You are on page 1of 14

25/08/2021 Network Security 1.

0 Modules 15 - 17: Cryptography Group Exam Answers

 IT Questions Bank Commands Help Resources »  IP Calculators »

 Donations  My account

Search the site 

 Home  CCNA v7 » IT Essentials 7.0 » Security » CyberOps » CCNP v8 »

DevNet Linux » Other courses »

 IT Questions Bank CCNA v6 » CCNA v7 » IT Essentials 7.0 » Security »

CCNA CyberOps » CCNP v8 » DevNet Associate Linux » Networking Essentials

IOS Commands Help Resources » Download Cisco Packet Tracer 8 »

IP Subnet Calculators » Donation Contact  My account

Network Security 1.0 Modules 15 – 17:


Cryptography Group Exam Answers
 May 20, 2021 |
 Last Updated: July 3, 2021 |

 Network Security 1.0 |


 No Comments

Share your ❤️Buy me a ☕

WAREHOUSE WORKER Donate


LEARN MORE
Jobs in Carlisle
JOB OFFER in 1 HR!
Great pay + Enjoy an active job

https://itexamanswers.net/network-security-1-0-modules-15-17-cryptography-group-exam-answers.html 1/14
25/08/2021 Network Security 1.0 Modules 15 - 17: Cryptography Group Exam Answers

Play Now
Poki
Network Security 1.0 Exam
 Share  Tweet  Share  Pin it Answers

Network Security v1.0

How to find: Press “Ctrl + F” in the browser and fill in


whatever wording is in the question to find that Modules 1 – 4: Securing
question/answer. If the question is not here, find it in Networks Group Exam
Questions Bank. (Answers)

Modules 5 – 7: Monitoring
NOTE: If you have the new question on this test, and Managing Devices
please comment Question and Multiple-Choice list in Group Exam (Answers)
form below this article. We will update answers for
Modules 8 – 10: ACLs and
you in the shortest time. Thank you! We truly value
Firewalls Group Exam
your contribution to the website.
(Answers)

Modules 11 – 12: Intrusion


Network Security ( Version 1) – Network Prevention Group Exam
Security 1.0 Modules 15 – 17: Cryptography (Answers)

Group Exam Answers Modules 13 – 14: Layer 2


and Endpoint Security
1. Which algorithm can ensure data integrity?
Group Exam (Answers)
RSA
AES Modules 15 – 17:
MD5 Cryptography Group Exam
PKI (Answers)

Modules 18 – 19: VPNs


Explanation: Data integrity guarantees that the message Group Exam (Answers)
was not altered in transit. Integrity is ensured by
Modules 20 – 22: ASA
implementing either of the Secure Hash Algorithms (SHA-
Group Exam (Answers)
2 or SHA-3). The MD5 message digest algorithm is still
widely in use. WAREHOUSE WORKER Network Security 1.0
LEARN MORE
Jobs in Carlisle Practice Final Exam
JOB OFFER in 1 HR!
2. What is the keyspace of Great pay + Enjoy an
an encryption active job
algorithm? Answers
https://itexamanswers.net/network-security-1-0-modules-15-17-cryptography-group-exam-answers.html 2/14
25/08/2021 Network Security 1.0 Modules 15 - 17: Cryptography Group Exam Answers

the set of all possible values used to generate a key


Network Security 1.0
the set of procedures used to calculate asymmetric keys
Final PT Skills Exam
the set of hash functions used to generate a key
(PTSA) Answers
the mathematical equation that is used to create a key
Network Security 1.0
Final Exam Answers
Explanation: The keyspace of an encryption algorithm is
the set of all possible key values. Keys with n bits
produce a keyspace with 2^ n possible key values.​

3. Alice and Bob are using a digital signature to sign a


Recent Comments
document. What key should Alice use to sign the
document so that Bob can make sure that the document Joseph on CCNA 200-301
came from Alice? Dumps Full Questions – Exam
Study Guide & Free
private key from Bob Briant on CCNA 200-301 Dumps
private key from Alice Full Questions – Exam Study
public key from Bob Guide & Free
username and password from Alice Joa on CCIE/CCNP 350-401
ENCOR Dumps Full Questions
with VCE & PDF
Explanation: Alice and Bob are used to explain
asymmetric cryptography used in digital signatures. Alice Joa on CCIE/CCNP 350-401
ENCOR Dumps Full Questions
uses a private key to encrypt the message digest. The
with VCE & PDF
message, encrypted message digest, and the public key
ana on CCIE/CCNP 350-401
are used to create the signed document and prepare it for
ENCOR Dumps Full Questions
transmission. with VCE & PDF

4. Which three security services are provided by digital


signatures? (Choose three.)

provides nonrepudiation using HMAC functions


guarantees data has not changed in transit
provides data encryption
authenticates the source
provides confidentiality of digitally signed data
authenticates the destination

Explanation: Digital signatures are a mathematical


technique used to provide three basic security services.
Digital signatures have specific properties that enable
entity authentication and data integrity. In addition, digital
signatures provide nonrepudiation of the transaction. In
other words, the digital signature serves as legal proof
that the data exchange did take place.
WAREHOUSE WORKER
LEARN MORE
Jobs in Carlisle
JOB OFFER in 1 HR!
Great pay + Enjoy an active job

https://itexamanswers.net/network-security-1-0-modules-15-17-cryptography-group-exam-answers.html 3/14
25/08/2021 Network Security 1.0 Modules 15 - 17: Cryptography Group Exam Answers

5. What is another name for confidentiality of


information?

consistency
trustworthiness
accuracy
privacy

Explanation: Privacy is another name for confidentiality.


Accuracy, consistency, and trustworthiness describe
integrity of data.

6. As data is being stored on a local hard disk, which


method would secure the data from unauthorized access?

a duplicate hard drive copy


deletion of sensitive files
two factor authentication
data encryption

Explanation: Data encryption is the process of


converting data into a form where only a trusted,
authorized person with a secret key or password can
decrypt the data and access the original form.

7. What popular encryption algorithm requires that both


the sender and receiver know a pre-shared key?

PKI
MD5
AES WAREHOUSE WORKER
LEARN MORE
HMAC Jobs in Carlisle
JOB OFFER in 1 HR!
Great pay + Enjoy an active job

https://itexamanswers.net/network-security-1-0-modules-15-17-cryptography-group-exam-answers.html 4/14
25/08/2021 Network Security 1.0 Modules 15 - 17: Cryptography Group Exam Answers

Explanation: MD5 is a hashing algorithm that


guarantees that no one intercepted the message and
altered it. Advanced Encryption Standard (AES) is a
popular symmetric encryption algorithm where each
communicating party needs to know the pre-shared key.
Public key infrastructure (PKI) is an asymmetric
encryption algorithm based on the assumption that the
two communicating parties have not previously shared a
secret key. HMAC is a hash message authentication code
that guarantees that the message is not a forgery and
actually comes from the authentic source.

8. In which method used in cryptanalysis does the


attacker know a portion of the plaintext and the
corresponding ciphertext?​

meet-in-the-middle
brute-force
chosen-plaintext​
ciphertext

Explanation: There are several methods used in


cryptanalysis:

Brute-force – The attacker tries every possible key


knowing that eventually one of them will work.

Ciphertext – The attacker has the ciphertext of several


messages encrypted but no knowledge of the underlying
plaintext.
Known-Plaintext – The attacker has access to the
ciphertext of several messages and knows something
about the plaintext underlying that ciphertext.

Chosen-Plaintext – The attacker chooses which data the


encryption device encrypts and observes the ciphertext
output.

Chosen-Ciphertext – The attacker can choose different


ciphertext to be decrypted and has access to the
decrypted plaintext.

Meet-in-the-Middle – The attacker knows a portion of the


plaintext and the corresponding ciphertext.​

9. Match the disciplines or roles to the descriptions.

WAREHOUSE WORKER
LEARN MORE
Jobs in Carlisle
JOB OFFER in 1 HR!
Great pay + Enjoy an active job

https://itexamanswers.net/network-security-1-0-modules-15-17-cryptography-group-exam-answers.html 5/14
25/08/2021 Network Security 1.0 Modules 15 - 17: Cryptography Group Exam Answers

10. What technology supports asymmetric key encryption


used in IPsec VPNs?

3DES
IKE
SEAL
AES

Explanation: IKE, or Internet Key Exchange, is a


protocol to support asymmetric encryption algorithms. It is
used to securely exchange encryption keys in the setup
of IPsec VPNs.

11. What are two symmetric encryption algorithms?


(Choose two.)

3DES
MD5
AES
HMAC
SHA

Explanation: MD5, HMAC, and SHA are hashing


algorithms. WAREHOUSE WORKER
LEARN MORE
Jobs in Carlisle
JOB OFFER in 1 HR!
Great pay + Enjoy an active job

https://itexamanswers.net/network-security-1-0-modules-15-17-cryptography-group-exam-answers.html 6/14
25/08/2021 Network Security 1.0 Modules 15 - 17: Cryptography Group Exam Answers

12. Which two items are used in asymmetric encryption?


(Choose two.)

a token
a TPM
a private key
a DES key
a public key

Explanation: A token is something that is used to


provide two-factor authentication. DES is using an
identical key to encrypt and decrypt. Asymmetric
encryption uses a private key associated with a public
key.

13. What are two properties of a cryptographic hash


function? (Choose two.)

Complex inputs will produce complex hashes.


Hash functions can be duplicated for authentication
purposes.
The hash function is one way and irreversible.
The input for a particular hash algorithm has to have a
fixed size.
The output is a fixed length.

Explanation: A cryptographic hash function should have


the following properties:The input can be any length.

The output has a fixed length.

The hash value is relatively easy to compute for any


given input.

The hash is one way and not reversible.

The hash is collision free, meaning that two different input


values will result in different hash values

14. Which statement describes asymmetric encryption


algorithms?

They have key lengths ranging from 80 to 256 bits.


They include DES, 3DES, and AES.
They are also called shared-secret key algorithms.
They are relatively slow because they are based on
difficult computational algorithms.

WAREHOUSE WORKER
Explanation: DES, 3DES,Jobs
and AES are examples of
in Carlisle LEARN MORE
symmetric encryption algorithms (also known as shared
Great pay + Enjoy an active job
JOB OFFER in 1 HR!

https://itexamanswers.net/network-security-1-0-modules-15-17-cryptography-group-exam-answers.html 7/14
25/08/2021 Network Security 1.0 Modules 15 - 17: Cryptography Group Exam Answers

secret key algorithms). The usual key length for


symmetric algorithms is 80-256 bits. Asymmetric
algorithms are relatively slow because they are based on
difficult computational algorithms.

15. An IT enterprise is recommending the use of PKI


applications to securely exchange information between
the employees. In which two cases might an organization
use PKI applications to securely exchange information
between users? (Choose two.)

HTTPS web service


802.1x authentication
local NTP server
FTP transfers
file and directory access permission

Explanation: The Public Key Infrastructure (PKI) is a


third party-system referred to as a certificate authority or
CA. The PKI is the framework used to securely exchange
information between parties. Common PKI applications
are as follows:
SSL/TLS certificate-based peer authentication

Secure network traffic using IPsec VPNs

HTTPS Web traffic

Control access to the network using 802.1x


authentication

Secure email using the S/MIME protocol

Secure instant messaging

Approve and authorize applications with Code Signing

Protect user data with the Encryption File System (EFS)

Implement two-factor authentication with smart cards

Securing USB storage devices

16. Two users must authenticate each other using digital


certificates and a CA. Which option describes the CA
authentication procedure?

The users must obtain the certificate of the CA and


then their own certificate.
The CA is always required, even after user verification is
complete.
CA certificates are retrieved out-of-band using the PSTN,
and the authentication is done in-band over a network.
After user verification isWAREHOUSE
complete, the CA isWORKER
no longer
LEARN MORE
Jobs in Carlisle
required, even if one of the involved certificates expires. JOB OFFER in 1 HR!
Great pay + Enjoy an active job

https://itexamanswers.net/network-security-1-0-modules-15-17-cryptography-group-exam-answers.html 8/14
25/08/2021 Network Security 1.0 Modules 15 - 17: Cryptography Group Exam Answers

Explanation: When two users must authenticate each


other using digital certificates and CA, both users must
obtain their own digital certificate from a CA. They submit
a certificate request to a CA, and the CA will perform a
technical verification by calling the end user (out-of-
band). Once the request is approved, the end user
retrieves the certificate over the network (in-band) and
installs the certificate on the system. After both users
have installed their certificate, they can perform
authentication by sending their certificate to each other.
Each site will use the public key of the CA to verify the
validity of the certificate; no CA is involved at this point. If
both certificates are verified, both users can now
authenticate each other.

17. The following message was encrypted using a Caesar


cipher with a key of 2:

fghgpf vjg ecuvng

What is the plaintext message?

invade the castle


defend the castle
defend the region
invade the region

Explanation: The Caesar cipher was a simple


substitution cipher. In this example, if the key is 2, the
letter d was moved two spaces to the right, resulting in an
encoded message that used the letter f in place of the
letter d. The letter g would be the substitute for the letter
e, and so on. So, the resulting plaintext is f=d, g=e, h=f,
g=e, p=n, f=d, v=t, j=h, g=e, e=c, c=a, u=s, v=t, n=l, g=e.​

18. In a hierarchical CA topology, where can a subordinate


CA obtain a certificate for itself?

from the root CA or another subordinate CA at a


higher level
from the root CA or another subordinate CA at the same
level
from the root CA or from self-generation
from the root CA only
from the root CA or another subordinate CA anywhere in
WAREHOUSE WORKER
the tree Jobs in Carlisle LEARN MORE
JOB OFFER in 1 HR!
Great pay + Enjoy an active job

https://itexamanswers.net/network-security-1-0-modules-15-17-cryptography-group-exam-answers.html 9/14
25/08/2021 Network Security 1.0 Modules 15 - 17: Cryptography Group Exam Answers

Explanation: In a hierarchical CA topology, CAs can


issue certificates to end users and to subordinate CAs,
which in turn issue their certificates to end users, other
lower level CAs, or both. In this way, a tree of CAs and
end users is built in which every CA can issue certificates
to lower level CAs and end users. Only the root CA can
issue a self-signing certificate in a hierarchical CA
topology.

19. What is the purpose for using digital signatures for


code signing?

to establish an encrypted connection to exchange


confidential data with a vendor website
to verify the integrity of executable files downloaded
from a vendor website
to authenticate the identity of the system with a vendor
website
to generate a virtual ID

Explanation: Code signing is used to verify the integrity


of executable files downloaded from a vendor website.
Code signing uses digital certificates to authenticate and
verify the identity of a website.

20. What technology has a function of using trusted third-


party protocols to issue credentials that are accepted as
an authoritative identity?

digital signatures
hashing algorithms
PKI certificates
symmetric keys

Explanation: Digital certificates are used to prove the


authenticity and integrity of PKI certificates, but a PKI
Certificate Authority is a trusted third-party entity that
issues PKI certificates. PKI certificates are public
information and are used to provide authenticity,
confidentiality, integrity, and nonrepudiation services that
can scale to large requirements.

21. Which requirement of secure communications


WAREHOUSE WORKER is
ensured by the implementation LEARN MORE
Jobsof
inMD5 or SHA hash
Carlisle
JOB OFFER in 1 HR!
generating algorithms?​ Great pay + Enjoy an active job
https://itexamanswers.net/network-security-1-0-modules-15-17-cryptography-group-exam-answers.html 10/14
25/08/2021 Network Security 1.0 Modules 15 - 17: Cryptography Group Exam Answers

nonrepudiation
authentication
integrity
confidentiality

Explanation: Integrity is ensured by implementing either


MD5 or SHA hash generating algorithms. Many modern
networks ensure authentication with protocols, such as
HMAC. Data confidentiality is ensured through symmetric
encryption algorithms, including DES, 3DES, and AES.
Data confidentiality can also be ensured using
asymmetric algorithms, including RSA and PKI.​

22. What is an example of the one-time pad cipher?

RC4
rail fence
Caesar
Vigenère​

Explanation: RC4 is an example of the one-time pad


cipher, and it is widely used on the Internet. The Caesar
cipher is a simple substitution cipher, and the Vigenère
cipher is based on the Caesar cipher. An example of a
transposition cipher is the rail fence cipher.​

23. A company is developing a security policy for secure


communication. In the exchange of critical messages
between a headquarters office and a branch office, a hash
value should only be recalculated with a predetermined
code, thus ensuring the validity of data source. Which
aspect of secure communications is addressed?

data integrity
non-repudiation
data confidentiality
origin authentication

Explanation: Secure communications consists of four


elements: Data confidentiality – guarantees that only
authorized users can read the message

Data integrity – guarantees that the message was not


altered

WAREHOUSE
Origin authentication – guarantees WORKER
that the message is
LEARN MORE
Jobscome
not a forgery and does actually in Carlisle
from whom it states
JOB OFFER in 1 HR!
Great pay + Enjoy an active job

https://itexamanswers.net/network-security-1-0-modules-15-17-cryptography-group-exam-answers.html 11/14
25/08/2021 Network Security 1.0 Modules 15 - 17: Cryptography Group Exam Answers

Data nonrepudiation – guarantees that the sender cannot


repudiate, or refute, the validity of a message sent

24. What is the purpose of a digital certificate?

It guarantees that a website has not been hacked.


It provides proof that data has a traditional signature
attached.
It ensures that the person who is gaining access to a
network device is authorized.
It authenticates a website and establishes a secure
connection to exchange confidential data.

Explanation: Digital signatures commonly use digital


certificates that are used to verify the identity of the
originator in order to authenticate a vendor website and
establish an encrypted connection to exchange
confidential data. One such example is when a person
logs into a financial institution from a web browser.

Download Modules 15 – 17: Cryptography Group


Exam Answers PDF:

Modules 15 – 17 Cryptography DOWNLOAD


Group Exam Answers PDF
 1 file(s)  1.16 MB

Related Articles
WAREHOUSE WORKER
LEARN MORE
Jobs in Carlisle
JOB OFFER in 1 HR!
Great pay + Enjoy an active job

https://itexamanswers.net/network-security-1-0-modules-15-17-cryptography-group-exam-answers.html 12/14
25/08/2021 Network Security 1.0 Modules 15 - 17: Cryptography Group Exam Answers


B e the First to Comment!

0 COMMENTS

ITExamAnswers.net Copyright © 2021. Privacy Policy | Contact

WAREHOUSE WORKER
LEARN MORE
Jobs in Carlisle
JOB OFFER in 1 HR!
Great pay + Enjoy an active job

https://itexamanswers.net/network-security-1-0-modules-15-17-cryptography-group-exam-answers.html 13/14
25/08/2021 Network Security 1.0 Modules 15 - 17: Cryptography Group Exam Answers

https://itexamanswers.net/network-security-1-0-modules-15-17-cryptography-group-exam-answers.html 14/14

You might also like