Security+ Lesson 3

Security+ Lesson 3

Professional Development

6 Qs

quiz-placeholder

Similar activities

Chapter 8 Review Questions

Chapter 8 Review Questions

Professional Development

10 Qs

Web application security

Web application security

Professional Development

10 Qs

IOS Basic Commands

IOS Basic Commands

Professional Development

10 Qs

Startup - Value Proposition Canvas

Startup - Value Proposition Canvas

University - Professional Development

10 Qs

Microsoft Access

Microsoft Access

10th Grade - Professional Development

10 Qs

Excel Data Validation and Verification

Excel Data Validation and Verification

6th Grade - Professional Development

10 Qs

Excel Data Validation

Excel Data Validation

6th Grade - Professional Development

10 Qs

Bedrock Quiz 1 - NAMER - GenAI - Enablement

Bedrock Quiz 1 - NAMER - GenAI - Enablement

Professional Development

10 Qs

Security+ Lesson 3

Security+ Lesson 3

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Alejandro Hidalgo

FREE Resource

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an extension of the Diffie-Hellman key exchange into a complete discrete logarithm cryptosystem, allowing for tasks like general encryption?

RIPEMD

RSA

MD5

ElGamal

Answer explanation

ElGamal is an extension of the Diffie-Hellman key exchange designed by Taher Elgamal in 1985. It extends DH into a complete discrete logarithm cryptosystem, allowing for tasks like general encryption. Elgamal released his technique into the public domain, while at the time, RSA was proprietary, so the royalty-free nature gained its popularity. One disadvantage is that it generates ciphertext twice as long as the plaintext, so it increases the consumption of storage and bandwidth.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the correct sequence of encryption ciphers from the weakest to the strongest?

DES > 3DES > Blowfish > AES

DES > Blowfish > AES > 3DES

3DES > DES > AES > Blowfish

3DES > DES > Blowfish > AES

Answer explanation

The correct sequence of encryption ciphers from the weakest to the strongest is as follows:

1 - Data Encryption Standard (DES)

2 - TripleDES (3DES)

3 - Blowfish

4 - Advanced Encryption Standard (AES)

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is a certificate backed by a stricter identity validation process than the CA’s default?

Extended Validation

Email

Domain validation

Machine authentication

Answer explanation

Extended Validation (EV) is a certificate backed by a stricter identity validation process than the CA’s default. It provides the highest available level of assurance. The CA issuing an EV certificate certifies that they have verified the identity and authenticity of the certificate subject. For SSL certificates used on the web, sites with a valid EV certificate show a distinct green color in the browser’s address bar. Generally, an EV certificate cannot also be a wildcard, but it might be multi-domain.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of cryptography is best suited for key generation?

Hashing

One-Time Pad

Symmetric encryption

Asymmetric encryption

Answer explanation

Since the output of a cryptographic hash is pseudorandom, it can be used anywhere pseudorandom data of a fixed length is desired. For example, you can securely generate a new key by hashing an existing key, arbitrary data, or some combination of the two. Hashing is particularly valuable for creating cryptographic keys from passwords created by humans. Since these passwords are often shorter and less random than modern keys, it’s a good idea to add a key stretching algorithm that makes brute force decryption more difficult.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a NIST standard that uses a discrete logarithm and is faster for data encryption and signature verification?

DSA

DH

HMAC

ECC

Answer explanation

Digital Signature Algorithm (DSA) is created by a former NSA employee in 1991 and soon adopted as a NIST standard. It uses a different one-way problem called a discrete logarithm. It is similar in overall strength to RSA at the same key length, but different in performance. DSA allows faster key generation and decryption and RSA is faster for data encryption and signature verification. RSA is more popular, and current DSA standards require 1024-bit keys, which are no longer considered secure.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following makes the mathematical relationship between the plaintext and the key as complex as possible, so that a partially correct key is useless to an attacker?

Transposition

Confusion

Diffusion

One-Time Pad

Answer explanation

Confusion makes the mathematical relationship between the plaintext and the key as complex as possible, so that a partially correct key is useless to an attacker. Every bit or character of the plaintext should be acted upon by more than one bit or character of the key. In a cipher with very strong confusion, changing a single bit of the key might change half the bits of the entire ciphertext.