Cryptography & PKI | Test-5

0%
0

Cryptography & PKI | Test-5

This section rigorously assesses the implementation of cryptographic controls and Public Key Infrastructure (PKI) within the system. It includes testing the use of secure and modern encryption algorithms, ensuring that cryptographic keys are generated, stored, and rotated securely, and evaluating key management procedures for compliance with industry standards. The section also examines the integrity of digital signatures, the correct usage of certificates, certificate authorities (CAs), and the strength of TLS/SSL configurations. It ensures that encryption is applied effectively for data in transit and at rest, safeguarding sensitive information and preventing unauthorized access or data breaches. Additionally, tests cover protocol security to prevent common vulnerabilities like weak ciphers, improper certificate validation, and man-in-the-middle (MITM) attacks.

1 / 16

1. Which protocol is used to digitally sign and encrypt emails?

2 / 16

2. Programs for cracking passwords work by reversing the hashing procedure.

3 / 16

3. What does a cryptography “collision attack” mean?

4 / 16

4. Which PKI mechanism enables instantaneous validation of a certificate’s validity?

5 / 16

5. Paul wishes to send confidential messages to a competitor company. He secures these messages by concealing a secret message within an ordinary message. ‘Security through obscurity’ is the technique’s description. What method is Paul employing?

6 / 16

6. What is the primary objective of a nonce in cryptographic protocols?

7 / 16

7. What does the term “chaining” refer to in the context of block ciphers?

8 / 16

8. Which expression satisfies the definition of digital signature?

9 / 16

9. What is the main advantage of elliptic curve cryptography (ECC) over RSA?

10 / 16

10. Which cryptographic algorithm is commonly used for secure key exchange in protocols like SSL/TLS?

11 / 16

11. An attacker has obtained a target file encrypted via public key. Which of the following attacks is most likely to be used to crack the target file?

12 / 16

12. How does a timestamping server help to strengthen the validity of a digital signature?

13 / 16

13. Which one of the following levels of algorithms does Public Key Infrastructure (PKI) uses?

14 / 16

14. Which cryptographic concept ensures that even if a long-term secret key is compromised, past communications remain secure?

15 / 16

15. What does the term “key escrow” refer to in cryptographic systems?

16 / 16

16. Among the below statements, what is correct about digital signatures?

Your score is

The average score is 0%

0%


Related challenges :