Cryptography & PKI | Test-3
This section rigorously assesses the implementation of cryptographic controls and Public Key Infrastructure (PKI) within the system. It includes testing the use of secure and modern encryption algorithms, ensuring that cryptographic keys are generated, stored, and rotated securely, and evaluating key management procedures for compliance with industry standards. The section also examines the integrity of digital signatures, the correct usage of certificates, certificate authorities (CAs), and the strength of TLS/SSL configurations. It ensures that encryption is applied effectively for data in transit and at rest, safeguarding sensitive information and preventing unauthorized access or data breaches. Additionally, tests cover protocol security to prevent common vulnerabilities like weak ciphers, improper certificate validation, and man-in-the-middle (MITM) attacks.
1 / 25
1. Which algorithm produces 160-bit message digest on 512-bit blocks and also uses padding
SHA-1 (Secure Hash Algorithm 1) works by taking an input message and processing it through a series of mathematical operations, resulting in a fixed-size hash value, typically 160 bits in length. SHA-1 is no longer considered secure for cryptographic purposes, and more robust hash functions like SHA-256 or SHA-3 are recommended.
2 / 25
2. What is the weakness of SHA-1?
The weakness of SHA-1 lies in its vulnerability to collision attacks, where different inputs produce the same hash value. This compromises its security for cryptographic applications, as attackers could create fraudulent certificates or documents with the same hash as legitimate ones. Due to these vulnerabilities, SHA-1 is no longer considered secure for critical cryptographic purposes, and the use of stronger hash functions is recommended.
3 / 25
3. Among the following, what is the key characteristic of Public Key Infrastructure (PKI)?
The correct answer is Public-key cryptosystems distribute public-keys within digital certificates.
This is the key characteristic of Public Key Infrastructure (PKI). PKI uses digital certificates to bind public keys to entities such as individuals or organizations. These certificates are issued by trusted Certificate Authorities (CAs) and are used to verify the identity of the holder of the corresponding private key, facilitating secure communication.
Hereโs a brief explanation of the other options:
4 / 25
4. The following are all included in cryptographic protection EXCEPT
Masking is just hiding the data in the User interface which is not performed by a cryptographic system
5 / 25
5. Which of the following is the successor of SSL?
The successor to SSL (Secure Sockets Layer) is TLS (Transport Layer Security). TLS is designed to provide a secure communication layer over a computer network, ensuring privacy and data integrity between client and server applications. TLS has evolved through several versions, with TLS 1.2 and TLS 1.3 being widely used for securing communication on the internet.
6 / 25
6. When compared with asymmetric algorithms, which of the following is a strength of symmetric key cryptography?
The correct answer is Speed of encryption/decryption.
One of the key strengths of symmetric key cryptography compared to asymmetric algorithms is that it generally offers faster encryption and decryption processes. This is due to the simpler mathematical operations involved in symmetric encryption, making it more efficient for processing large amounts of data.
Hereโs a brief overview of the other options:
7 / 25
7. Which among the following BEST describes a characteristic of Public Key Infrastructure (PKI)?
One of the key advantages of public-key cryptography is that the public key can be shared openly without compromising the security of the system. This eliminates the need for a secure key distribution channel, which is a challenge in symmetric-key cryptography where the same key must be shared securely between communicating parties.
8 / 25
8. The product of two large prime numbers is factored to create this asymmetry cipher
In RSA, the security relies on the difficulty of factoring the product of two large prime numbers. However, not all asymmetric ciphers are created by the product of two large prime numbers. Other public-key algorithms, such as Elliptic Curve Cryptography (ECC) or the Diffie-Hellman key exchange, are based on different mathematical problems, like the difficulty of the elliptic curve discrete logarithm problem.
9 / 25
9. Which of the following security programs represents an asymmetric encryption implementation?
PGP uses a pair of public and private keys for encryption and decryption, employs digital signatures for message integrity and authenticity, and relies on a web of trust to establish the credibility of public keys. This makes PGP a robust and widely used method for secure communication and data protection.
10 / 25
10. In a Public Key Infrastructure (PKI), what is the function of a root Certificate Authority (CA)?
In a Public Key Infrastructure (PKI), the root Certificate Authority (CA) serves as the top-level entity responsible for issuing and managing digital certificates. Its primary functions include:
11 / 25
11. What is the standard format which defines Digital certificates:
The X.509 standard is a widely adopted format for public key certificates. It defines the structure of digital certificates used in public key infrastructure (PKI), specifying the information contained in certificates, such as the owner’s identity, public key, and the digital signature from a certificate authority to verify its authenticity. X.509 plays a crucial role in securing online communications and establishing trust in digital identities.
12 / 25
12. ___________ are trusted entities responsible for issuing digital certificates that verify the authenticity of a user, device, or website on the internet. Choose the general term.
The correct answer is Certificate Authorities (CAs).
Certificate Authorities (CAs) are trusted entities that issue digital certificates to verify the authenticity of users, devices, or websites on the internet. These certificates are used in various security protocols, such as SSL/TLS, to establish secure communications and ensure that parties are who they claim to be.
13 / 25
13. _____________are entities that assist Certificate Authorities (CAs) in the process of verifying and authenticating the information provided by individuals or entities requesting digital certificates.
Registration Authorities (RAs) play a role in the broader context of Public Key Infrastructure (PKI) by facilitating the registration and validation of users before the issuance of digital certificates by CAs. They act as intermediaries between certificate applicants and CAs, ensuring that the information provided for certificate issuance is accurate and reliable.
14 / 25
14. _____________ validates that each certificate in a certificate path from the original root of trust down to the server or client in question is valid and legitimate. Choose the correct word
Certificate Path Validation (CPV) is the process of verifying the authenticity and trustworthiness of a digital certificate by confirming the entire certification chain from the certificate being validated up to a trusted root certificate. It ensures that each certificate in the chain is valid, has not expired, and has not been revoked, establishing trust in the certificate and the associated public key. CPV is a critical step in the Public Key Infrastructure (PKI) to maintain the security of digital communications.
15 / 25
15. What is the self-signed top-level certificate of the certificate authority (CA) called? It is the certificate which doesnโt require verification and generally trusted among all. Choose the right term among the following:
A root certificate is a self-signed digital certificate that serves as the foundational trust anchor in a Public Key Infrastructure (PKI). It is the top-level certificate in a certificate hierarchy and is inherently trusted without being signed by another authority. Root certificates are used to verify the authenticity of lower-level certificates in the chain, establishing trust in digital certificates and enabling secure online communications.
16 / 25
16. An _________ is a digital document issued by a trusted authority (Certificate Authority, or CA) that acts as a bridge between a root certificate (the most trusted in the chain) and a server certificate (issued to a specific website or service) . Choose the right term.
An intermediate certificate is a digital certificate within a certificate hierarchy that is signed by a higher-level certificate, typically a root certificate. It serves as a link between the root certificate and end-entity certificates, helping establish a chain of trust in a Public Key Infrastructure (PKI). Intermediate certificates are used to issue and validate lower-level certificates, contributing to the overall security and integrity of digital communication.
17 / 25
17. A ______ is a secure repository or file that stores cryptographic keys, certificates, and other sensitive credentials. Choose the right term.
The correct answer is Keystore.
A keystore is a secure repository used to store cryptographic keys, certificates, and other sensitive credentials. Keystores are commonly used in various applications and systems to manage keys and certificates for encryption, decryption, and authentication purposes.
18 / 25
18. A ______ is a secure repository or file that stores trusted digital certificates used in SSL/TLS communication. It contains public keys of trusted entities, such as Certificate Authorities (CAs), enabling a system to verify the authenticity of certificates presented during secure connections.
A Trust store is a secure repository or file that stores trusted digital certificates used in SSL/TLS communication. It contains public keys of trusted entities, such as Certificate Authorities (CAs), enabling a system to verify the authenticity of certificates presented during secure connections. Trust stores are integral to establishing trust and security in encrypted communications, as they define which certificates are considered valid and trustworthy.
19 / 25
19. During a digital certificate verification, after checking the CAโs digital signature using the CAโs public key, you must check and ensure that the certificate was not published on a ________. Choose the correct term.
A Certificate Revocation List (CRL) is a list of digital certificates that have been revoked by a Certificate Authority (CA) before their expiration date. It is used to check whether a given certificate is still considered valid or if it has been revoked due to compromise, expiration, or other reasons. CRLs help ensure the security of digital communications by allowing systems to verify the current status of certificates in a Public Key Infrastructure (PKI).
20 / 25
20. When is a certificate added to a Certificate Revocation List (CRL)?
A certificate is added to a Certificate Revocation List (CRL) when the Certificate Authority (CA) determines that the certificate needs to be invalidated before its scheduled expiration. This may happen due to reasons such as compromise of the private key, suspicion of unauthorized use, or other security concerns. The CRL serves as a public record of revoked certificates, allowing systems to check and ensure that certificates are not used after being revoked.
21 / 25
21. The major disadvantage of checking with Certificate Revocation Lists(CRLs) is:
A major disadvantage of a Certificate Revocation Lists (CRLs) is the potential for latency and scalability issues. As the number of certificates grows, checking the entire CRL for revocation status during certificate validation can introduce delays and increase network overhead. Additionally, frequent updates and distribution of large CRLs pose challenges in maintaining real-time revocation information, impacting the overall efficiency of the system.
22 / 25
22. What distinguishes the RSA and AES algorithms from one another?
RSA is an asymmetric algorithm suitable for tasks like key exchange and digital signatures, while AES is a symmetric algorithm more efficient for bulk data encryption. They are often used together in a hybrid approach for secure communication.
23 / 25
23. Which method works best for storing user passwords in a database?
The best method for storing user passwords in a database is to use a secure and adaptive hashing algorithm, such as bcrypt, Argon2, or scrypt. These algorithms are designed to be slow and computationally intensive, making it difficult for attackers to perform brute-force or dictionary attacks. Additionally, it is crucial to incorporate proper salting, a unique random value for each password, to further enhance security and protect against rainbow table attacks. Avoid using outdated or fast hashing algorithms like MD5 or SHA-1, as they are vulnerable to modern attacks.
24 / 25
24. Which of the following is used in symmetric key cryptography?
The unique quality of symmetric cryptography is that it uses a single shared secret key for both encryption and decryption. This key must be kept confidential between the communicating parties, providing a fast and efficient method for secure communication and data protection.
25 / 25
25. ____________ is a set of specifications defined by the National Institute of Standards and Technology (NIST) for generating and verifying digital signatures.
The Digital Signature Standard (DSS) is a set of specifications defined by the National Institute of Standards and Technology (NIST) for generating and verifying digital signatures. It includes algorithms such as the Digital Signature Algorithm (DSA), the Elliptic Curve Digital Signature Algorithm (ECDSA), Edwards-curve Digital Signature Algorithm (EdDSA) for securing digital communication and ensuring the authenticity and integrity of electronic documents.
Your score is
The average score is 0%
Restart Test
Related challenges :