Cybersecurity Essentials Chapter 4 Quiz Questions Answers
Cybersecurity Essentials Chapter 4 Quiz Questions Answers
Cybersecurity Essentials Chapter 4 Quiz Questions Answers
Questions Answers
Cybersecurity Essentials 1.1 Chapter 4 Quiz Answers Full Questions
1.Which asymmetric algorithm provides an electronic key exchange method to share the secret
key?
RSA
Diffie-Hellman
WEP
DES
hashing
Explanation: Diffie-Hellman provides an electronic exchange method to share a secret key and is used
by multiple secure protocols.
2.What encryption algorithm uses one key to encrypt data and a different key to decrypt data?
transposition
symmetric
asymmetric
one-time pad
Explanation: Asymmetric encryption uses one key to encrypt data and a different key to decrypt data.
3. What type of cipher encrypts plaintext one byte or one bit at a time?
block
stream
hash
enigma
elliptical
Explanation: Stream ciphers encrypt plaintext one byte or one bit at a time, and can be much faster
than block ciphers.
4. What cryptographic algorithm is used by the NSA and includes the use of elliptical curves for
digital signature generation and key exchange?
ECC
RSA
AES
El-Gamal
IDEA
Explanation: Elliptic curve cryptography (ECC) uses elliptic curves as part of the algorithm for digital
signature generation and key exchange.
5.What is the term used to describe the science of making and breaking secret codes?
factorization
cryptology
impersonation
spoofing
jamming
Explanation: Cryptology is the science of making and breaking codes to make sure that cyber
criminals cannot easily compromise protected information.
6.Which three processes are examples of logical access controls? (Choose three.)
Explanation: Logical access controls includes but is not limited to the following:
Encryption
Smart cards
Passwords
Biometrics
Protocols
Firewalls
7.What term is used to describe concealing data in another file such as a graphic, audio, or other
text file?
masking
hiding
obfuscation
steganography
Explanation: Steganography conceals data in a file such as a graphic, audio, or other text file and is
used to prevent extra attention to the encrypted data because the data is not easily viewed.
Policies
Procedures
Hiring practices
Background checks
Data classification
Security training
Reviews
10.A warning banner that lists the negative outcomes of breaking company policy is displayed
each time a computer user logs in to the machine. What type of access control is implemented?
masking
deterrent
detective
preventive
11. Which term describes the technology that protects software from unauthorized access or
modification?
copyright
watermarking
access control
trademark
Explanation: Software watermarking inserts a secret message into the program as proof of ownership
and protects software from unauthorized access or modification.
12. What encryption algorithm uses the same pre-shared key to encrypt and decrypt data?
hash
asymmetric
one-time pad
symmetric
Explanation: Symmetric encryption algorithms use the same pre-shared key to encrypt and decrypt
data.
13.Which two terms are used to describe cipher keys? (Choose two.)
key space
key randomness
keylogging
key length
Explanation: Multi-factor authentication uses a minimum of two methods of verification and can
include the following:
15. What is the name of the method in which letters are rearranged to create the ciphertext?
substitution
transposition
one-time pad
enigma
One-time pad – plaintext combined with a secret key creates a new character, which then combines
with the plaintext to produce ciphertext
16. Which 128-bit block cipher encryption algorithm does the US government use to protect
classified information?
Vignere
AES
Caesar
3DES
Skipjack
Explanation: The Advanced Encryption Standard (AES) is used to protect classified information by
the U.S. government and is a strong algorithm that uses longer key lengths.
17.Match the description with the correct term. (Not all targets are used.)
18. What term is used to describe the technology that replaces sensitive information with a
nonsensitive version?
blanking
whiteout
masking
retracting
hiding
Explanation: Data masking replaces sensitive information with nonsensitive information. After
replacement, the nonsensitive version looks and acts like the original.
19. Which type of cipher is able to encrypt a fixed-length block of plaintext into a 128-bit block
of ciphertext at any one time?
transform
stream
hash
symmetric
block
Explanation: Block ciphers transform a fixed-length block of plaintext into a block of ciphertext. To
decrypt the ciphertext, the same secret key to encrypt is used in reverse.
20. Which three devices represent examples of physical access controls? (Choose three.)
locks
routers
swipe cards
firewalls
servers
video cameras
Explanation: Physical access controls include but are not limited to the following:Guards
Fences
Motion detectors
Laptop locks
Locked doors
Swipe cards
Guard dogs
Video cameras
Mantraps
Alarms