Cryptography & PKI | Test-2
This section rigorously assesses the implementation of cryptographic controls and Public Key Infrastructure (PKI) within the system. It includes testing the use of secure and modern encryption algorithms, ensuring that cryptographic keys are generated, stored, and rotated securely, and evaluating key management procedures for compliance with industry standards. The section also examines the integrity of digital signatures, the correct usage of certificates, certificate authorities (CAs), and the strength of TLS/SSL configurations. It ensures that encryption is applied effectively for data in transit and at rest, safeguarding sensitive information and preventing unauthorized access or data breaches. Additionally, tests cover protocol security to prevent common vulnerabilities like weak ciphers, improper certificate validation, and man-in-the-middle (MITM) attacks.
1 / 24
1. Where all of the following is cryptography can be applied?
Cryptography can be applied to ensure confidentiality, integrity, Authentication, Authorization and Non-repudiation
2 / 24
2. The terms Certificate Authority, Registration Authority, and CertificateRevocation Lists are all part of?
PKI is a framework that manages the generation, distribution, and verification of digital keys and certificates.
3 / 24
3. A _______ is like a secure, electronic fingerprint for your digital documents or messages. It’s a unique bit of code attached to the document that verifies its authenticity and integrity, proving it hasn’t been tampered with. Imagine it as a special seal on your document, but one that uses advanced cryptography instead of wax!
A digital signature is a cryptographic technique that provides a secure way to sign electronic documents or messages. It involves using a private key to generate a unique signature, which can be verified by anyone with access to the corresponding public key. Digital signatures ensure the authenticity, integrity, and non-repudiation of the signed content in digital transactions.
4 / 24
4. Digital signatures are used for:
The correct answer is “All the above.”
Here’s why:
Signing digital documents: Digital signatures provide integrity and authenticity for documents, ensuring the sender is who they claim to be and the document has not been altered.Encrypting emails: Digital signatures can be used along with encryption to ensure that the email content has not been tampered with and the senderโs identity is verified.Authenticating digital certificates: Certificates used in public key infrastructures (PKI) are authenticated through digital signatures, ensuring the integrity and trustworthiness of the certificate.Thus, digital signatures play a crucial role in all of these areas.
5 / 24
5. Which among the following is the framework designed to verify and authenticate the identity of entities within the enterprise engaging in data exchange?
The correct answer is PKI (Public Key Infrastructure).
PKI is a framework that enables the verification and authentication of the identity of entities (which can include individuals, devices, or services) within an enterprise. It uses digital certificates and public-key cryptography to secure data exchange and establish trust between communicating parties.
Here’s a brief overview of the other options in this context:
6 / 24
6. A ________ is an electronic document that verifies the identity of an entity, such as an individual, a device, or a website. It contains information about the entity’s public key and is digitally signed by a trusted third party called a Certificate Authority (CA).
A digital certificate is an electronic document that verifies the identity of an entity, such as an individual, a device, or a website. It contains information about the entity’s public key and is digitally signed by a trusted third party called a Certificate Authority (CA). Digital certificates are used in various security protocols, such as SSL/TLS for secure communication on the internet, to establish trust and ensure the authenticity of the entities involved. They play a crucial role in enabling secure and encrypted communication in digital environments.
7 / 24
7. Which of the following does a digital certificate contains:
A digital certificate typically contains the following information:
Public Key:
The user’s or entity’s public key, which is used for encryption and verifying digital signatures.
Identity Information:
Information about the certificate holder, such as name, email address, and organization.
Issuer Information:
Details about the entity that issued the certificate, including its digital signature.
Validity Period:
The period during which the certificate is considered valid.
Serial Number:
A unique identifier for the certificate.
Digital Signature:
A cryptographic signature created by the certificate issuer to verify the certificate’s authenticity.
Certificate Authority (CA) Information:
Details about the certificate authority that issued and signed the certificate.
8 / 24
8. Digital certificates are used for:
A digital certificate is used at all of the mentioned areas
9 / 24
9. Which of the following issues digital certificates?
Digital certificates are issued by trusted third-party entities known as Certificate Authorities (CAs). These organizations verify the identity of individuals, devices, or websites and bind their public keys to digital certificates. The CA’s digital signature on the certificate assures users of the certificate’s authenticity and the associated entity’s identity.
10 / 24
10. What distinguishes a public and private key system from symmetric systems?
The primary distinction between public-key (asymmetric) and symmetric key systems lies in the use and management of keys.
11 / 24
11. The most effective protection against disclosure attacks when passwords are kept in a database is achieved by using:
Hashing is an effective protection against disclosure attacks in password databases because hashing is a One-way Function, provides data Integrity, no direct password exposure, adding salting prevents rainbow table attacks and hashing generates same output irrespective of complexity and Length.
12 / 24
12. The equation used to calculate the total number of symmetric keys needed for N communicating participants is:
The equation used to calculate the number of symmetric keys needed is N (N โ 1)/2; where N is number of participants (not so scalable!)
13 / 24
13. One advantage of using digital signatures is that they can provide features that symmetric key cryptography design is unable to provide?
In short, digital signatures provide non-repudiation by uniquely tying a signature to the sender’s private key. The signature can be verified by anyone using the sender’s public key, providing cryptographic proof of the sender’s identity. The tamper detection feature ensures that any alteration to the signed message is detectable, making it difficult for the legitimate signer to deny their involvement or disown the content. The trust in non-repudiation is established through the involvement of a trusted Certificate Authority, which verifies and links the public key to the identity of the signer.
14 / 24
14. Key distribution issues arise in symmetric key systems due to __________.
Key distribution issues arise in symmetric key systems due to the challenge of securely sharing and managing a single secret key among communicating parties. The need for a secure and efficient method to distribute and update the shared key poses logistical difficulties, especially as the number of communicating entities increases. This challenge contrasts with asymmetric key systems, where public and private keys can be openly distributed without compromising security.
15 / 24
15. Which Public Key Infrastructure (PKI) component authenticates the applicant?
The role of a Validation Authority (VA) is to verify and validate digital certificates, ensuring the authenticity and legitimacy of the certificates issued by a Certificate Authority (CA). The VA plays a crucial role in confirming the accuracy of the information contained in digital certificates, helping establish trust in the digital identity of entities within a Public Key Infrastructure (PKI).
16 / 24
16. When using public key cryptography, the sender encrypts with _____ key of the receiver.
In public key cryptography, the sender encrypts with the recipient’s public key.
17 / 24
17. A ____________, also known as a fingerprint or hash value, is a unique and fixed-size string of characters generated through a cryptographic hash function applied to a digital certificate. It serves as a compact representation of the entire certificate, capturing its contents in a way that is easily verifiable.
The thumbprint is commonly used for various security purposes, including certificate validation and verification. When a digital certificate is issued, its thumbprint is calculated and included in the certificate. Users can then compare this thumbprint with the calculated thumbprint at the receiving end to ensure that the certificate has not been tampered with during transmission.
Typically, algorithms like SHA-256 are employed to generate digital certificate thumbprints due to their collision resistance and cryptographic strength. The thumbprint provides a convenient and secure means to verify the integrity of digital certificates.
18 / 24
18. Which of the following algorithms is frequently utilized to generate digital certificate thumbprints?
SHA-256 (Secure Hash Algorithm 256-bit) is frequently utilized to generate digital certificate thumbprints. It is a commonly used and secure hash algorithm in the generation of thumbprints for digital certificates.
19 / 24
19. The equation used to calculate the total number of asymmetric keys needed for N communicating participants is:
The equation used to calculate the number of asymmetric keysneeded is N*2; where N is number of participants
20 / 24
20. When using public key cryptography, the receiver decrypts data with _____ key of the receiver
In public key cryptography, the receiver decrypts the data with the receiverโs private key.
21 / 24
21. Which of the following describes a standard algorithm for symmetric cryptography?
The Advanced Encryption Standard (AES) is the standard algorithm for symmetric cryptography.
22 / 24
22. The best term to describe hashing among the following is?
It is computationally infeasible to reverse the process and obtain the original input from the hash value.
23 / 24
23. Which type of security control does encryption of data provides?
Encryption is considered a preventive security control because it proactively protects sensitive information by converting it into unreadable and unintelligible form. This prevents unauthorized access and disclosure of data, adding a layer of security to ensure that even if a breach occurs, the intercepted information remains confidential and secure.
24 / 24
24. Which of the following is a cryptographic attack?
A rainbow table attack, known plaintext attack and birthday attacks are various types of cryptographic attack.
Your score is
The average score is 0%
Restart Test
Related challenges :