Cryptography & PKI | Test-1
This section rigorously assesses the implementation of cryptographic controls and Public Key Infrastructure (PKI) within the system. It includes testing the use of secure and modern encryption algorithms, ensuring that cryptographic keys are generated, stored, and rotated securely, and evaluating key management procedures for compliance with industry standards. The section also examines the integrity of digital signatures, the correct usage of certificates, certificate authorities (CAs), and the strength of TLS/SSL configurations. It ensures that encryption is applied effectively for data in transit and at rest, safeguarding sensitive information and preventing unauthorized access or data breaches. Additionally, tests cover protocol security to prevent common vulnerabilities like weak ciphers, improper certificate validation, and man-in-the-middle (MITM) attacks.
1 / 22
1. What is cryptography?
Cryptography is the practice and study of techniques for secure communication and data protection in the presence of adversaries. It involves the use of mathematical algorithms to encrypt and decrypt information, ensuring confidentiality, integrity, and authentication in various digital processes and communications.
2 / 22
2. Which of the following describes how cryptography is used?
Cryptography is applied at all the mentioned areas in answers
3 / 22
3. The art of breaking crypto systems and gaining access to encrypted data with no key is known as ________
The correct answer is Cryptanalysis
Cryptanalysis is the practice of analyzing and breaking cryptographic systems with the goal of gaining access to encrypted information without knowing the encryption key. It involves various techniques to exploit weaknesses in encryption algorithms or protocols.
Explanation of Incorrect Options:
4 / 22
4. A method\mechanism that encrypts or disguises text by means of substitution , transposition etc. is known as:
A Cipher is a method or algorithm used in cryptography to encrypt or decrypt data. It involves the transformation of plaintext into Ciphertext (encryption) and vice versa (decryption) using a specific set of rules or mathematical operations.
5 / 22
5. Which of the following is NOT a classic cipher method/technique?
All are different classic cipher methods. Hashing is a modern process in cryptography where a fixed-size string of characters (hash value) is generated from input data of any size.
6 / 22
6. Which of the following is NOT a modern cipher method/technique?
Substitution is a classic cipher. It is a type of encryption where each letter in the plaintext is replaced with another letter according to a fixed rule or key. It involves substituting one set of symbols (usually letters) with another, providing a basic form of encryption.
7 / 22
7. A Simple ______ cipher uses the same cipher text symbol (Caesar) to replace every letter in the plaintext.
8 / 22
8. A ________ cipher encodes a message by re-ordering the plaintext according to some well-defined system/key.
A transposition cipher is a type of encryption where the positions of characters in the plaintext are rearranged based on a specific system or key. Instead of substituting characters, transposition ciphers involve changing the order of the characters to create the ciphertext.
9 / 22
9. A ________ cipher converts a fixed-length block of plaintext data into an equivalent-length block of cipher text (encrypted text).
A block cipher is a type of symmetric key algorithm used in cryptography that processes fixed-size blocks of data at a time. It encrypts or decrypts data in fixed-size blocks, typically 64 or 128 bits, using a secret key. The same key is used for both encryption and decryption in block ciphers.
10 / 22
10. A _______ cipher encrypts plaintext on per-bit/per byte basis and is faster compared to block ciphers
A stream cipher is a type of symmetric key encryption algorithm used in cryptography. It encrypts data one bit or byte at a time, continuously streaming through the data. Stream ciphers use a key to generate a pseudorandom stream of bits, which is combined with the plaintext to produce the ciphertext. Unlike block ciphers, stream ciphers operate on individual bits or bytes rather than fixed-size blocks of data.
11 / 22
11. ________is a type of encryption technique where a random key that is as long as the message is generated and used only once. Each bit of the key is exclusive to a corresponding bit in the message, providing a theoretically unbreakable form of encryption when used correctly.
One-Time Padย isย perfect encryption scheme that is considered unbreakable if Implemented properly. i.e:
12 / 22
12. Itโs a method of hiding data in another media type so the very existence of the data is concealed:
Steganography is the practice of concealing one piece of information within another to hide the fact that communication is taking place. It involves embedding secret data within non-secret data, such as hiding messages within images, audio files, or other seemingly innocuous carriers. The goal is to make the presence of the hidden information undetectable.
13 / 22
13. What are the two main types of cryptography?
The two main types of cryptography are:
Symmetric Key Cryptography:
Asymmetric Key Cryptography (Public Key Cryptography):
Facilitates secure communication without the need for a secure key exchange.
14 / 22
14. Another name for symmetric cryptography is __________.
Symmetric cryptography is also called shared key cryptography because the same secret key is used for both encryption and decryption of the data. This key must be shared securely between the communicating parties before they can use it for secure communication. Since the key is shared between the entities involved, it is referred to as a shared key.
15 / 22
15. One of the following terms is also used to describe asymmetric encryption?
A public key is part of an asymmetric key pair used in public key cryptography. It is shared openly and used for encryption or verification by others, while the corresponding private key, kept secret, is used for decryption or signing.
16 / 22
16. Which of the following algorithm is a symmetric Algorithm?
DES, AES and IDEA are symmetric key algorithms. Using DES is not recommended
17 / 22
17. Which of the following is NOT an asymmetric Algorithm?
RSA, ECC and Elgamal are popular asymmetric algorithms while SHA is a hashing algorithm
18 / 22
18. A function that take a potentially long message and generate a unique output value derived from the content of the message is known as __________
Hashing is a process in cryptography where a fixed-size string of characters (hash value) is generated from input data of any size. It is a one-way function, meaning it is computationally infeasible to reverse the process and obtain the original input from the hash. Hashing is commonly used for data integrity verification, password storage, and digital signatures.
19 / 22
19. Which of the following function is assured by the use of a hashing?
Integrity of data is ensured by hashing through the generation of a fixed-size hash value (digest) based on the content of data. If the data is altered in any way, even a minor change, the hash value will drastically differ. By comparing the computed hash value with the original hash, users can verify whether the data has been tampered with, providing a reliable mechanism for ensuring data integrity.
20 / 22
20. Which of the following is a mandatory requirement of a Hashing function?
The correct answer is All mentioned here
A secure hashing function must meet all of the following requirements:
21 / 22
21. ______________ facilitates secure, trusted communication between parties previously unknown to each other
The correct answer is Public Key Infrastructure (PKI)
Public Key Infrastructure (PKI) is a framework that enables secure and trusted communication between parties that may not have interacted before. It uses cryptographic techniques, primarily public and private keys, to provide authentication, encryption, and digital signatures, which help in securing communication and verifying the identity of parties.
22 / 22
22. Which one of the following algorithms can be applied to ensure that messages being sent, stored, or in transit are authentic?
Hashing algorithms can be applied to ensure the authenticity of messages by creating a fixed-size hash value (digest) from the message content. The sender shares or stores this hash value. Upon receipt or retrieval, the recipient computes a new hash value using the received or retrieved message. If the computed hash matches the original hash value, the message is considered authentic, as any alteration to the message content would result in a different hash value. Hashing is widely used for data integrity verification in secure communication and storage.
Your score is
The average score is 0%
Restart Test
Related challenges :