Term
(Chapter 1)
What are the three decision making strategies? |
|
Definition
- Rule based decisions - follow a rule
- Relativistic decisions - copy others
- Rational - looks at risks and chooses measures accordingly
|
|
|
Term
(Chapter 1)
What are the six phases of the security process? |
|
Definition
- Identify the assets
- Analyze the risks of attack
- Establish your security policy
- Implement your defenses
- Monitor your defenses
- Recover from attacks
|
|
|
Term
(Chapter 1)
Assets are protected by a ___ |
|
Definition
|
|
Term
(Chapter 1)
Openings in the boundary are ___ |
|
Definition
|
|
Term
(Chapter 1)
A ___ tries to attack assets |
|
Definition
|
|
Term
(Chapter 1)
A ___ protects the assets. |
|
Definition
defense, safeguard, countermeasure |
|
|
Term
|
Definition
confidentiality, integrity, availability |
|
|
Term
(Chapter 1)
What are the 5 recognized services that security mechanisms might provide? |
|
Definition
- confidentiality
- integrity
- availability
- authentication
- nonrepudiation
|
|
|
Term
(Chapter 1)
All attacks fall into which 6 categories? |
|
Definition
- physical theft
- denial of service
- subversion
- masquerade
- disclosure
- forgery
|
|
|
Term
(Chapter 1)
What are the pros and cons of responsible disclosure? |
|
Definition
Pro: gives vendors an opportunity to release a patch
before making the vulnerability public
Con: vendors may not act promptly |
|
|
Term
(Chapter 1)
What are the pros and cons of full disclosure? |
|
Definition
Pro: May result in faster response times from vendors
Con: May inform malicious parties of vulnerabilities
before they are patched |
|
|
Term
(Chapter 2)
What is a buffer overflow attack? |
|
Definition
it is when an attacker provides input that exceeds the buffer length |
|
|
Term
(Chapter 2)
What is shellcode? |
|
Definition
It is the name applied to malicious code that
allows an attacker to issue further commands |
|
|
Term
(Chapter 2)
What is a sled attack? |
|
Definition
It is a sequence of instructions responsible for directing the flow of control towards the core code of a buffer overflow attack. |
|
|
Term
(Chapter 2)
What is No-Op? |
|
Definition
Machine instruction that does nothing except move to the next instruction |
|
|
Term
(Chapter 2)
What is a trampoline sled? |
|
Definition
instead of a sliding along no-ops, this sled contains control transfer instructions all pointing directly to the shellcode |
|
|
Term
(Chapter 2)
What is Return-to-libc attack? |
|
Definition
Overwrites return address with a call to the desired library function. |
|
|
Term
(Chapter 2)
What is a Canary? |
|
Definition
It is a value placed between a buffer and control data. |
|
|
Term
(Chapter 2)
What is Point-Guard? |
|
Definition
It adds code which XOR-encodes pointers (including return address) before and after they are used. |
|
|
Term
(Chapter 2)
What is Address Space Layout Randomization (ASLR)? |
|
Definition
It randomly rearranges the data of a process's address space making it extremely difficult to predict where to jump in order to execute code. |
|
|
Term
(Chapter 2)
What is a heap? |
|
Definition
It is a portion of memory allocated dynamically for use by the program |
|
|
Term
(Chapter 2)
What is a memory leak? |
|
Definition
It is memory allocated on the heap that
was not explicitly deallocated (freed) |
|
|
Term
(Chapter 2)
What does data execution prevention do? |
|
Definition
It only executes instructions in a control section |
|
|
Term
(Chapter 2)
What are the 4 main strategies to control access? |
|
Definition
- Islands
- Vaults
- Puzzles
- Patterns
|
|
|
Term
(Chapter 2)
What are the 3 main categories of controls? |
|
Definition
Preventative, detective, and corrective |
|
|
Term
(Chapter 2)
What are the 6 classifications of security controls? |
|
Definition
- physical - e.g. walls
- mechanical - protection that changes by mechanical intervention
- logical- protection controlled by a structured set of rules or configuration data
- functional - protection via the design and operation of functions in the system
- procedural - protection from compliance with explicitly defined operation procedures
- cryptographic - protection based on transformation of the data using cryptographic techniques
|
|
|
Term
(Chapter 3)
What is CRUD? |
|
Definition
Create, Read, Update, Delete permissions |
|
|
Term
(Chapter 3)
What is the difference between global and tailored policies?
|
|
Definition
Global is applied to all users by defualt and tailored is for specific sets of files |
|
|
Term
(Chapter 3)
What is the difference between Deny by Default and Default Permit policy? |
|
Definition
Deny by Defaut provides no access to anyone unless specifically granted while Default Permit provides permission for everything except for what is specifically prohibited. |
|
|
Term
(Chapter 3)
What is Cluster by columnn? |
|
Definition
A capability-based security that associates access rights with users or processes |
|
|
Term
(Chapter 3)
What is Cluster by Row? |
|
Definition
A file permissions that associates access rights with resources such as files |
|
|
Term
(Chapter 3)
What is a state diagram? |
|
Definition
A technique to illustrate a system’s behavior. |
|
|
Term
(Chapter 3)
What are the three information states? |
|
Definition
Storage, processing, and transmission |
|
|
Term
(Chapter 3)
What is Window of Vulnerability? |
|
Definition
It is the time during which an exploit exists but computers aren't patched. |
|
|
Term
(Chapter 4)
How do user groups work? |
|
Definition
Each file has a set of group access rights, and the ID
of an established group of users |
|
|
Term
(Chapter 4)
Traditional Unix uses ___ ___ ___ to indicate access rights. |
|
Definition
|
|
Term
(Chapter 4)
What are the three sets of RWX flags? |
|
Definition
|
|
Term
(Chapter 4)
What is the best general approach for building effective ACLs? |
|
Definition
|
|
Term
(Chapter 4)
In Windows, creating or copying a new file: the file ___ access rights from the
enclosing folder |
|
Definition
|
|
Term
(Chapter 4)
When moving a file or folder, it ___ its ACL but ___ the inheritence relationship from its previous location and ___ from the new location
|
|
Definition
retains, breaks, does NOT inherit |
|
|
Term
(Chapter 4)
What is transitive trust? |
|
Definition
– If we trust Program 1, and it trusts Program 2, then we are also trusting Program 2
– If we run a program, then we trust its author |
|
|
Term
(Chapter 4)
What are ANSI X-standards? |
|
Definition
Used by the banking industry to protect electronic funds
transfers |
|
|
Term
(Chapter 4)
What is PCI-DSS? |
|
Definition
Used by “Payment Card Industry” to protect credit card
transactions |
|
|
Term
(Chapter 4)
What is ISO 27000? |
|
Definition
Family of international standards for security system
quality improvement |
|
|
Term
(Chapter 5)
What is the recovery process from a compromise called? |
|
Definition
|
|
Term
(Chapter 5)
What is the process of collecting and/or analyzing evidence
from computers and other digital storage devices
|
|
Definition
|
|
Term
(Chapter 5)
What is Due Diligence?
|
|
Definition
The notion that there are customary acts that
parties take for safety and security
Parties are less at fault if they show due diligence
in their actions
|
|
|
Term
(Chapter 5)
During the aftermath of an incident, you should identify shortcomings in what? |
|
Definition
Risk assessment, policy, or implementation
|
|
|
Term
(Chapter 6)
What are the 3 authentication factors? |
|
Definition
- Something you know - password or PIN
- Something you have - key or token
- Something you are - personal trait
|
|
|
Term
(Chapter 6)
What is Cryptographic hash function?
|
|
Definition
It is a checksum on a message this is either
– One-way: It should be easy to compute Y=h(M), but hard to find
M given only Y
– Collision-resistant: It should be hard to find two messages, M
and N, such that h(M)=h(N)
|
|
|
Term
(Chapter 6)
Give examples of two factor authentication. |
|
Definition
– ATM authentication: ATM card + PIN
– Biometric laptop: Fingerprint + password
– NOT: Password + PIN
|
|
|
Term
(Chapter 6)
What are characteristics of a strong password? |
|
Definition
– UPPER/lower case characters
– Special characters
– Numbers
|
|
|
Term
(Chapter 6)
List the strengths of the different password complexities. |
|
Definition
- Numbers: 1,000,000
- UPPER or lower case characters: 308,915,776
- UPPER and lower case characters: 19,770,609,664
- 32 special characters (&, %, $, £, “, |, ^, §, etc.) = 1,073,741,824
|
|
|
Term
(Chapter 6)
Password strength is represented mathematically as AL, What is A and L? |
|
Definition
– A = number of possible characters that can be in the
password
– L = length of the password
|
|
|
Term
(Chapter 6)
What is a brute force attack? |
|
Definition
A password attact that tries every possible character combination
|
|
|
Term
(Chapter 6)
What is a dictionary attack? |
|
Definition
– Uses a list of likely passwords as the password space
– There are far fewer likely passwords than possible
passwords
|
|
|
Term
(Chapter 6)
what is password salt? |
|
Definition
Uses random bits as part of the input to a hash function or encryption algorithm to increase the randomness of the output
|
|
|
Term
(Chapter 6)
What the benefits of authentication tokens? |
|
Definition
– Hard to attack - uses a stronger secret than in a typical password
– Hard to forge - must hack the hardware
– Hard to share – secret stored in hardware
|
|
|
Term
(Chapter 6)
What the problems of authentication tokens? |
|
Definition
– Expensive - must buy hardware and/or special authentication software
– Can be lost or stolen
– Risk of hardware failure
|
|
|
Term
(Chapter 6)
What is a passive token? |
|
Definition
Stores an unchanging credential
|
|
|
Term
(Chapter 6)
What is an active token? |
|
Definition
Stores a secret that generates a different credential for
each login
|
|
|
Term
(Chapter 6)
What is Challenge Response Authentication?
|
|
Definition
An exchange of data to yield a shared result
|
|
|
Term
(Chapter 6)
What are problems with biometric authentication? |
|
Definition
– Data collection may be intrusive or difficult in some environments
– Privacy issues may exist
– Some changes in characteristics may occur
– Overall, most have an uncomfortable level of false positives and
false negative
|
|
|
Term
(Chapter 6)
what is False Acceptance Rate (FAR)?
|
|
Definition
Likelihood of incorrectly authenticating someone as an
authorized user
|
|
|
Term
(Chapter 6)
What is False Rejection Rate (FRR)?
|
|
Definition
Likelihood of incorrectly rejecting someone as an
unauthorized user. Can lead to a denial of service
|
|
|
Term
(Chapter 6)
What are some biometric vulnerabilities? |
|
Definition
• Clone or borrow credential – often
– Demonstrated many times with fingerprints, faces, voices, etc.
• Sniff the credential and replay – often
– Possible in networked and remote systems
• Trial and error guessing – slight
– Requires a team of attackers
• Denial of service – possible
• Retrieve from backup – possible
– Attacker intercepts credential pattern database
|
|
|
Term
(Chapter 7)
What is encrption? |
|
Definition
a cryptographic technique
|
|
|
Term
(Chapter 7)
The encryption procedure (algorithm) takes what 2 inputs?
|
|
Definition
– Plaintext data
– Encryption key
|
|
|
Term
(Chapter 7)
What is substitution cipher? |
|
Definition
text letters of the message remain in the same order, but individual letters are substituted with others according to the key
|
|
|
Term
(Chapter 7)
What is symmetric encryption?
|
|
Definition
sender and recipient must share a secret key
|
|
|
Term
(Chapter 7)
What is the Caesar cipher? |
|
Definition
– Replace each letter in a text by the 3rd letter following it in the alphabet:
– ABCD becomes DEFG; CAT becomes FDW
– Variations rotate by different amounts
|
|
|
Term
(Chapter 7)
What is the Vigenere cipher? |
|
Definition
– Uses a series of different rotations
– Uses a block of shift keys, (k1, k2, . . . , kn), to encrypt a plaintext, M, of length n, with each shift key being chosen in order
– There are potentially m different substitutions for any given letter
– Decryption is done by performing reverse shifts
– Can be easily broken using statistical techniques if the
ciphertext is long enough relative to the value of m
|
|
|
Term
(Chapter 7)
What is a one time pad? |
|
Definition
– Uses a block of shift keys, (k1, k2, . . . , kn), to encrypt a plaintext, M, of length n, with each shift key being chosen uniformly at random
– The length m of the block of keys must be the same as the length n of the plaintext
– Since each shift is random, every ciphertext is equally likely for any plaintext
|
|
|
Term
(Chapter 7)
How is the exclusive or (XOR) used in a binary one time pad? |
|
Definition
– If a and b are different: a ⊕ b = 1
– If a and b are the same: a ⊕ b = 0
– Message M is a binary string of length n
– Pad P is a completely random binary string of length n
– Ciphertext C is produced as C = M ⊕ P
– Completely unbreakable, because each bit of the ciphertext is equally likely to be a 0 or a
|
|
|
Term
(Chapter 7)
What is plaintext? |
|
Definition
|
|
Term
(Chapter 7)
What is cipher text? |
|
Definition
|
|
Term
(Chapter 7)
What is a key? |
|
Definition
|
|
Term
(Chapter 7)
what is transposition cipher? |
|
Definition
rearranges the text of the message through a systematic process
|
|
|
Term
(Chapter 1)
What are the 6 general types of attacks on information? |
|
Definition
- physical theft
- denial of service (DOS) - preventing access to a service
- subversion - modifying a program to work for an attacker
- masquerade - pretend to be an authorized user
- disclosure - revealing confidential information
- forgery - bogus message sent to a computer
|
|
|
Term
(Chapter 1)
What are the concepts of least privilege? |
|
Definition
• Restrict what people may do to an asset
• Provide the minimum privileges required
• Example: key opens my suite but not yours |
|
|
Term
(Chapter 1)
What are the concepts of confidentiality? |
|
Definition
– Keeping information secret
– Avoiding disclosure vulnerabilities |
|
|
Term
(Chapter 1)
What are the concepts of integrity? |
|
Definition
– Protecting information from improper changes
– Avoiding forgery, subversion, and masquerade
attacks |
|
|
Term
(Chapter 1)
What are the concepts of availability? |
|
Definition
– Keeping systems available and in operation
– Avoiding Denial of Service (DoS) attacks |
|
|
Term
(Chapter 2)
What are the 4 main strategies to contol access? |
|
Definition
- islands
- vaults
- puzzles
- patterns
|
|
|
Term
(Chapter 2)
What is the concept of an island? |
|
Definition
• On an island, we can only touch what is there
– Everything else is brought from elsewhere
• A process can execute its instructions in RAM and
modify variables in RAM
– It can only use resources brought into its RAM
– It can’t access anything else
• We restrict a process by not allowing it access to
resources
• This approach is called isolation and mediation |
|
|
Term
(Chapter 2)
What is the concept of a vault? |
|
Definition
• We can retrieve things from the vault only if allowed
– Someone/something restricts access
– Least Privilege: we only have access to some items
• A bank safe deposit box – we have the key
– The banker lets us retrieve the box
– We can modify the box contents
– We can’t retrieve or modify any other boxes
• Computer access control – a process can retrieve a
file or print data if granted the right permissions |
|
|
Term
(Chapter 2)
What is the concept of a puzzle? |
|
Definition
• Protect data by presenting a puzzle
– Authorized users know the puzzle’s answer
• Security Through Obscurity (STO)
– A weak puzzle, like protecting data by hiding it
– Invariably, this approach will fail
• Strong puzzles use Cryptography (“crypto”)
– Mathematical techniques to hide or protect data
– Quality cryptography is very hard to break
• Weak cryptography is simply a form of STO |
|
|
Term
(Chapter 2)
What is the concept of patterns? |
|
Definition
• Make decisions based on similarities
• Photo IDs – guard compares face against poor photo
– Photos are often laughably inaccurate
• Anti-virus software
– Searches computer for patterns found in viruses
– Must be updated continuously for new viruses
• Biometrics – fingerprint readers, for example
– Compare reading against a stored pattern
• Problems: false positives and false negatives |
|
|
Term
(Chapter 2)
A software program that exploits a computer vulnerability and copies itself across a network is an example of a/an ___
a. Trojan
b. drive by download
c. virus
d. worm |
|
Definition
|
|
Term
(Chapter 2)
(True or False)
Steganography is a type of vault computer based access control. |
|
Definition
False
Steganography is a puzzle |
|
|
Term
(Chapter 2)
An attack that relies on gaining access to additional areas of memory by providing too much input is know as a/an ___.
a. format string attack
b. arithmetic overflow attack
c. buffer overflow attack
d. shellcode attack |
|
Definition
c. buffer overflow attack |
|
|
Term
(Chapter 2)
(True or False)
The window of vulnerability is the period of time during which a system is unprotected from an exploit. |
|
Definition
|
|
Term
(Chapter 2)
(True or False)
The deny by default approach to file security requires an explicit listing of the users who are allowed to access the file |
|
Definition
|
|
Term
(Chapter 2)
Biometrics is an example of using the ___ access control strategy.
a. island
b. pattern
c. vault
d. puzzle |
|
Definition
|
|
Term
(Chapter 2)
The type of computer based access control that involves a process that uses secret or hidden information in order to retrieve particular data items is called ___
a. puzzles
b. vaults
c. islands
d. patterns |
|
Definition
|
|
Term
(Chapter 2)
The Morris worm used a networking service called finger. The purpose of the finger service is to ___
a. report the status of individual computer users
b. determine which operating system is running on a computer
c. report which device drivers a computer uses
d. determine which ports are open on a computer |
|
Definition
a. report the status of individual computer users |
|
|
Term
(Chapter 2)
a user visits a web page or clicks on a pop up window, which causes malware to be loaded onto the user's system. This is an example of a ___
a. virus infection
b. Trojan infection
c. computer worm attack
d. drive by download |
|
Definition
|
|
Term
(Chapter 2)
A zero day exploit
a. refers to an exploit that never occurs
b. does not pose a security threat
c. occurs immediately after a software patch is applied
d. has no software patch |
|
Definition
|
|
Term
(Chapter 4)
When collecting digital evidence from a crime scene, often the best strategy for dealing with a computer that is powered on is to ___
a. remove the hard drive
b. transport it while running
c. perform a clean shutdown
d. unplug it |
|
Definition
|
|
Term
(Chapter 4)
When an external attack into a system has occurred and has been detected, what should be done?
a. all of these
b. review risk assessments
c. collect evidence for possible criminal prosecution
d. review security policies |
|
Definition
|
|
Term
(Chapter 4)
To produce evidence that will be admissable for a criminal case involving unauthorized computer use, you must ___
a. document everything about the system and its physical condition
b. ensure that nothing has been changed in the system
c. secure the scene by denying access tot he system
d. all of these |
|
Definition
|
|
Term
(Chapter 4)
Which of he following statement is correct regarding access rights to files in Windows?
a. if a new file is created, it will only have the access rights explicitly granted to it
b. if a file is copied into a different folder, its original access rights will remain unchanged
c. if a file is moved to a different folder on the same hard drive, it will inherit the access rights of the new parent folder
d. if a file is moved to a different folder, its access righsts remain unchanged |
|
Definition
c. if a file is moved to a different folder on the same hard drive, it will inherit the access rights of the new parent folder |
|
|
Term
(Chapter 4)
In Windows server domain, which type of permissions are applied first when determining authorization for a file?
a. permissions from folders higher up in the hierarchy
b. deny permissions
c. permissions granting access specifically assigned to the file
d. permissions that are inherited from the parent folder |
|
Definition
|
|
Term
(Chapter 4)
(True or False)
Event logging is used to improve system security |
|
Definition
|
|
Term
(Chapter 4)
(True or false)
Windows does not deny an access right by omitting it, but allows you to explicitly deny a right. |
|
Definition
|
|
Term
(Chapter 4)
(True or False)
When analyzing the contents of a hard drive during a digital investigation, one step you can take to authenticate that you did not change the drive's data is to check the original hard drive for errors. |
|
Definition
False, doing anything to the hard drive may change information |
|
|
Term
(Chapter 4)
(True or false)
In most operating systems, unauthorized access to files can be detected through event logging |
|
Definition
|
|
Term
(Chapter 4)
(True or False)
An organization can be considered more at fault if they did not practice due diligence. |
|
Definition
|
|
Term
(Chapter 4)
The process of recovering a compromised system is called ___
a. restoration
b. sanitation
c. remediation
d. intervention |
|
Definition
|
|
Term
(Chapter 6)
What are the 4 token vulnerabilities? |
|
Definition
- clone or borrow credential
- sniffing and trial and error guessing
- denial of service
- retreive from backup
|
|
|
Term
(Chapter 6)
What is a one time password token? |
|
Definition
An active token that transmits different credentials based on an internal clock or counter |
|
|
Term
(Chapter 6)
(True or False)
a dictionary attack on passwords uses every possible character combination |
|
Definition
False, a dictionary attack uses a dicionary of likely passwords (pg 252) |
|
|
Term
(Chapter 6)
you are using a one way cryptographic hash function to encrypt two messages. In order to be described as ___, the hash function should provide different output for the two messages
a. randomly generating
b. collision resistant
c. collision free
d. unique |
|
Definition
|
|
Term
(Chapter 6)
(True or False)
when selecting a password, random collections of letters contain far more entropy than English words |
|
Definition
|
|
Term
(Chapter 6)
an authentication system that requires the user to provide two different passwords and a fingerprint scan is an example of ___
a. mixed mode authentication
b. three factor authentication
c. two factor authentication
d. single factor authentication |
|
Definition
c. two factor authentication (password and fingerprint are two different types of authentication: something you know and something you are) |
|
|
Term
(Chapter 6)
(True or False)
Challenge response authentication relies on a shared secret |
|
Definition
True, the calculation relies on a shared secret (slide) |
|
|
Term
(Chapter 6)
(True or False)
a brute force password cracking attempt uses every possible English word as its search space |
|
Definition
False, brute force tries every possible character combination (slides) |
|
|
Term
(Chapter 6)
When attempting to use a computer system, which occurs first?
a. authorization
b. authentication
c. access control |
|
Definition
|
|
Term
(Chapter 6)
attacking the easiest targets is referred to as ___
a. doorknow rattling
b. footprinting the system
c. grabbing the low hanging fruit
d. reducing the search space |
|
Definition
c. grabbing the low hanging fruit (pg 236) |
|
|
Term
(Chapter 6)
which of the following has the most entropy?
a. random character combinations containing all possible characters
b. random character combinations containing only letters
c. English words
d. Spanish words |
|
Definition
a. random character combinations containing all possible characters |
|
|
Term
(Chapter 6)
which type of change will improve the strength of a password most significantly?
a. an increase in the set of possible characters that can be used
b. an increase in the length of the password
c. the inclusion of special characters such as %$@!
d. the use of real English words |
|
Definition
b. an increase in the length of the password |
|
|
Term
(Chapter 6)
in a password system, the total number of possible passwords is called the ___
a. heap size
b. search space
c. complexity strength
d. hash space |
|
Definition
|
|
Term
(Chapter 6)
(True or False)
A garage door opener transmits the same code each time you use it |
|
Definition
False, a garage door opener uses a hopping or rolling code which creates a pseudo random number (slides) |
|
|
Term
(Chapter 6)
(True or False)
Entropy refers to the strength of a password system |
|
Definition
False. Entropy refers to the uncertainty in the value of a data item (pg 253) |
|
|
Term
(Chapter 6)
all of the following are fundamental strategies for authenticating people on computer systems except ___
a. something you are
b. something you make
c. something you know
d. something you possess |
|
Definition
a. Incorrect - something you are (pg 231)
b. Correct - something you make
c. Incorrect - something you know (pg 231)
d. Incorrect - something you possess (pg 231) |
|
|
Term
(Chapter 6)
(True or False)
When you are biased in selecting a password, you choose your password from the entire search space |
|
Definition
False. When people are biased in their password selection, they choose passwords from only part of the total possible search space. (pg 254) |
|
|
Term
(Chapter 7)
Given the following binary values
PLAINTEXT 1011
Key Stream 0110
Using XOR, the resulting ciphertext would be ___
a. 0010
b. 0101
c. 1101
d. 1001 |
|
Definition
c. 1101, it produces a '0' when the data match and a '1' when the data differs (pg 300) |
|
|
Term
(Chapter 7)
if a cryptoanalyst can select plaintext to be encrypted with the target's secret key, what technique is he using?
a. chosen plaintext
b. known ciphertext
c. known plaintext
|
|
Definition
a. chosen plaintext, the analyst can celect plaintext to be encrypted with the target's secret key (pg 295) |
|
|
Term
(Chapter 7)
A cipher which retains the original characters of the message but rearranges them is referred to as ___
a. assymetric encryption
b. substituion cipher
c. transposition cipher
d. symmetric encryption |
|
Definition
c. Correct - transposition cipher, we rearrange the text of the message (pg 289)
d. Incorrect - substitution cipher, the text letters remain in the same order, but individual letters are substituted with others, according to the key (pg 289) |
|
|
Term
(Chapter 7)
(True or False)
The Enigma machine was an encryption device used by the US and the UK during World War II |
|
Definition
False, Enigma, a rotor machine used by Germany during World War II (pg 297) |
|
|
Term
(Chapter 7)
You are creating an encryption procedure. You replace each letter in a message with a letter that appears 5 places to the left of the original letter. What type of process is this?
a. symmetric encryption
b. Vigenere cipher
c. assymetric encryption
d. substitution cipher |
|
Definition
b. Incorrect (this uses a series of shifts) - Vigenere cipher, uses a series of shifts to encrypt each letter differently. (pg 294)
d. Correct (this uses a shift of 5 places to the left)- substitution cipher, the text letters remain in the same order, but individual letters are substituted with others, according to the key (pg 289) |
|
|
Term
(Chapter 7)
If a cryptoanalyst has only ciphertext to work with, what technique is he using?
a. chosen plaintext
b. known plaintext
c. known ciphertext |
|
Definition
c. known ciphertext. The analyst works exclusively from the ciphertext (pg 295) |
|
|
Term
(Chapter 7)
Which type of cipher is unbreakable if not reused?
a. one time pad
b. substititution cipher
c. exclusive or cipher
d. Caesar cipher |
|
Definition
a. one time pad. When properly used, it is mathematically impossible to crack a message encrypted by a one time pad (pg 306) |
|
|
Term
(Chapter 7)
(True or False)
The Vigenere cipher uses a series of shifts to encrypt each letter in a message |
|
Definition
True, we use a series of shifts and we encrypt each letter differently with each shift. (pg 294) |
|
|
Term
(Chapter 7)
(True or False)
Kerckhoff's principle effectively says that the security of a cryptosystem should depend only on the secrecy of the key. |
|
Definition
True, the secrecy of our plaintext relies entirely on the secrecy of the key (pg 288) |
|
|
Term
(Chapter 8)
Which of the following statements is correct?
a. When a key is combined with a nonce for the purpose of encrypting a file, only the encrypted nonce is written to the file header
b. When a key is combined with a nonce for the purpose of encrypting a file, the unencrypted nonce is written to the file header along with the encrypted key
c. When a key is combined with a nonce for the purpose of encrypting a file, the nonce is not written to the file header
d. When a key is combined with a nonce for the purpose of encrypting a file, the encrypted nonce is written to the file header along with the encrypted key
|
|
Definition
b. When a key is combined with a nonce for the purpose of encrypting a file, the unencrypted nonce is written to the file header along with the encrypted key (pg 337) |
|
|
Term
(Chapter 8)
(True or False)
An attacker performing a man in the middle attack can easily break a public private key pair by intercepting encrypted messages |
|
Definition
True, also known as a bucket brigade attack. A forgery can be distributed. The file claims to contain the True public key but in fact it contains the Attacker's public key (pg 369) |
|
|
Term
(Chapter 8)
a public key certificate generally does not contain ___
a. a private key
b. the name of the public key's owner
c. a public key
d. a digital signature that covers the name and the public key
|
|
Definition
a. Correct - a private key
b. Incorrect - the name of the public key's owner
c. Incorrect - a public key
d. Incorrect - a digital signature that covers the name and the public key |
|
|
Term
(Chapter 8)
Which of the following statements about key wrapping is correct?
a. The CEK is used to encrypt the KEK
b. The KEK is produced by hashing the CEK combined with a nonce
c. The KEK is used to encrypt the data in the file
d. The KEK is used to encrypt the CEK
|
|
Definition
d. The KEK is used to encrypt the CEK, the program wraps the CEK by encrypting it with the KEK (pg 339) |
|
|
Term
(Chapter 8)
(True or False)
A digital certificate is created using the public key of the certificate authority
|
|
Definition
True, to construct a certificate, we calculate the hash over the owner's name and public key, then we use a private key to construct the signature. (pg 370 & slides) |
|
|
Term
(Chapter 8)
If a cryptograhic hash function produces the same output from two different inputs, it is considered to ___
a. have high entropy
b. have weak collision resistance
c. have high compression
d. have a highly random initialization vector
|
|
Definition
b. have weak collision resistance |
|
|
Term
(Chapter 8)
(True or False)
A nonce is a secret key
|
|
Definition
|
|
Term
(Chapter 8)
(True or False)
if an encrypted file is to be shared with multiple recipients, each of whom has his own passphrase, the file must contain one KEK and multiple CEKs
|
|
Definition
False, shares the same CEK among everyone, but wrap the CEK separately with each passphrase (KEK) |
|
|
Term
(Chapter 8)
Alice and Bob are using the Diffie-Hellman protocol to exchange keys. Which of the following statements about this process is correct?
a. Bob computes his secret key using the generator and sends his key to Alice
b. Both alice and Bob use the same prime number and generator
c. Alice picks a random number to use and sends that number to Bob.
d. Alice uses Bob's secret key to compute her secret key
|
|
Definition
|
|
Term
(Chapter 8)
(True or False)
A digital signature uses symmetric keys to sign or verify digital data
|
|
Definition
False, the asymmetry in public key cryptography allows us to produce digital signatues (pg 345) |
|
|
Term
(Chapter 8)
(True or False)
Key wrapping involves encrypting a key with a nonce
|
|
Definition
False, we encrypt the key itself using the passphrase (pg 338) |
|
|
Term
(Chapter 8)
(True or False)
a digital signature is produced by using the sender's private key to encrypt a message or a digest of the message
|
|
Definition
True, Alice uses her private key to produce a digital signature (slides) |
|
|
Term
(Chapter 8)
The property of ___ on a digital signature scheme indicates that it is difficult for an attacker to use an existing signature on a different message.
a. nonrepudiation
b. nonmutability
c. nonrevocation
d. nonforgeability
|
|
Definition
a. Incorrect - nonrepudiation - proof that the key's owner signed the digital data
b. Correct - nonmutability - difficult for an attacker to convert an existing signature into a valid signature on a different message
c. Incorrect
d. Incorrect- Nonforgeability - difficult for an attacker to forge a signature
|
|
|
Term
(Chapter 8)
(True or False)
Diffie Hellman protocol is used to encrypt messages
|
|
Definition
False, it is used for key exchange |
|
|
Term
(Chapter 8)
Which of the following statements is correct?
a. AES is a cryptographic compression function
b. DES is a cryptographic compression function
c. SHA-256 is a cryptographic compression function
d. RSA is a cryptographic compression function
|
|
Definition
c. SHA-256 is a cryptographic compression function, SHA-256 uses a compression function with inputs of m=512 bits and n = 256 bits, and produces hash values of n = 256 bits (slides) |
|
|