A security technician runs an automated script every night designed to detect changes in files. Of the following choices, what are the most likely protocols used in this script?
A. PGP and MD5
B. ECC and HMAC
C. AES and Twofish
D. MD5 and HMAC
Answer: D. MD5 and HMAC
Learn More :
Cryptography Concepts
- Your organization has implemented a virtual private network (VPN) that allows branch offices to connect to the main office. Recently, you have discovered that the key used on the VPN has been compromised. You need to ensure that the key is not compromised in the future. What should you do?
- Your organization has recently become the victim of an attack against a cryptographic algorithm. The particular attack used all possible keys until a key is discovered that successfully decrypts the ciphertext. Which type of attack occurred?
- Your organization implements a public key infrastructure (PKI) to issue digital certificates to users. Management has requested that you ensure that all the digital certificates that were issued to contractors have been revoked. Which PKI component should you consult?
- Users on your organization's network need to be able to access several confidential files located on a file server. Currently, the files are encrypted. Recently, it was discovered that attackers were able to change the contents of the file. You need to use a hash function to calculate the hash values of the correct files. Which of the following should you not use?
- Management at your organization has decided that it no longer wants to implement asymmetric algorithms because they are much more expensive to implement. You have determined that several algorithms are being used across the enterprise. Which of the following should you discontinue using, based on management's request?
- You have recently been hired by a company to analyze its security mechanisms to determine any weaknesses in their current security mechanisms. During this analysis, you detect that an application is using a 3DES implementation that encrypts each block of data three times, each time with a different key. Which 3DES implementation does the application use?
- Your organization recently obtained a contract with the U.S. Department of Defense (DoD). As part of this contract, your organization will be exchanging confidential data with the DoD. Management has requested that you implement the most secure encryption scheme available for these data exchanges. Which scheme should you implement?
- Your organization has recently decided to implement encryption on the network. Management requests that you implement a system that uses a private or secret key that must remain secret between the two parties. Which system should you implement?
- Your organization's enterprise implements several different encryption algorithms, based on the organizational needs and the data being protected. Recently, several different encryption keys have generated the same ciphertext from the same plaintext message. This has resulted in your organization's enterprise being susceptible to attackers. Which condition has occurred?
- Your organization has decided that it needs to protect all confidential data that is residing on a file server. All confidential data is located within a folder named Confidential. You need to ensure that this data is protected. What should you do?
- How you can detect TLS/SSL encrypted command and control traffic?
- Who is currently further along, cryptographers or cryptanalysts?
- When two different inputs produce an identical output.
- Encryption at different layers of OSI model.
- A good cryptographic algorithm should
- What determines the strength of a modern encryption algorithm?
- DES uses two standardized block cipher modes.
- What once-patented public-key asymmetric algorithm is now public domain?
- PGP process
- Diffie-Hellman [DH] Key Agreement
- Mathematical model in the DH key exchange process.
- SSHv1 connection process.
- Distinction between digital signatures and asymmetric encryption.
- To facilitate encrypted bulk data transfer using TLS:
- Why is using ECDHE_ECDSA stronger than using RSA?