GCGA, a software development company, occasionally updates its software with major updates and minor patches. Administrators load these updates to the company web site along with a hash associated with each update. Which of the following BEST describes the purpose of the hash?
SEC+ Ch.10 Review Test

Quiz
•
Computers
•
Professional Development
•
Hard

Prem Jadhwani
Used 2+ times
FREE Resource
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Availability of updates and patches
Integrity of updates and patches
Confidentiality of updates and patches
Integrity of the application
Answer explanation
B is correct. The hash provides integrity for the updates and patches so that users can verify they have not been modified. Installing updates and patches increases the availability of the application. Confidentiality is provided by encryption. The hashes are for the updates and patches, so they do not provide integrity for the application.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Users in your organization sign their emails with digital signatures.
Which of the following provides integrity for these digital signatures?
Hashing
Encryption
Non-repudiation
Private key
Answer explanation
A is correct. Hashing provides integrity for digital signatures and other data. A digital signature is a hash of the message encrypted with the sender’s private key, but the encryption doesn’t provide integrity. The digital signature provides non-repudiation, but non-repudiation does not provide integrity. The private key and public key are both needed, but the private key does not provide integrity.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
While reviewing logs on a web server hosted by your organization, you notice multiple logon failures to an FTP account, but they’re only happening about once every 30 minutes. You also see that the same password is being tried against the SSH account right after the FTP account logon failure. What BEST describes what is happening?
Brute force attack
Dictionary attack
Plaintext attack
Spraying attack
Answer explanation
D is correct. This indicates a password spraying attack. It loops through a list of accounts, guessing a password for one account at a time, and then guessing the same password for a different account. In this scenario, the attack may be guessing passwords for other servers before it returns to the web server. A brute force attack attempts to guess all possible character combinations for a password, and a dictionary attack uses a dictionary of words trying to discover the correct password. A spraying attack could use either a brute force method or a dictionary method when guessing the password; however, these methods do not loop through a list of user accounts. In a plaintext attack (also called a known plaintext attack), an attacker has samples of known plaintext and can use these samples to decrypt ciphertext that includes this plaintext.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An online application requires users to log on with their email address and a password. The application encrypts the passwords in a hashed format. Which of the following can be added to decrease the likelihood that attackers can discover these passwords?
Rainbow tables
Salt
Digital signatures
Input validation
Answer explanation
B is correct. A password salt is additional random characters added to a password before hashing the password, and it decreases the success of password attacks. Rainbow tables are used by attackers and contain precomputed hashes, and salting is intended to specifically thwart rainbow table attacks. A digital signature provides authentication, non-repudiation, and integrity, but it doesn’t protect passwords. Input validation techniques verify data is valid before using it, and they are unrelated to protecting hashed passwords.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary difference between a block cipher and a stream cipher?
A stream cipher encrypts data 1 bit or 1 byte at a time.
A block cipher encrypts data 1 bit or 1 byte at a time.
Stream ciphers are used for symmetric encryption, but block ciphersare used for asymmetric encryption.
Block ciphers are used for symmetric encryption, but stream ciphersare used for asymmetric encryption.
Answer explanation
A is correct. A stream cipher encrypts data a single bit or a single byte at a time and is more efficient when the size of the data is unknown, such as streaming audio or video. A block cipher encrypts data in specific-sized blocks, such as 64-bit blocks or 128-bit blocks. Both are used with symmetric encryption algorithms.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A developer is creating an application that will encrypt and decrypt data on mobile devices. These devices don’t have a lot of processing power. Which of the following cryptographic methods has the LEAST overhead and can provide encryption for these mobile devices?
Elliptic curve cryptography
Perfect forward secrecy
Salting
Digital signatures
Answer explanation
A is correct. Elliptic curve cryptography (ECC) has minimal overhead and is often used with mobile devices for encryption. Perfect forward secrecy refers to session keys and provides assurances that session keys will not be compromised even if a private key is later compromised. Salting adds random characters to a password before hashing it to thwart rainbow table attacks. Digital signatures provide integrity, authentication, and nonrepudiation, but not encryption.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are configuring a web server that will be used by salespeople via the Internet. Data transferred to and from the server needs to be encrypted, so you are tasked with requesting a certificate for the server. Which of the following would you MOST likely use to request the certificate?
CA
CRL
CSR
OCSP
Answer explanation
C is correct. You would request a certificate with a certificate signing request (CSR). It uses a specific format to request a certificate. You submit the CSR to a certificate authority (CA), but the request needs to be in the CSR format. A certificate revocation list (CRL) is a list of revoked certificates. The Online Certificate Status Protocol (OCSP) is an alternate method of validating certificates and indicates if a certificate is good, revoked, or unknown.
Create a free account and access millions of resources
Similar Resources on Quizizz
20 questions
City & Guilds Level 3 Apprenticeship Coding and Logic

Quiz
•
Professional Development
10 questions
AWS Security - Semana 5

Quiz
•
Professional Development
10 questions
ITF - Quiz 9.6 - Internet Application Services

Quiz
•
Professional Development
20 questions
Introduction to Cybersecurity

Quiz
•
Professional Development
10 questions
Exploring Network and Application Security

Quiz
•
Professional Development
20 questions
ICT

Quiz
•
Professional Development
10 questions
Public Key Infrastructure

Quiz
•
Professional Development
10 questions
SLOT 1: Foundation 1

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade