legislation defines how HMRC handles a disclosure request?
Data Protection Act
Electronic Communications Act
Investigatory Powers Act
Freedom of Information Act
Which of the following legislation is designed to regulate the powers of public bodies to carry out surveillance of individuals suspected of undertaking fraudulent transactions?
DPA
Regulation of Investigatory Powers Act
Wassenaar Arrangement
ITAR
Which of the following Acts lists the functions, duties and powers of the Information Commissioners Office?
Digital Economy
National Disclosure Improvement
Electronic Communications
Data Protection
Which of the following terms defines a person who is responsible for entering data into a database?
Data Controller
Data Processor
Data Protection Officer
Information Commissioner
Which of the following ciphers uses a simple substitution code?
Hagelin
Scytale
Enigma
Caesar
Which of the following is used when hashing plaintext?
MD5
Lorenz
RC4
Rijndeal
Which of the following protocols is a symmetrical block cipher that addresses the issues with DES?
WPA
AES
RSA
TSL
Which of the following principles states that a cryptographic system should be designed to be secure, even if all its details, except for the key, are publicly known?
Hashing
Kerckhoff’s
Substitution
Dijkstra’s
Which of the following technologies involves the recipient sending a query over the network to the originator, who will then send the key?
Digital Certificates
Cryptoanalysis
Escrow
Digital Signature
Which of the following actions would the Certificate Authorities carry out if a PKI private key is compromised?
Revoke the certificate placing it on a black lis
Issue a domain validated certificate
Issue a root certificate revoking the previous one
Issue a new client certificate
Which of the following functions generates a key by using an algorithm combined with a master key?
Block
Substitution
Derivation
Hashing
Which type of attack involves targeting high profile employees in order to gain access to sensitive information regarding a company?
Man in the middle
Whaling
Rainbow table
Vishing
Which type of attack involves submitting many passwords or passphrases until the correct one is found?
Brute force
Keylogger
Frequency analysis
Man in the middle
An organisation has failed to communicate that they are changing the key storage policies to ensure all master keys are stored in a central location. Which of the following is a risk associated with this?
Auditing the use of stored keys is more difficult which may lead to the risk of the overuse of a particular key
Keys are stored then destroyed once they have been used which may result in the inability to decrypt older files
Keys are split into multiple components when storing them which may result in keys being corrupted
Keys are stored on an inappropriate device which may lead to them being compromised
An employee has allowed a visitor to use his device to send an email, while the employee was away from their desk the visitor has copied their encryption keys. Which of the following could a hacker undertake using the keys that have been stolen?
An employee has allowed a visitor to use his device to send an email, while the employee was away from their desk the visitor has copied their encryption keys. Which of the following could a hacker undertake using the keys that have been stolen?
A brute force attack that compromises security
A rainbow table attack that cracks the hashing value
A vishing attack that gains access to sensitive data