Cybersecurity Essentials v1.1 Chapter 4 Quiz Answers
1. What is the name of the method in which letters are rearranged to create the ciphertext?
enigma
substitution
transposition*
one-time pad
2. Which 128-bit block cipher encryption algorithm does the US government use to protect classified information?
Vignere
AES*
Caesar
3DES
Skipjack
3. Which term describes the technology that protects software from unauthorized access or modification?
copyright
access control
trademark
watermarking*
4. Which three devices represent examples of physical access controls? (Choose three.)
swipe cards*
firewalls
locks*
routers
servers
video cameras*
5. What term is used to describe the technology that replaces sensitive information with a nonsensitive version?
retracting
hiding
blanking
whiteout
masking*
6. Which type of cipher is able to encrypt a fixed-length block of plaintext into a 128-bit block of ciphertext at any one time?
transform
hash
symmetric
stream
block*
7. What encryption algorithm uses the same pre-shared key to encrypt and decrypt data?
hash
asymmetric
one-time pad
symmetric*
8. What type of cipher encrypts plaintext one byte or one bit at a time?
block
hash
enigma
stream*
elliptical
9. What cryptographic algorithm is used by the NSA and includes the use of elliptical curves for digital signature generation and key exchange?
ECC*
RSA
AES
El-Gamal
IDEA
10. What is the term used to describe the science of making and breaking secret codes?
impersonation
spoofing
factorization
cryptology*
jamming
11. Which three processes are examples of logical access controls? (Choose three.)
guards to monitor security screens
firewalls to monitor traffic*
swipe cards to allow access to a restricted area
fences to protect the perimeter of a building
intrusion detection system (IDS) to watch for suspicious network activity*
biometrics to validate physical characteristics*
12. What term is used to describe concealing data in another file such as a graphic, audio, or other text file?
hiding
steganography*
obfuscation
masking
13. What are three examples of administrative access controls? (Choose three.)
hiring practices*
intrusion detection system (IDS)
policies and procedures*
background checks*
guard dogs
encryption
14. Which three protocols use asymmetric key algorithms? (Choose three.)
Telnet
Secure Shell (SSH)*
Advanced Encryption Standard (AES)
Pretty Good Privacy (PGP)*
Secure File Transfer Protocol (SFTP)
Secure Sockets Layer (SSL)*
15. A warning banner that lists the negative outcomes of breaking company policy is displayed each time a computer user logs in to the machine. What type of access control is implemented?
detective
preventive
masking
deterrent*
16. Which two terms are used to describe cipher keys? (Choose two.)
key space*
key randomness
keylogging
key length*
17. Match the type of multifactor authentication with the description.
a security key fob ————> something you have
a fingerprint scan ————> something you are
a password ————> something you know
18. Match the description with the correct term. (Not all targets are used.)
steganography —————> hiding data within an audio file
steganalysis ——————> discovering that hidden information exists within a graphic file
social steganography ——–> creating a message that says one thing but means something else to a specific audience
obfuscation ——————> making a message confusing so it is harder to understand
Other Incorrect Match Options:
replacing sensitive information in a file with nonsensitive information
19. Which asymmetric algorithm provides an electronic key exchange method to share the secret key?
WEP
DES
RSA
Diffie-Hellman*
hashing
20. What encryption algorithm uses one key to encrypt data and a different key to decrypt data?
Asymmetric*
one-time pad
transposition
symmetric