Cryptography & PKI | Test-4

0%
0

Cryptography & PKI | Test-4

This section rigorously assesses the implementation of cryptographic controls and Public Key Infrastructure (PKI) within the system. It includes testing the use of secure and modern encryption algorithms, ensuring that cryptographic keys are generated, stored, and rotated securely, and evaluating key management procedures for compliance with industry standards. The section also examines the integrity of digital signatures, the correct usage of certificates, certificate authorities (CAs), and the strength of TLS/SSL configurations. It ensures that encryption is applied effectively for data in transit and at rest, safeguarding sensitive information and preventing unauthorized access or data breaches. Additionally, tests cover protocol security to prevent common vulnerabilities like weak ciphers, improper certificate validation, and man-in-the-middle (MITM) attacks.

1 / 15

1. Which of the following are the currently approved Digital signature standard algorithms:

2 / 15

2. _________are pre-computed tables used in password cracking to quickly reverse hash functions. These tables contain pairs of plaintext passwords and their corresponding hash values. Use the correct terminology

3 / 15

3. _______ is a standard for securing email messages using cryptographic techniques. It provides a way to encrypt and digitally sign email content, ensuring confidentiality, integrity, authentication, and non-repudiation.

4 / 15

4. The strength of crypto system relies solely on the strength of the key; algorithms secrecy should be revealed wide open to the public. Which principle is this?

5 / 15

5. Which characteristic guarantees a hash function won’t generate the same hashed value for two distinct messages?

6 / 15

6. _______is a specific type of authentication code that involves a cryptographic hash function and a secret key. It uses the combination of the message and the secret key to generate a hash value, providing a way to verify both the integrity and authenticity of the message.

7 / 15

7. Which of the following does HMAC not provides?

8 / 15

8. Which of the following are variants of SHA-2?

9 / 15

9. When a digital signature is used correctly, it provides the recipient with proof that the message was sent by the specified sender even when it was sent over an unsecured channel. Which key is used to encrypt the message digest when using a digital signature?

10 / 15

10. In what way is the distribution of the public key regulated and organized to ensure sender identity for users?

11 / 15

11. Alex uses his public key to encrypt his data, which he then saves on the cloud. Which one of the subsequent attack scenarios will compromise his data’s privacy?

12 / 15

12. Which of the following PKI (Public Key Infrastructure) procedures makes sure that a certificate is still valid for a given operation and that a trust relationship is in place?

13 / 15

13. Which of the following Secure Hashing Algorithms (SHA) is similar to the MD5 algorithm and generates a 160-bit digest from a message with a maximum length of (264-1) bits?

14 / 15

14. Which one of the following hashing functions is no more recommended for use?

15 / 15

15. What is the primary disadvantage of sharing sensitive data using the advanced encryption standard (AES) algorithm with a 256 bit key?

Your score is

The average score is 0%

0%


Related challenges :